18,193 research outputs found

    A Survey of Digital Watermarking Techniques

    Full text link
    Volume 1 Issue 6 (August 2013

    Printed document integrity verification using barcode

    Get PDF
    Printed documents are still relevant in our daily life and information in it must be protected from threats and attacks such as forgery, falsification or unauthorized modification. Such threats make the document lose its integrity and authenticity. There are several techniques that have been proposed and used to ensure authenticity and originality of printed documents. But some of the techniques are not suitable for public use due to its complexity, hard to obtain special materials to secure the document and expensive. This paper discuss several techniques for printed document security such as watermarking and barcode as well as the usability of two dimensional barcode in document authentication and data compression with the barcode. A conceptual solution that are simple and efficient to secure the integrity and document sender's authenticity is proposed that uses two dimensional barcode to carry integrity and authenticity information in the document. The information stored in the barcode contains digital signature that provides sender's authenticity and hash value that can ensure the integrity of the printed document

    Development of variable voltage variable frequency drive system for induction motor speed control

    Get PDF
    This project describes the development of a Variable Voltage Variable Frequency (VVVF) system that controls the speed of Induction Motor (IM) at specific speed. Texas Instrument C2000 Microcontroller (TMS320F28335) has been used in this project as the interface between the control design with the IM. The Texas Instrument microcontroller has been combined with the MATLAB/Simulink and the VVVF system as the communication interface for processing the speed control system. The combination between power electronic circuits and microcontroller along with variable voltage variable frequency (VVVF) technique is able to control the target speed of IM. The target value of VVVF is implemented inside Lookup table and has been combined with the Proportional Integral (PI) speed control that generates the signal into the sinusoidal pulse width modulation (SPWM) for inverter operation. The SPWM signal is produced from the microcontroller with the instruction from MATLAB/Simulink, where the controller performs the output of the motor speed. The PI speed control receives the output of a closed loop feedback system from the motor speed and the error signal is reduced to achieve the value of desired speed reference. In the conclusion, the VVVF closed loop system is very useful to control the desired speed of motor at different variable voltage and variable frequency value. As collected for the results, its show, the VVVF with PI speed control can achieve the actual speed for the IM at 1297rpm and 1499rpm when the reference speeds have been set at 1300rpm and 1500rpm respectively. At the end it can be concluded that the VVVF combined with microcontroller have created an ecosystem for speed control that have achieved the objectives

    Information Hiding in Images Using Steganography Techniques

    Get PDF
    Innovation of technology and having fast Internet make information to distribute over the world easily and economically. This is made people to worry about their privacy and works. Steganography is a technique that prevents unauthorized users to have access to the important data. The steganography and digital watermarking provide methods that users can hide and mix their information within other information that make them difficult to recognize by attackers. In this paper, we review some techniques of steganography and digital watermarking in both spatial and frequency domains. Also we explain types of host documents and we focused on types of images

    Comparative Analysis of Hybrid Algorithms in Information Hiding

    Get PDF
    In this present work, propose comparative algorithms to conceal information into the image using steganography method. The proposedalgorithms use binary codes and pixels inside an image. The zipped file is used before it is transformed to binary codes to make the most of the storage of data inside the image. By applying the algorithms, a system called Steganography Imaging Information System (SIIS) is developed. The system is then tested to see the viability of the proposed algorithm. Different sizes of data are stored inside the images and the PSNR (Peak signal-to-noise ratio) is also captured for each of the images tested. According to the PSNR value of each image, the concealed image has a higher PSNR value. Therefore, this new steganography algorithm efficiently hides the data in the image

    Perspective Chapter: Text Watermark Analysis - Concept, Technique, and Applications

    Get PDF
    Watermarking is a modern technology in which identifying information is embedded in a data carrier. It is not easy to notice without affecting data usage. A text watermark is an approach to inserting a watermark into text documents. This is an extremely complex undertaking, especially given the scarcity of research in this area. This process has proven to be very complex, especially since there has only been a limited amount of research done in this field. Conducting an in-depth analysis, analysis, and implementation of the evaluation, is essential for its success. The overall aim of this chapter is to develop an understanding of the theory, methods, and applications of text watermarking, with a focus on procedures for defining, embedding, and extracting watermarks, as well as requirements, approaches, and linguistic implications. Detailed examination of the new classification of text watermarks is provided in this chapter as are the integration process and related issues of attacks and language applicability. Research challenges in open and forward-looking research are also explored, with emphasis on information integrity, information accessibility, originality preservation, information security, and sensitive data protection. The topics include sensing, document conversion, cryptographic applications, and language flexibility

    Hiding text in speech signal using K-means, LSB techniques and chaotic maps

    Get PDF
    In this paper, a new technique that hides a secret text inside a speech signal without any apparent noise is presented. The technique for encoding the secret text is through first scrambling the text using Chaotic Map, then encoding the scraped text using the Zaslavsky map, and finally hiding the text by breaking the speech signal into blocks and using only half of each block with the LSB, K-means algorithms. The measures (SNR, PSNR, Correlation, SSIM, and MSE) are used on various speech files (“.WAV”), and various secret texts. We observed that the suggested technique offers high security (SNR, PSNR, Correlation, and SSIM) of an encrypted text with low error (MSE). This indicates that the noise level in the speech signal is very low and the speech purity is high, so the suggested method is effective for embedding encrypted text into speech files
    corecore