616 research outputs found
A New Digital Watermarking Algorithm Using Combination of Least Significant Bit (LSB) and Inverse Bit
In this paper, we introduce a new digital watermarking algorithm using least
significant bit (LSB). LSB is used because of its little effect on the image.
This new algorithm is using LSB by inversing the binary values of the watermark
text and shifting the watermark according to the odd or even number of pixel
coordinates of image before embedding the watermark. The proposed algorithm is
flexible depending on the length of the watermark text. If the length of the
watermark text is more than ((MxN)/8)-2 the proposed algorithm will also embed
the extra of the watermark text in the second LSB. We compare our proposed
algorithm with the 1-LSB algorithm and Lee's algorithm using Peak
signal-to-noise ratio (PSNR). This new algorithm improved its quality of the
watermarked image. We also attack the watermarked image by using cropping and
adding noise and we got good results as well.Comment: 8 pages, 6 figures and 4 tables; Journal of Computing, Volume 3,
Issue 4, April 2011, ISSN 2151-961
Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations
The training and creation of deep learning model is usually costly, thus it
can be regarded as an intellectual property (IP) of the model creator. However,
malicious users who obtain high-performance models may illegally copy,
redistribute, or abuse the models without permission. To deal with such
security threats, a few deep neural networks (DNN) IP protection methods have
been proposed in recent years. This paper attempts to provide a review of the
existing DNN IP protection works and also an outlook. First, we propose the
first taxonomy for DNN IP protection methods in terms of six attributes:
scenario, mechanism, capacity, type, function, and target models. Then, we
present a survey on existing DNN IP protection works in terms of the above six
attributes, especially focusing on the challenges these methods face, whether
these methods can provide proactive protection, and their resistances to
different levels of attacks. After that, we analyze the potential attacks on
DNN IP protection methods from the aspects of model modifications, evasion
attacks, and active attacks. Besides, a systematic evaluation method for DNN IP
protection methods with respect to basic functional metrics, attack-resistance
metrics, and customized metrics for different application scenarios is given.
Lastly, future research opportunities and challenges on DNN IP protection are
presented
Hashing Based Software Watermarking for Source Code Files
Software is developed and delivered to clients as a routine part of software engineering life cycle . Software is quite an expensive entity. However various attacks are possible on software to make its illegal use. Different solutions are there to prevent piracy. Software watermarking embeds a watermark in the source code so that it is undetectable yet it proves the ownership of the developer. The technique has been tested for C++ source code files, however, it can be applicable on any other language. The proposed techniques scans the code for all possible constants, forms a hash sequence using MD5 algorithm that calculates the watermark and stores in Date & Watermark Value Repository (DWVR)
A New Cyber Forensic Philosophy for Digital Watermarks in the Context of Copyright Laws
The objective of this paper is to propose a new cyber forensic philosophy for watermark in the context of copyright laws for the benefit of the forensic community and the judiciary worldwide. The paper first briefly introduces various types of watermarks, and then situates watermarks in the context of the ideaexpression dichotomy and the copyright laws. It then explains the forensic importance of watermarks and proposes a forensic philosophy for them in the context of copyright laws. Finally, the paper stresses the vital need to incorporate watermarks in the forensic tests to establish software copyright infringement and also urges the judiciary systems worldwide to study and legalize the evidential aspects of digital watermarks in the context of copyright laws.
Keywords: Digital Watermarks, Software Copyright, Idea-Expression Dichotomy, Programming Blunders, Copyright Infringement, AFC, POSA
SALWARE: Salutary Hardware to design Trusted IC.
Fabless semiconductor industries are facing the rise of design costs of integrated circuits. This rise is link to the technology change and the complexity increasing. It follows that integrated circuits have become targets of counterfeiting and theft. The SALWARE project aims to study (theoretically and experimentally) salutary hardware design in order to fight against theft, illegal cloning and counterfeiting of integrated circuits. Salutary hardware means an embedded hardware system, hardly detectable / circumvented, inserted in an integrated circuit or a virtual component (Intellectual Property), used to provide intellectual property information (eg watermarking or hardware license) and / or to remotely activate the circuit or IP after manufacture and during use
Effect of lead oxide on concrete density for radiation shielding purposes
Selection of suitable shielding materials depends on the type, intensity and energy of
radiation source, as well as the shielding properties such as mechanical strength, economic
preparation and resistance to radiation damage. When compared to ordinary concrete, the addition
of some materials with various fractions in the composition of concrete has provided concrete forms
more efficient for gamma ray shielding. Concrete has proven to be an tremendous and adaptable
shielding material with a well-established linear attenuation coefficient for gamma rays and
neutrons. The objectives of this study is to determine the exact composition of concrete constituents
and its density. Concrete samples were prepared by mixing cement, water, aggregate and additive
with different composition and densities. Density was increases by decreasing the aggregates
percent and increasing the additives such as lead oxide. Sample will be compacting to forming a
solid material through pelleting and sintering process. Finally, it will undergo for radiation
attenuation test. It was found that, substitution of lead oxide by aggregate causes increasing in the
specific density and compressive strength of the concrete
- …