225 research outputs found

    A NOVEL JOINT PERCEPTUAL ENCRYPTION AND WATERMARKING SCHEME (JPEW) WITHIN JPEG FRAMEWORK

    Get PDF
    Due to the rapid growth in internet and multimedia technologies, many new commercial applications like video on demand (VOD), pay-per-view and real-time multimedia broadcast etc, have emerged. To ensure the integrity and confidentiality of the multimedia content, the content is usually watermarked and then encrypted or vice versa. If the multimedia content needs to be watermarked and encrypted at the same time, the watermarking function needs to be performed first followed by encryption function. Hence, if the watermark needs to be extracted then the multimedia data needs to be decrypted first followed by extraction of the watermark. This results in large computational overhead. The solution provided in the literature for this problem is by using what is called partial encryption, in which media data are partitioned into two parts - one to be watermarked and the other is encrypted. In addition, some multimedia applications i.e. video on demand (VOD), Pay-TV, pay-per-view etc, allow multimedia content preview which involves „perceptual‟ encryption wherein all or some selected part of the content is, perceptually speaking, distorted with an encryption key. Up till now no joint perceptual encryption and watermarking scheme has been proposed in the literature. In this thesis, a novel Joint Perceptual Encryption and Watermarking (JPEW) scheme is proposed that is integrated within JPEG standard. The design of JPEW involves the design and development of both perceptual encryption and watermarking schemes that are integrated in JPEG and feasible within the „partial‟ encryption framework. The perceptual encryption scheme exploits the energy distribution of AC components and DC components bitplanes of continuous-tone images and is carried out by selectively encrypting these AC coefficients and DC components bitplanes. The encryption itself is based on a chaos-based permutation reported in an earlier work. Similarly, in contrast to the traditional watermarking schemes, the proposed watermarking scheme makes use of DC component of the image and it is carried out by selectively substituting certain bitplanes of DC components with watermark bits. vi ii Apart from the aforesaid JPEW, additional perceptual encryption scheme, integrated in JPEG, has also been proposed. The scheme is outside of joint framework and implements perceptual encryption on region of interest (ROI) by scrambling the DCT blocks of the chosen ROI. The performances of both, perceptual encryption and watermarking schemes are evaluated and compared with Quantization Index modulation (QIM) based watermarking scheme and reversible Histogram Spreading (RHS) based perceptual encryption scheme. The results show that the proposed watermarking scheme is imperceptible and robust, and suitable for authentication. Similarly, the proposed perceptual encryption scheme outperforms the RHS based scheme in terms of number of operations required to achieve a given level of perceptual encryption and provides control over the amount of perceptual encryption. The overall security of the JPEW has also been evaluated. Additionally, the performance of proposed separate perceptual encryption scheme has been thoroughly evaluated in terms of security and compression efficiency. The scheme is found to be simpler in implementation, have insignificant effect on compression ratios and provide more options for the selection of control factor

    A NOVEL JOINT PERCEPTUAL ENCRYPTION AND WATERMARKING SCHEME (JPEW) WITHIN JPEG FRAMEWORK

    Get PDF
    Due to the rapid growth in internet and multimedia technologies, many new commercial applications like video on demand (VOD), pay-per-view and real-time multimedia broadcast etc, have emerged. To ensure the integrity and confidentiality of the multimedia content, the content is usually watermarked and then encrypted or vice versa. If the multimedia content needs to be watermarked and encrypted at the same time, the watermarking function needs to be performed first followed by encryption function. Hence, if the watermark needs to be extracted then the multimedia data needs to be decrypted first followed by extraction of the watermark. This results in large computational overhead. The solution provided in the literature for this problem is by using what is called partial encryption, in which media data are partitioned into two parts - one to be watermarked and the other is encrypted. In addition, some multimedia applications i.e. video on demand (VOD), Pay-TV, pay-per-view etc, allow multimedia content preview which involves „perceptual‟ encryption wherein all or some selected part of the content is, perceptually speaking, distorted with an encryption key. Up till now no joint perceptual encryption and watermarking scheme has been proposed in the literature. In this thesis, a novel Joint Perceptual Encryption and Watermarking (JPEW) scheme is proposed that is integrated within JPEG standard. The design of JPEW involves the design and development of both perceptual encryption and watermarking schemes that are integrated in JPEG and feasible within the „partial‟ encryption framework. The perceptual encryption scheme exploits the energy distribution of AC components and DC components bitplanes of continuous-tone images and is carried out by selectively encrypting these AC coefficients and DC components bitplanes. The encryption itself is based on a chaos-based permutation reported in an earlier work. Similarly, in contrast to the traditional watermarking schemes, the proposed watermarking scheme makes use of DC component of the image and it is carried out by selectively substituting certain bitplanes of DC components with watermark bits. vi ii Apart from the aforesaid JPEW, additional perceptual encryption scheme, integrated in JPEG, has also been proposed. The scheme is outside of joint framework and implements perceptual encryption on region of interest (ROI) by scrambling the DCT blocks of the chosen ROI. The performances of both, perceptual encryption and watermarking schemes are evaluated and compared with Quantization Index modulation (QIM) based watermarking scheme and reversible Histogram Spreading (RHS) based perceptual encryption scheme. The results show that the proposed watermarking scheme is imperceptible and robust, and suitable for authentication. Similarly, the proposed perceptual encryption scheme outperforms the RHS based scheme in terms of number of operations required to achieve a given level of perceptual encryption and provides control over the amount of perceptual encryption. The overall security of the JPEW has also been evaluated. Additionally, the performance of proposed separate perceptual encryption scheme has been thoroughly evaluated in terms of security and compression efficiency. The scheme is found to be simpler in implementation, have insignificant effect on compression ratios and provide more options for the selection of control factor

    Molecular Identification of Novel Genes Associated with Atherosclerosis

    Get PDF

    Audio watermarking using transformation techniques

    Get PDF
    Watermarking is a technique, which is used in protecting digital information like images, videos and audio as it provides copyrights and ownership. Audio watermarking is more challenging than image watermarking due to the dynamic supremacy of hearing capacity over the visual field. This thesis attempts to solve the quantization based audio watermarking technique based on both the Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). The underlying system involves the statistical characteristics of the signal. This study considers different wavelet filters and quantization techniques. A comparison is performed on diverge algorithms and audio signals to help examine the performance of the proposed method. The embedded watermark is a binary image and different encryption techniques such as Arnold Transform and Linear Feedback Shift Register (LFSR) are considered. The watermark is distributed uniformly in the areas of low frequencies i.e., high energy, which increases the robustness of the watermark. Further, spreading of watermark throughout the audio signal makes the technique robust against desynchronized attacks. Experimental results show that the signals generated by the proposed algorithm are inaudible and robust against signal processing techniques such as quantization, compression and resampling. We use Matlab (version 2009b) to implement the algorithms discussed in this thesis. Audio transformation techniques for compression in Linux (Ubuntu 9.10) are applied on the signal to simulate the attacks such as re-sampling, re-quantization, and mp3 compression; whereas, Matlab program for de-synchronized attacks like jittering and cropping. We envision that the proposed algorithm may work as a tool for securing intellectual properties of the musicians and audio distribution companies because of its high robustness and imperceptibility

    Tecnologias coerentes para redes ópticas flexíveis

    Get PDF
    Next-generation networks enable a broad range of innovative services with the best delivery by utilizing very dense wired/wireless networks. However, the development of future networks will require several breakthroughs in optical networks such as high-performance optical transceivers to support a very-high capacity optical network as well as optimization of the network concept, ensuring a dramatic reduction of the cost per bit. At the same time, all of the optical network segments (metro, access, long-haul) need new technology options to support high capacity, spectral efficiency and data-rate flexibility. Coherent detection offers an opportunity by providing very high sensitivity and supporting high spectral efficiency. Coherent technology can still be combined with polarization multiplexing. Despite the increased cost and complexity, the migration to dual-polarization coherent transceivers must be considered, as it enables to double the spectral efficiency. These dual-polarization systems require an additional digital signal processing (DSP) subsystem for polarization demultiplexing. This work seeks to provide and characterize cost-effective novel coherent transceivers for the development of new generation practical, flexible and high capacity transceivers for optical metro-access and data center interconnects. In this regard, different polarization demultiplexing (PolDemux) algorithms, as well as adaptive Stokes will be considered. Furthermore, low complexity and modulation format-agnostic DSP techniques based on adaptive Stokes PolDemux for flexible and customizable optical coherent systems will be proposed. On this subject, the performance of the adaptive Stokes algorithm in an ultra-dense wavelength division multiplexing (U-DWDM) system will be experimentally evaluated, in offline and real-time operations over a hybrid optical-wireless link. In addition, the efficiency of this PolDemux algorithm in a flexible optical metro link based on Nyquist pulse shaping U-DWDM system and hybrid optical signals will be assessed. Moreover, it is of great importance to find a transmission technology that enables to apply the Stokes PolDemux for long-haul transmission systems and data center interconnects. In this work, it is also proposed a solution based on the use of digital multi-subcarrier multiplexing, which improve the performance of long-haul optical systems, without increasing substantially, their complexity and cost.As redes de telecomunicações futuras permitirão uma ampla gama de serviços inovadores e com melhor desempenho. No entanto, o desenvolvimento das futuras redes implicará vários avanços nas redes de fibra ótica, como transcetores óticos de alto desempenho capazes de suportar ligações de muito elevada capacidade, e a otimização da estrutura da rede, permitindo uma redução drástica do custo por bit transportado. Simultaneamente, todos os segmentos de rede ótica (metropolitanas, acesso e longo alcance) necessitam de novas opções tecnológicas para suportar uma maior capacidade, maior eficiência espetral e flexibilidade. Neste contexto, a deteção coerente surge como uma oportunidade, fornecendo alta sensibilidade e elevada eficiência espetral. A tecnologia de deteção coerente pode ainda ser associada à multiplexação na polarização. Apesar de um potencial aumento ao nível do custo e da complexidade, a migração para transcetores coerentes de dupla polarização deve ser ponderada, pois permite duplicar a eficiência espetral. Esses sistemas de dupla polarização requerem um subsistema de processamento digital de sinal (DSP) adicional para desmultiplexagem da polarização. Este trabalho procura fornecer e caracterizar novos transcetores coerentes de baixo custo para o desenvolvimento de uma nova geração de transcetores mais práticos, flexíveis e de elevada capacidade, para interconexões óticas ao nível das futuras redes de acesso e metro. Assim, serão analisados diferentes algoritmos para a desmultiplexagem da polarização, incluindo uma abordagem adaptativa baseada no espaço de Stokes. Além disso, são propostas técnicas de DSP independentes do formato de modulação e de baixa complexidade baseadas na desmultiplexagem de Stokes adaptativa para sistemas óticos coerentes flexíveis. Neste contexto, o desempenho do algoritmo adaptativo de desmultiplexagem na polarização baseado no espaço de Stokes é avaliado experimentalmente num sistema U-DWDM, tanto em análises off-line como em tempo real, considerando um percurso ótico hibrido que combina um sistema de transmissão suportado por fibra e outro em espaço livre. Foi ainda analisada a eficiência do algoritmo de desmultiplexagem na polarização numa rede ótica de acesso flexível U-DWDM com formatação de pulso do tipo Nyquist. Neste trabalho foi ainda analisada a aplicação da técnica de desmultiplexagem na polarização baseada no espaço de Stokes para sistemas de longo alcance. Assim, foi proposta uma solução de aplicação baseada no uso da multiplexagem digital de múltiplas sub-portadoras, tendo-se demonstrado uma melhoria na eficiência do desempenho dos sistemas óticos de longo alcance, sem aumentar significativamente a respetiva complexidade e custo.Programa Doutoral em Engenharia Eletrotécnic

    Improved Time and Frequency Synchronization Algorithm for 802.11a Wireless Standard based on the SIGNAL Field

    Get PDF
    International audienceTime and frequency synchronization in the IEEE 802.11a OFDM (Orthogonal Frequency Division Multiplexing) wireless communication system is addressed in this paper. Usually synchronization algorithms rely only on training sequences specified by the standard. To enhance the synchronization between stations, we propose to extract known information by both the transmitter and the receiver at the IEEE 802.11a physical layer to be then exploited by the receiver in addition to the training sequences. Indeed the parts of the identified SIGNAL field are either known or predictable from the RtS (Request to Send) control frame when the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) mechanism is triggered jointly to bit-rate adaptation algorithms to the channel. Moreover the received RtS control frame allows the receiver to estimate the channel before time synchronization stage improving then the performance of the proposed synchronization algorithm. Simulation results show that the performance of the proposed synchronization algorithm is improved as compared to existing algorithms

    Virtual Runtime Application Partitions for Resource Management in Massively Parallel Architectures

    Get PDF
    This thesis presents a novel design paradigm, called Virtual Runtime Application Partitions (VRAP), to judiciously utilize the on-chip resources. As the dark silicon era approaches, where the power considerations will allow only a fraction chip to be powered on, judicious resource management will become a key consideration in future designs. Most of the works on resource management treat only the physical components (i.e. computation, communication, and memory blocks) as resources and manipulate the component to application mapping to optimize various parameters (e.g. energy efficiency). To further enhance the optimization potential, in addition to the physical resources we propose to manipulate abstract resources (i.e. voltage/frequency operating point, the fault-tolerance strength, the degree of parallelism, and the configuration architecture). The proposed framework (i.e. VRAP) encapsulates methods, algorithms, and hardware blocks to provide each application with the abstract resources tailored to its needs. To test the efficacy of this concept, we have developed three distinct self adaptive environments: (i) Private Operating Environment (POE), (ii) Private Reliability Environment (PRE), and (iii) Private Configuration Environment (PCE) that collectively ensure that each application meets its deadlines using minimal platform resources. In this work several novel architectural enhancements, algorithms and policies are presented to realize the virtual runtime application partitions efficiently. Considering the future design trends, we have chosen Coarse Grained Reconfigurable Architectures (CGRAs) and Network on Chips (NoCs) to test the feasibility of our approach. Specifically, we have chosen Dynamically Reconfigurable Resource Array (DRRA) and McNoC as the representative CGRA and NoC platforms. The proposed techniques are compared and evaluated using a variety of quantitative experiments. Synthesis and simulation results demonstrate VRAP significantly enhances the energy and power efficiency compared to state of the art.Siirretty Doriast
    corecore