11 research outputs found
Study and Implementation of Watermarking Algorithms
Water Making is the process of embedding data called a watermark into a multimedia object such that watermark can be detected or extracted later to make an assertion about the object. The object may be an audio, image or video. A copy of a digital image is identical to the original. This has in many instances, led to the use of digital content with malicious intent. One way to protect multimedia data against illegal recording and retransmission is to embed a signal, called digital signature or copyright label or watermark that authenticates the owner of the data. Data hiding, schemes to embed secondary data in digital media, have made considerable progress in recent years and attracted attention from both academia and industry. Techniques have been proposed for a variety of applications, including ownership protection, authentication and access control. Imperceptibility, robustness against moderate processing such as compression, and the ability to hide many bits are the basic but rat..
Performance comparison of intrusion detection systems and application of machine learning to Snort system
This study investigates the performance of two open source intrusion detection systems (IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer networks. Snort and Suricata were installed on two different but identical computers and the performance was evaluated at 10 Gbps network speed. It was noted that Suricata could process a higher speed of network traffic than Snort with lower packet drop rate but it consumed higher computational resources. Snort had higher detection accuracy and was thus selected for further experiments. It was observed that the Snort triggered a high rate of false positive alarms. To solve this problem a Snort adaptive plug-in was developed. To select the best performing algorithm for Snort adaptive plug-in, an empirical study was carried out with different learning algorithms and Support Vector Machine (SVM) was selected. A hybrid version of SVM and Fuzzy logic produced a better detection accuracy. But the best result was achieved using an optimised SVM with firefly algorithm with FPR (false positive rate) as 8.6% and FNR (false negative rate) as 2.2%, which is a good result. The novelty of this work is the performance comparison of two IDSs at 10 Gbps and the application of hybrid and optimised machine learning algorithms to Snort
A Survey on Biometrics and Cancelable Biometrics Systems
Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a feature domain transformation where a distorted version of a biometric template is generated and matched in the transformed domain. This paper presents a review on the state-of-the-art and analysis of different existing methods of biometric based authentication system and cancelable biometric systems along with an elaborate focus on cancelable biometrics in order to show its advantages over the standard biometric systems through some generalized standards and guidelines acquired from the literature. We also proposed a highly secure method for cancelable biometrics using a non-invertible function based on Discrete Cosine Transformation (DCT) and Huffman encoding. We tested and evaluated the proposed novel method for 50 users and achieved good results
Optimisation of Tamper Localisation and Recovery Watermarking Techniques
Digital watermarking has found many applications in many fields, such as:
copyright tracking, media authentication, tamper localisation and recovery,
hardware control, and data hiding. The idea of digital watermarking is to embed
arbitrary data inside a multimedia cover without affecting the perceptibility of the
multimedia cover itself. The main advantage of using digital watermarking over
other techniques, such as signature based techniques, is that the watermark is
embedded into the multimedia cover itself and will not be removed even with the
format change.
Image watermarking techniques are categorised according to their robustness
against modification into: fragile, semi-fragile, and robust watermarking. In fragile
watermarking any change to the image will affect the watermark, this makes fragile
watermarking very useful in image authentication applications, as in medical and
forensic fields, where any tampering of the image is: detected, localised, and
possibly recovered. Fragile watermarking techniques are also characterised by a
higher capacity when compared to semi-fragile and robust watermarking. Semifragile
watermarking techniques resist some modifications, such as lossy
compression and low pass filtering. Semi-fragile watermarking can be used in
authentication and copyright validation applications whenever the amount of
embedded information is small and the expected modifications are not severe.
Robust watermarking techniques are supposed to withstand more severe
modifications, such as rotation and geometrical bending. Robust watermarking is
used in copyright validation applications, where copyright information in the image
must remains accessible even after severe modification.
This research focuses on the application of image watermarking in tamper
localisation and recovery and it aims to provide optimisation for some of its
aspects. The optimisation aims to produce watermarking techniques that enhance
one or more of the following aspects: consuming less payload, having better
recovery quality, recovering larger tampered area, requiring less calculations, and
being robust against the different counterfeiting attacks. Through the survey of the main existing techniques, it was found that most of them
are using two separate sets of data for the localisation and the recovery of the
tampered area, which is considered as a redundancy. The main focus in this
research is to investigate employing image filtering techniques in order to use only
one set of data for both purposes, leading to a reduced redundancy in the
watermark embedding and enhanced capacity. Four tamper localisation and
recovery techniques were proposed, three of them use one set of data for
localisation and recovery while the fourth one is designed to be optimised and
gives a better performance even though it uses separate sets of data for
localisation and recovery.
The four techniques were analysed and compared to two recent techniques in the
literature. The performance of the proposed techniques vary from one technique to
another. The fourth technique shows the best results regarding recovery quality
and Probability of False Acceptance (PFA) when compared to the other proposed
techniques and the two techniques in the literature, also, all proposed techniques
show better recovery quality when compared to the two techniques in the
literature
Applications of MATLAB in Science and Engineering
The book consists of 24 chapters illustrating a wide range of areas where MATLAB tools are applied. These areas include mathematics, physics, chemistry and chemical engineering, mechanical engineering, biological (molecular biology) and medical sciences, communication and control systems, digital signal, image and video processing, system modeling and simulation. Many interesting problems have been included throughout the book, and its contents will be beneficial for students and professionals in wide areas of interest
Anales del XIII Congreso Argentino de Ciencias de la Computación (CACIC)
Contenido:
Arquitecturas de computadoras
Sistemas embebidos
Arquitecturas orientadas a servicios (SOA)
Redes de comunicaciones
Redes heterogéneas
Redes de Avanzada
Redes inalámbricas
Redes móviles
Redes activas
Administración y monitoreo de redes y servicios
Calidad de Servicio (QoS, SLAs)
Seguridad informática y autenticación, privacidad
Infraestructura para firma digital y certificados digitales
Análisis y detección de vulnerabilidades
Sistemas operativos
Sistemas P2P
Middleware
Infraestructura para grid
Servicios de integración (Web Services o .Net)Red de Universidades con Carreras en Informática (RedUNCI