171 research outputs found

    Copyright Protection for Surveillance System Multimedia Stream with Cellular Automata Watermarking

    Get PDF
    Intelligent Surveillance Systems are attracting extraordinary attention from research and industry. Security and privacy protection are critical issues for public acceptance of security camera networks. Existing approaches, however, only address isolated aspects without considering the integration with established security technologies and the underlying platform. Easy availability of internet, together with relatively inexpensive digital recording and storage peripherals has created an era where duplication, unauthorized use and misdistribution of digital content has become easier. The ease of availability made digital video popular over analog media like film or tape. At the same time it demands a sharp attention regarding the ownership issue. The ownership and integrity can easily be violated using different audio and video editing softwares. To prevent unauthorized use, misappropriation, misrepresentation; authentication of multimedia contents achieved a broad attention in recent days and to achieve secure copyright protection we embedded some information in audio and videos and that audio or video is called copyright protected. Digital watermarking is a technology to embed additional information into the host signal to ensure security and protection of multimedia data. The embedded information can’t be detected by human but some attacks and operations can tamper that information to breach protection. So in order to find a secure technique of copyright protection, we have analyzed different techniques. After having a good understanding of these techniques we have proposed a novel algorithm that generates results with high effectiveness, additionally we can use self-extracted watermark technique to increase the security and automate the process of watermarking. Forensic digital watermarking is a promising tool in the fight against piracy of copyrighted motion imagery content, but to be effective it must be (1) imperceptibly embedded in high-definition motion picture source, (2) reliably retrieved, even from degraded copies as might result from camcorder capture and subsequent very-low-bitrate compression and distribution on the Internet, and (3) secure against unauthorized removal. Audio and video watermarking enables the copyright protection with owner or customer authentication and the detection of media manipulations. The available watermarking technology concentrates on single media like audio or video. But the typical multimedia stream consists of both video and audio data. Our goal is to provide a solution with robust and fragile aspects to guarantee authentication and integrity by using watermarks in combination with content information. We show two solutions for the protection of audio and video data with a combined robust and fragile watermarking approach. The first solution is to insert a time code into the data: We embed a signal as a watermark to detect gaps or changes in the flow of time. The second solution is more complex: We use watermarks to embed information in each media about the content of the other media. In our paper we present the problem of copyright protection and integrity checks for combined video and audio data. Both the solutions depend upon cellular automata, cellular automata are a powerful computation model that provides a simple way to simulate and solve many difficult problems in different fields. The most widely known example of Cellular Automata is the Game-of-Life. Cellular automaton growth is controlled by predefined rule or programs .The rule describes how the cell will interact with its neighborhood. Once the automaton is started it will work on its own according to the rule specified.

    A review on medicinal properties of saffron toward major diseases

    Get PDF
    The stigma of Crocus sativus, known as saffron, is one of the most expensive spices in the world. The bioactive components in saffron, picrocrocin, crocin, and safranal, have demonstrated a wide range of uses and capabilities in the medical field. This review is focused on the potential therapeutic applications of saffron on diabetes mellitus (DM), antitumor, anticancer, anti-depressant, Alzheimer’s disease (AD), cardiovascular disease (CVD), erectile dysfunction and antibacterial effects

    The Most Common Characteristics of Fragile Video Watermarking: A Review

    Get PDF
    The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security &nbsp

    A Hybrid Digital Watermarking Approach Using Wavelets and LSB

    Get PDF
    The present paper proposed a novel approach called Wavelet based Least Significant Bit Watermarking (WLSBWM) for high authentication, security and copyright protection. Alphabet Pattern (AP) approach is used to generate shuffled image in the first stage and Pell’s Cat Map (PCM) is used for providing more security and strong protection from attacks. PCM applied on each 5×5 sub images. A wavelet concept is used to reduce the dimensionality of the image until it equals to the size of the watermark image. Discrete Cosign Transform is applied in the first stage; later N level Discrete Wavelet Transform (DWT) is applied for reducing up to the size of the watermark image. The water mark image is inserted in LHn Sub band of the wavelet image using LSB concept. Simulation results show that the proposed technique produces better PSNR and similarity measure. The experimental results indicate that the present approach is more reliable and secure efficient.The robustness of the proposed scheme is evaluated against various image-processing attacks

    A Chaotic IP Watermarking in Physical Layout Level Based on FPGA

    Get PDF
    A new chaotic map based IP (Intellectual Property) watermarking scheme at physical design level is presented. An encrypted watermark is embedded into the physical layout of a circuit by configuring LUT (Lookup Table) as specific functions when it is placed and routed onto the FPGA (Field-Programmable Gate Array). The main contribution is the use of multiple chaotic maps in the processes of watermark design and embedding, which efficiently improves the security of watermark. A hashed chaotic sequence is used to scramble the watermark. Secondly, two pseudo-random sequences are generated by using chaotic maps. One is used to determine unused LUT locations, and the other divides the watermark into groups. The watermark identifies original owner and is difficult to detect. This scheme was tested on a Xilinx Virtex XCV600-6bg432 FPGA. The experimental results show that our method has low impact on functionality, short path delay and high robustness in comparison with other methods

    Biometric Security Through Visual Encryption for Fog Edge Computing

    Get PDF
    Fog and mobile edge computing have gained considerable attention from the research and development community. The problems related to security and privacy of biometric content are simpler to solve through edge computing resulting in improved security and privacy of biometric and other critically private information. Zero-watermarking has been proposed as a solution to help protect the ownership of multimedia content that is easy to copy and distribute. Visual cryptography is another approach to secure data that is to be shared through generating multiple shares. This paper is concerned with developing a biometric security solution for face images, using visual cryptography and zero-watermarking, that does not adversely impact the visual quality of the image. The original face image is not modified through the zero-watermarking and visual encryption procedures and this in turn does not adversely impact the recognition rate

    Towards Optimal Copyright Protection Using Neural Networks Based Digital Image Watermarking

    Get PDF
    In the field of digital watermarking, digital image watermarking for copyright protection has attracted a lot of attention in the research community. Digital watermarking contains varies techniques for protecting the digital content. Among all those techniques,Discrete Wavelet Transform (DWT) provides higher image imperceptibility and robustness. Over the years, researchers have been designing watermarking techniques with robustness in mind, in order for the watermark to be resistant against any image processing techniques. Furthermore, the requirements of a good watermarking technique includes a tradeoff between robustness, image quality (imperceptibility) and capacity. In this paper, we have done an extensive literature review for the existing DWT techniques and those combined with other techniques such as Neural Networks. In addition to that, we have discuss the contribution of Neural Networks in copyright protection. Finally we reached our goal in which we identified the research gaps existed in the current watermarking schemes. So that, it will be easily to obtain an optimal techniques to make the watermark object robust to attacks while maintaining the imperceptibility to enhance the copyright protection

    Localization of Copy-Move Forgery in speech signals through watermarking using DCT-QIM

    Get PDF
    Digital speech copyright protection and forgery identification are the prevalent issues in our advancing digital world. In speech forgery, voiced part of the speech signal is copied and pasted to a specific location which alters the meaning of the speech signal. Watermarking can be used to safe guard the copyrights of the owner. To detect copy-move forgeries a transform domain watermarking method is proposed. In the proposed method, watermarking is achieved through Discrete Cosine Transform (DCT) and Quantization Index Modulation (QIM) rule. Hash bits are also inserted in watermarked voice segments to detect Copy-Move Forgery (CMF) in speech signals. Proposed method is evaluated on two databases and achieved good imperceptibility. It exhibits robustness in detecting the watermark and forgeries against signal processing attacks such as resample, low-pass filtering, jittering, compression and cropping. The proposed work contributes for forensics analysis in speech signals. This proposed work also compared with the some of the state-of-art methods
    corecore