1,830 research outputs found

    Improving random number generators by chaotic iterations. Application in data hiding

    Full text link
    In this paper, a new pseudo-random number generator (PRNG) based on chaotic iterations is proposed. This method also combines the digits of two XORshifts PRNGs. The statistical properties of this new generator are improved: the generated sequences can pass all the DieHARD statistical test suite. In addition, this generator behaves chaotically, as defined by Devaney. This makes our generator suitable for cryptographic applications. An illustration in the field of data hiding is presented and the robustness of the obtained data hiding algorithm against attacks is evaluated.Comment: 6 pages, 8 figures, In ICCASM 2010, Int. Conf. on Computer Application and System Modeling, Taiyuan, China, pages ***--***, October 201

    Establishing the digital chain of evidence in biometric systems

    Get PDF
    Traditionally, a chain of evidence or chain of custody refers to the chronological documentation, or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of evidence, physical or electronic. Whether in the criminal justice system, military applications, or natural disasters, ensuring the accuracy and integrity of such chains is of paramount importance. Intentional or unintentional alteration, tampering, or fabrication of digital evidence can lead to undesirable effects. We find despite the consequences at stake, historically, no unique protocol or standardized procedure exists for establishing such chains. Current practices rely on traditional paper trails and handwritten signatures as the foundation of chains of evidence.;Copying, fabricating or deleting electronic data is easier than ever and establishing equivalent digital chains of evidence has become both necessary and desirable. We propose to consider a chain of digital evidence as a multi-component validation problem. It ensures the security of access control, confidentiality, integrity, and non-repudiation of origin. Our framework, includes techniques from cryptography, keystroke analysis, digital watermarking, and hardware source identification. The work offers contributions to many of the fields used in the formation of the framework. Related to biometric watermarking, we provide a means for watermarking iris images without significantly impacting biometric performance. Specific to hardware fingerprinting, we establish the ability to verify the source of an image captured by biometric sensing devices such as fingerprint sensors and iris cameras. Related to keystroke dynamics, we establish that user stimulus familiarity is a driver of classification performance. Finally, example applications of the framework are demonstrated with data collected in crime scene investigations, people screening activities at port of entries, naval maritime interdiction operations, and mass fatality incident disaster responses

    Securing Audio Watermarking System using Discrete Fourier Transform for Copyright Protection

    Get PDF
    The recent growth in pc networks, and a lot of specifically, the planet Wide internet, copyright protection of digital audio becomes a lot of and a lot of necessary. Digital audio watermarking has drawn in depth attention for copyright protection of audio information. A digital audio watermarking may be a method of embedding watermarks into audio signal to point out genuineness and possession. Our technique supported the embedding watermark into audio signal and extraction of watermark sequence. We tend to propose a brand new watermarking system victimization separate Fourier remodel (DFT) for audio copyright protection. The watermarks area unit embedded into the best outstanding peak of the magnitude spectrum of every non-overlapping frame. This watermarking system can provides robust lustiness against many styles of attacks like noise addition, cropping, re-sampling, re-quantization, and MP3 compression and achieves similarity values starting from thirteen sound unit to twenty sound unit. Additionally, planned systems attempting to realize SNR (signal-to-noise ratio) values starting from twenty sound unit to twenty-eight sound unit. DOI: 10.17762/ijritcc2321-8169.15055

    Watermarking for Neural Radiation Fields by Invertible Neural Network

    Full text link
    To protect the copyright of the 3D scene represented by the neural radiation field, the embedding and extraction of the neural radiation field watermark are considered as a pair of inverse problems of image transformations. A scheme for protecting the copyright of the neural radiation field is proposed using invertible neural network watermarking, which utilizes watermarking techniques for 2D images to achieve the protection of the 3D scene. The scheme embeds the watermark in the training image of the neural radiation field through the forward process in the invertible network and extracts the watermark from the image rendered by the neural radiation field using the inverse process to realize the copyright protection of both the neural radiation field and the 3D scene. Since the rendering process of the neural radiation field can cause the loss of watermark information, the scheme incorporates an image quality enhancement module, which utilizes a neural network to recover the rendered image and then extracts the watermark. The scheme embeds a watermark in each training image to train the neural radiation field and enables the extraction of watermark information from multiple viewpoints. Simulation experimental results demonstrate the effectiveness of the method

    Lipophilic stinging nettle extracts possess potent anti-inflammatory activity, are not cytotoxic and may be superior to traditional tinctures for treating inflammatory disorders.

    Get PDF
    Extracts of four plant portions (roots, stems, leaves and flowers) of Urtica dioica (the stinging nettle) were prepared using accelerated solvent extraction (ASE) involving water, hexanes, methanol and dichloromethane. The extracts were evaluated for their anti-inflammatory and cytotoxic activities in an NF-κB luciferase and MTT assay using macrophage immune (RAW264.7) cells. A standardized commercial ethanol extract of nettle leaves was also evaluated. The methanolic extract of the flowering portions displayed significant anti-inflammatory activity on par with a standard compound celastrol (1) but were moderately cytotoxic. Alternatively, the polar extracts (water, methanol, ethanol) of the roots, stems and leaves displayed moderate to weak anti-inflammatory activity, while the methanol and especially the water soluble extracts exhibited noticeable cytotoxicity. In contrast, the lipophilic dichloromethane extracts of the roots, stems and leaves exhibited potent anti-inflammatory effects greater than or equal to 1 with minimal cytotoxicity to RAW264.7 cells. Collectively these results suggest that using lipophilic extracts of stinging nettle may be more effective than traditional tinctures (water, methanol, ethanol) in clinical evaluations for the treatment of inflammatory disorders especially arthritis. A chemical investigation into the lipophilic extracts of stinging nettle to identify the bioactive compound(s) responsible for their observed anti-inflammatory activity is further warranted
    corecore