1,830 research outputs found
Improving random number generators by chaotic iterations. Application in data hiding
In this paper, a new pseudo-random number generator (PRNG) based on chaotic
iterations is proposed. This method also combines the digits of two XORshifts
PRNGs. The statistical properties of this new generator are improved: the
generated sequences can pass all the DieHARD statistical test suite. In
addition, this generator behaves chaotically, as defined by Devaney. This makes
our generator suitable for cryptographic applications. An illustration in the
field of data hiding is presented and the robustness of the obtained data
hiding algorithm against attacks is evaluated.Comment: 6 pages, 8 figures, In ICCASM 2010, Int. Conf. on Computer
Application and System Modeling, Taiyuan, China, pages ***--***, October 201
Establishing the digital chain of evidence in biometric systems
Traditionally, a chain of evidence or chain of custody refers to the chronological documentation, or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of evidence, physical or electronic. Whether in the criminal justice system, military applications, or natural disasters, ensuring the accuracy and integrity of such chains is of paramount importance. Intentional or unintentional alteration, tampering, or fabrication of digital evidence can lead to undesirable effects. We find despite the consequences at stake, historically, no unique protocol or standardized procedure exists for establishing such chains. Current practices rely on traditional paper trails and handwritten signatures as the foundation of chains of evidence.;Copying, fabricating or deleting electronic data is easier than ever and establishing equivalent digital chains of evidence has become both necessary and desirable. We propose to consider a chain of digital evidence as a multi-component validation problem. It ensures the security of access control, confidentiality, integrity, and non-repudiation of origin. Our framework, includes techniques from cryptography, keystroke analysis, digital watermarking, and hardware source identification. The work offers contributions to many of the fields used in the formation of the framework. Related to biometric watermarking, we provide a means for watermarking iris images without significantly impacting biometric performance. Specific to hardware fingerprinting, we establish the ability to verify the source of an image captured by biometric sensing devices such as fingerprint sensors and iris cameras. Related to keystroke dynamics, we establish that user stimulus familiarity is a driver of classification performance. Finally, example applications of the framework are demonstrated with data collected in crime scene investigations, people screening activities at port of entries, naval maritime interdiction operations, and mass fatality incident disaster responses
Securing Audio Watermarking System using Discrete Fourier Transform for Copyright Protection
The recent growth in pc networks, and a lot of specifically, the planet Wide internet, copyright protection of digital audio becomes a lot of and a lot of necessary. Digital audio watermarking has drawn in depth attention for copyright protection of audio information. A digital audio watermarking may be a method of embedding watermarks into audio signal to point out genuineness and possession. Our technique supported the embedding watermark into audio signal and extraction of watermark sequence. We tend to propose a brand new watermarking system victimization separate Fourier remodel (DFT) for audio copyright protection. The watermarks area unit embedded into the best outstanding peak of the magnitude spectrum of every non-overlapping frame. This watermarking system can provides robust lustiness against many styles of attacks like noise addition, cropping, re-sampling, re-quantization, and MP3 compression and achieves similarity values starting from thirteen sound unit to twenty sound unit. Additionally, planned systems attempting to realize SNR (signal-to-noise ratio) values starting from twenty sound unit to twenty-eight sound unit.
DOI: 10.17762/ijritcc2321-8169.15055
Watermarking for Neural Radiation Fields by Invertible Neural Network
To protect the copyright of the 3D scene represented by the neural radiation
field, the embedding and extraction of the neural radiation field watermark are
considered as a pair of inverse problems of image transformations. A scheme for
protecting the copyright of the neural radiation field is proposed using
invertible neural network watermarking, which utilizes watermarking techniques
for 2D images to achieve the protection of the 3D scene. The scheme embeds the
watermark in the training image of the neural radiation field through the
forward process in the invertible network and extracts the watermark from the
image rendered by the neural radiation field using the inverse process to
realize the copyright protection of both the neural radiation field and the 3D
scene. Since the rendering process of the neural radiation field can cause the
loss of watermark information, the scheme incorporates an image quality
enhancement module, which utilizes a neural network to recover the rendered
image and then extracts the watermark. The scheme embeds a watermark in each
training image to train the neural radiation field and enables the extraction
of watermark information from multiple viewpoints. Simulation experimental
results demonstrate the effectiveness of the method
Lipophilic stinging nettle extracts possess potent anti-inflammatory activity, are not cytotoxic and may be superior to traditional tinctures for treating inflammatory disorders.
Extracts of four plant portions (roots, stems, leaves and flowers) of Urtica dioica (the stinging nettle) were prepared using accelerated solvent extraction (ASE) involving water, hexanes, methanol and dichloromethane. The extracts were evaluated for their anti-inflammatory and cytotoxic activities in an NF-κB luciferase and MTT assay using macrophage immune (RAW264.7) cells. A standardized commercial ethanol extract of nettle leaves was also evaluated. The methanolic extract of the flowering portions displayed significant anti-inflammatory activity on par with a standard compound celastrol (1) but were moderately cytotoxic. Alternatively, the polar extracts (water, methanol, ethanol) of the roots, stems and leaves displayed moderate to weak anti-inflammatory activity, while the methanol and especially the water soluble extracts exhibited noticeable cytotoxicity. In contrast, the lipophilic dichloromethane extracts of the roots, stems and leaves exhibited potent anti-inflammatory effects greater than or equal to 1 with minimal cytotoxicity to RAW264.7 cells. Collectively these results suggest that using lipophilic extracts of stinging nettle may be more effective than traditional tinctures (water, methanol, ethanol) in clinical evaluations for the treatment of inflammatory disorders especially arthritis. A chemical investigation into the lipophilic extracts of stinging nettle to identify the bioactive compound(s) responsible for their observed anti-inflammatory activity is further warranted
- …