201 research outputs found

    Comparison of Digital Watermarking Methods for an Id Authentication System

    Get PDF
    Current radio-frequency identification (RFID) card authentication systems are not secure enough to fight the latest and most novel hacking methods. Poor software implementations, outdated cryptography algorithms and faulty hardware are just some of the most common ways of exploiting these systems. Research in the field of image processing and cryptography suggests that an additional authentication layer based on digital watermarking could help improve the level of security of traditional RFID cards. Unfortunately, not all watermarking methods can be implemented in an embedded device, such as the one used for RFID card systems. The aim of this work is to provide a comparison among different digital watermarking techniques that can be used to add the extra security layer required by the basic RFID card authentication systems. In this work, two widely known methods proposed by Kang et al. in 2010 and 2003, were selected as the basis to create a comparison framework for their implementation in an embedded device. Important elements such as algorithm complexity and memory occupation were measured and analyzed in order to select the best candidate for an RFID card system. The method proposed by Kang et al. in 2010 represented the option with lowest algorithmic complexity and less memory footprint, indicating that this method is the most suitable for its implementation in an authentication system.Los métodos de autenticación basados en tarjetas con tecnología RFID (del inglés, radiofrequency identification) no son lo suficientemente seguros para contrarrestar las técnicas de hackeo más novedosas y actuales. Implementaciones deficientes, algoritmos de criptografía obsoletos y errores de hardware son solo algunas de las formas más comunes para vulnerar este tipo de sistemas. Investigaciones en el área de procesamiento digital de imágenes y criptografía sugieren que una capa adicional de autenticación basada en marcas de agua digitales podría ayudar a incrementar el nivel de seguridad de las tarjetas RFID tradicionales. Desafortunadamente, no todos los métodos de marca de agua digital pueden ser implementados en un sistema embebido como el usado en los sistemas de tarjetas RFID. El objetivo de este trabajo en proveer una comparación entre diversas técnicas de marcas de agua digital que pueden ser usadas para proveer una capa de seguridad extra a los sistemas de autenticación basados en RFID. En este trabajo, dos métodos ampliamente conocidos propuestos por Kang y Cols. en el 2010 y 2003, fueron seleccionados como base para crear un marco de comparación para su implementación en un sistema embebido. Elementos importantes como complejidad algorítmica y ocupación de memoria fueron medidos y analizados para elegir el mejor candidato para un sistema de tarjetas RFID. El método propuesto por Kang y Cols. en 2010 representó la opción con la complejidad algorítmica más baja y menor ocupación de memoria, con lo que indicó que este método es el más apto para su implementación en un sistema de autenticación como el deseado.Continental AutomotiveConsejo Nacional de Ciencia y Tecnologí

    A Robust Image Hashing Algorithm Resistant Against Geometrical Attacks

    Get PDF
    This paper proposes a robust image hashing method which is robust against common image processing attacks and geometric distortion attacks. In order to resist against geometric attacks, the log-polar mapping (LPM) and contourlet transform are employed to obtain the low frequency sub-band image. Then the sub-band image is divided into some non-overlapping blocks, and low and middle frequency coefficients are selected from each block after discrete cosine transform. The singular value decomposition (SVD) is applied in each block to obtain the first digit of the maximum singular value. Finally, the features are scrambled and quantized as the safe hash bits. Experimental results show that the algorithm is not only resistant against common image processing attacks and geometric distortion attacks, but also discriminative to content changes

    Robust Watermarking Method for Color Images using DCT Coefficients of Watermark

    Get PDF
    Digital technologies are playing a vital role in the present communication system. This paper presents a robust and secure watermarking method to protect the copyright information of multimedia objects. In the proposed method, Discrete Wavelet Transform and Discrete Cosine Transform are applied on the cover image and then Discrete Cosine Transform coefficients of watermark image are embedded into transformed cover image. The experimental result shows the performance evaluation of the proposed method by the quality metrics as PSNR for watermarked image and NC for extracted watermark image and we have compared the results with the existing transformation methods in frequency domain based on attacks

    Printed document integrity verification using barcode

    Get PDF
    Printed documents are still relevant in our daily life and information in it must be protected from threats and attacks such as forgery, falsification or unauthorized modification. Such threats make the document lose its integrity and authenticity. There are several techniques that have been proposed and used to ensure authenticity and originality of printed documents. But some of the techniques are not suitable for public use due to its complexity, hard to obtain special materials to secure the document and expensive. This paper discuss several techniques for printed document security such as watermarking and barcode as well as the usability of two dimensional barcode in document authentication and data compression with the barcode. A conceptual solution that are simple and efficient to secure the integrity and document sender's authenticity is proposed that uses two dimensional barcode to carry integrity and authenticity information in the document. The information stored in the barcode contains digital signature that provides sender's authenticity and hash value that can ensure the integrity of the printed document

    Digital Color Image Watermarking using DWT-DCT Coefficients in RGB Planes

    Get PDF
    Digital image watermarking is used to identify the authenticity and integrity and to show the identity of its owners. This paper presents a more secure method for copy right protection. In the proposed method, the color image is decomposed into 3 color channels Red, Green and Blue and then DWT and DCT are applied to B channel of the R, G and B channels. The colored Watermark image is decomposed into R, G, B channels and DCT is applied to all the channels separately. R, G, B channels of watermark image are embedded into mid frequency coefficients of B channel already selected. The performance of proposed algorithm is measured by using Mean Square Error, Peak Signal to Noise Ratio, Standardized Correlation and Normalized Correlation. A comparative study of proposed scheme with the existing methods which uses DWT-DCT transforms is carried here and results shown

    Robust Video Watermarking Algorithm based on DCT-SVD approach and Encryption

    Get PDF
    Sharing of digital media content over the internet is increasing everyday .Digital watermarking is a technique used to protect the intellectual property rights of multimedia content owners. In this paper, we propose a robust video watermarking scheme that utilizes Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) for embedding a watermark into video frames. The proposed method uses encryption to make the watermark more robust against malicious attacks. The encryption key is used to modify the watermark before it is embedded in the video frames. The modified watermark is then embedded in the DCT and SVD coefficients of the video frames. The experimental results show that the proposed method provides better robustness against various attacks such as compression, noise addition, and filtering, while maintaining good perceptual quality of the watermarked video. The proposed method also shows better resistance against geometric attacks such as cropping, rotation, and scaling. Overall, the proposed method provides an effective solution for protecting the intellectual property rights of multimedia content owners in video distribution and transmission scenarios

    VANGUARD: A Blockchain-Based Solution to Digital Piracy

    Get PDF
    Online pirates and Intellectual Property (IP) holders have been in perpetual war over various products like music, movies, software, etc. since the popularity of the Internet. It is estimated that the US entertainment industry loses approximately 29 billion USD every year for pirates. Online piracy has since gone from bad to worse as growing internet users and better broadband connections enable people to share large files freely over the internet. The objective of this research is to investigate the causes and enablers for online piracy in movie industry and to come up with an anti-pirating solution. The primary outcome of the study will consist of a dedicated blockchain based anti-piracy system, 2018;Vanguard2019;. This system will provide all-round piracy protection from a built-in streaming service to a component to actively look through the internet for pirated movies and torrents. This system will greatly deter the piracy of movies since the IP holders can ensure their IP rights through this system and quickly act against illegitimate distribution of their media
    corecore