365 research outputs found

    Penerapan Secret Sharing Scheme Pada Joint Ownership Watermarking Untuk Citra Digital

    Full text link
    Digital watermarking merupakan metode untuk menyisipkan suatu informasi, yangbiasanya disebut sebagai watermark, pada suatu data digital penampung. Masalah yangdihadapi pada metode digital watermarking saat ini adalah semua metode yang telah adahanya mampu menangani perlindungan hak cipta dari satu pemilik saja. Solusi yangkemudian ditawarkan untuk menangani masalah kepemilikan bersama suatu citra digitaladalah dengan menerapkan secret sharing scheme pada digital image watermarking.Makalah ini membahas tentang penerapan secret sharing scheme pada joint ownershipwatermarking yang meliputi protokol-protokol dan metode-metode untuk proses penyisipan(embedding) watermark serta protokol-protokol untuk proses pendeteksian kepemilikan(detection) watermark. Robustness watermark diuji dengan melakukan beberapa prosesmanipulasi terhadap citra digital yang telah mengandung watermark, kemudian dilakukanproses pendeteksian kepemilikan watermark terhadap citra digital tersebut. Hasil ujimenunjukkan, watermark cukup robust terhadap beberapa proses manipulasi citra digital,seperti Perubahan brightness, kontras, scaling, flipping, rotasi, printscreen, serta kompresiJPEG 2000. Namun watermark masih rentan terhadap proses cropping dan penyisipanwatermark ganda pada citra digital

    Data hiding techniques in steganography using fibonacci sequence and knight tour algorithm

    Get PDF
    The foremost priority in the information and communication technology era, is achieving an efficient and accurate steganography system for hiding information. The developed system of hiding the secret message must capable of not giving any clue to the adversaries about the hidden data. In this regard, enhancing the security and capacity by maintaining the Peak Signal-to-Noise Ratio (PSNR) of the steganography system is the main issue to be addressed. This study proposed an improved for embedding secret message into an image. This newly developed method is demonstrated to increase the security and capacity to resolve the existing problems. A binary text image is used to represent the secret message instead of normal text. Three stages implementations are used to select the pixel before random embedding to select block of (64 × 64) pixels, follows by the Knight Tour algorithm to select sub-block of (8 × 8) pixels, and finally by the random pixels selection. For secret embedding, Fibonacci sequence is implemented to decomposition pixel from 8 bitplane to 12 bitplane. The proposed method is distributed over the entire image to maintain high level of security against any kind of attack. Gray images from the standard dataset (USC-SIPI) including Lena, Peppers, Baboon, and Cameraman are implemented for benchmarking. The results show good PSNR value with high capacity and these findings verified the worthiness of the proposed method. High complexities of pixels distribution and replacement of bits will ensure better security and robust imperceptibility compared to the existing systems in the literature

    Authentication with Distortion Criteria

    Full text link
    In a variety of applications, there is a need to authenticate content that has experienced legitimate editing in addition to potential tampering attacks. We develop one formulation of this problem based on a strict notion of security, and characterize and interpret the associated information-theoretic performance limits. The results can be viewed as a natural generalization of classical approaches to traditional authentication. Additional insights into the structure of such systems and their behavior are obtained by further specializing the results to Bernoulli and Gaussian cases. The associated systems are shown to be substantially better in terms of performance and/or security than commonly advocated approaches based on data hiding and digital watermarking. Finally, the formulation is extended to obtain efficient layered authentication system constructions.Comment: 22 pages, 10 figure

    Secured Lossless Share Watermarking

    Get PDF
    Security has gained a lot of importance as information technology is widely used. The main issue in visual cryptography is quality of reconstructed image. This problem is overcome by using “Secured Lossless share Watermarking ”. In this method the quality of reconstructed image is higher and the security of share is high compare with conventional visual cryptographic scheme. The secret image is converted into. Each share is embedded to different carrier images. Invisible watermarking method is used for embedding carrier image and shares. For security, the invisible watermarked shares are then encrypted, AES modified encryption method is used. The encrypted shares are send to other participants. At the receiver end receiving the shares and decrypt the shares, then combining these shares together reveal the secret. The quality of rejoined shares and original secret shares are almost same. DOI: 10.17762/ijritcc2321-8169.15038
    corecore