545 research outputs found

    Enhancing Handbag Design Through Anti-Counterfeit Technology

    Get PDF
    In recent years, the presence of counterfeit goods has become a $600 billion global industry, encompassing markets ranging from designer luxury goods to pharmaceuticals. This paper identifies the threat that this increased counterfeit presence poses on the high-end handbag market. Increased counterfeit quality is significantly contributing to the deception of consumers when attempting to purchase authentic designer handbags. In response to this increased threat, numerous designer brands have begun to adopt anti-counterfeit technologies with both track-and-trace and authentication agendas, to enhance the security of their products against the counterfeit industry. Several variations of anti-counterfeit solutions exist, and this paper specifically examines the effectiveness of the security and authentication factors of hologram, digital watermark, and Radio Frequency Identification solutions within a designer handbag application. After careful analysis of the various anti-counterfeit solutions available in the contemporary market, this paper concludes that overt and covert combination technologies with a two-factor-authentication approach are the most effective in terms of security and authentication capabilities. In conjunction with an anti-counterfeit efficacy analysis, this paper proposes an anti-counterfeit technology adaptation with the aim of elevating both security and design aesthetic. Design that favors functionality has recently gained traction in the fashion industry and incorporating anti-counterfeit technology into handbag design in a visually enhancing manner is the ultimate method of furthering both form and function in a technologically advanced world.https://scholarscompass.vcu.edu/uresposters/1282/thumbnail.jp

    A Survey of Digital Watermarking Techniques and its Applications

    Full text link
    Digital media is the need of a people now a day as the alternate of paper media.As the technology grown up digital media required protection while transferring through internet or others mediums.Watermarking techniques have been developed to fulfill this requirement.This paper aims to provide a detailed survey of all watermarking techniques specially focuses on image watermarking types and its applications in today world.Comment: 4 Page

    Comparison of Digital Watermarking Methods for an Id Authentication System

    Get PDF
    Current radio-frequency identification (RFID) card authentication systems are not secure enough to fight the latest and most novel hacking methods. Poor software implementations, outdated cryptography algorithms and faulty hardware are just some of the most common ways of exploiting these systems. Research in the field of image processing and cryptography suggests that an additional authentication layer based on digital watermarking could help improve the level of security of traditional RFID cards. Unfortunately, not all watermarking methods can be implemented in an embedded device, such as the one used for RFID card systems. The aim of this work is to provide a comparison among different digital watermarking techniques that can be used to add the extra security layer required by the basic RFID card authentication systems. In this work, two widely known methods proposed by Kang et al. in 2010 and 2003, were selected as the basis to create a comparison framework for their implementation in an embedded device. Important elements such as algorithm complexity and memory occupation were measured and analyzed in order to select the best candidate for an RFID card system. The method proposed by Kang et al. in 2010 represented the option with lowest algorithmic complexity and less memory footprint, indicating that this method is the most suitable for its implementation in an authentication system.Los métodos de autenticación basados en tarjetas con tecnología RFID (del inglés, radiofrequency identification) no son lo suficientemente seguros para contrarrestar las técnicas de hackeo mås novedosas y actuales. Implementaciones deficientes, algoritmos de criptografía obsoletos y errores de hardware son solo algunas de las formas mås comunes para vulnerar este tipo de sistemas. Investigaciones en el årea de procesamiento digital de imågenes y criptografía sugieren que una capa adicional de autenticación basada en marcas de agua digitales podría ayudar a incrementar el nivel de seguridad de las tarjetas RFID tradicionales. Desafortunadamente, no todos los métodos de marca de agua digital pueden ser implementados en un sistema embebido como el usado en los sistemas de tarjetas RFID. El objetivo de este trabajo en proveer una comparación entre diversas técnicas de marcas de agua digital que pueden ser usadas para proveer una capa de seguridad extra a los sistemas de autenticación basados en RFID. En este trabajo, dos métodos ampliamente conocidos propuestos por Kang y Cols. en el 2010 y 2003, fueron seleccionados como base para crear un marco de comparación para su implementación en un sistema embebido. Elementos importantes como complejidad algorítmica y ocupación de memoria fueron medidos y analizados para elegir el mejor candidato para un sistema de tarjetas RFID. El método propuesto por Kang y Cols. en 2010 representó la opción con la complejidad algorítmica mås baja y menor ocupación de memoria, con lo que indicó que este método es el mås apto para su implementación en un sistema de autenticación como el deseado.Continental AutomotiveConsejo Nacional de Ciencia y Tecnologí

    An Architecture for Biometric Electronic Identification Document System Based on Blockchain †

    Get PDF
    This paper proposes an architecture for biometric electronic identification document (e-ID) system based on Blockchain for citizens identity verification in transactions corresponding to the notary, registration, tax declaration and payment, basic health services and registration of economic activities, among others. To validate the user authentication, a biometric e-ID system is used to avoid spoofing and related attacks. Also, to validate the document a digital certificate is used with the corresponding public and private key for each citizen by using a user’s PIN. The proposed transaction validation process was implemented on a Blockchain system in order to record and verify the transactions made by all citizens registered in the electoral census, which guarantees security, integrity, scalability, traceability, and no-ambiguity. Additionally, a Blockchain network architecture is presented in a distributed and decentralized way including all the nodes of the network, database and government entities such as national register and notary offices. The results of the application of a new consensus algorithm to our Blockchain network are also presented showing mining time, memory and CPU usage when the number of transactions scales up

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims

    Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

    Get PDF
    The protection and enforcement of intellectual property rights for digital media has become an important issue in many countries of the world. There is increase in the popularity and accessibility of the Internet to record, edit, replicate and broadcast multimedia content which has necessitated a high demand to protect digital information against illegal uses, manipulations and distributions. Digital watermarking technique which is the process used to embed proprietary information into multimedia digital signal provides a robust solution to this problem. This paper reviews different aspects and techniques of digital watermarking for protecting digital contents. It also explores different application areas of digital watermarking such as copyright protection, broadcast monitoring, integrity protection etc.Facultad de InformĂĄtic

    Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

    Get PDF
    The protection and enforcement of intellectual property rights for digital media has become an important issue in many countries of the world. There is increase in the popularity and accessibility of the Internet to record, edit, replicate and broadcast multimedia content which has necessitated a high demand to protect digital information against illegal uses, manipulations and distributions. Digital watermarking technique which is the process used to embed proprietary information into multimedia digital signal provides a robust solution to this problem. This paper reviews different aspects and techniques of digital watermarking for protecting digital contents. It also explores different application areas of digital watermarking such as copyright protection, broadcast monitoring, integrity protection etc.Facultad de InformĂĄtic

    A Study in Image Watermarking Schemes using Neural Networks

    Full text link
    The digital watermarking technique, an effective way to protect image, has become the research focus on neural network. The purpose of this paper is to provide a brief study on broad theories and discuss the different types of neural networks for image watermarking. Most of the research interest image watermarking based on neural network in discrete wavelet transform or discrete cosine transform. Generally image watermarking based on neural network to solve the problem on to reduce the error, improve the rate of the learning, achieves goods imperceptibility and robustness. It will be useful for researches to implement effective image watermarking by using neural network

    An Efficient Digital Image Watermarking Based on DCT and Advanced Image Data Embedding Method

    Get PDF
    Digital image enhancement and digital content or data image secure using DCT and advanced image data embedding method (AIDEM). AIDEM improved robustness based on particle shifting concept is reproduced secure image data and manipulated there’s a robust would like for a digital image copyright mechanism to be placed in secure image data. There’s a necessity for authentication of the content because of the owner. It’s become more accessible for malicious parties to create scalable copies of proprietary content with any compensation to the content owner. Advanced Watermarking is being viewed as a potential goal to the current downside. Astounding watermarking plans are arranged assaults on the watermarked picture are twisted and proposed to give insurance of proprietorship freedoms, information treating, and information uprightness. These methods guarantee unique information recuperation from watermarked information, while irreversible watermarking plans safeguard proprietorship freedoms. This attribute of reversible watermarking has arisen as an applicant answer for the assurance of proprietorship freedoms of information, unfortunate to alterations, for example, clinical information, genetic information, Visa, and financial balance information. These attacks are also intentional or unintentional. The attacks are classified as geometric attacks. This research presents a comprehensive and old method of these techniques that are developed and their effectiveness. Digital watermarking was developed to supply copyright protection and owners’ authentication. Digital image watermarking may be a methodology for embedding some information into digital image sequences, like text image, image data, during this research analysis on image watermarking and attacks on watermarking process time image data, classification of watermarking and applications. We aim to secure image data using advanced image data embedding method (AIDEM) improved robustness based particle shifting concept is reproduced secure image data. To develop compelling digital image watermarking methodology using mat lab tool and reliable and robust
    • 

    corecore