52 research outputs found
Data wiping tool: ByteEditor Technique
This Wiping Tool is an anti-forensic tool that is
built to wipe data permanently from laptop’s storage. This tool
is capable to ensure the data from being recovered with any
recovery tools. The objective of building this wiping tool is to
maintain the confidentiality and integrity of the data from
unauthorized access. People tend to delete the file in normal
way, however, the file face the risk of being recovered. Hence,
the integrity and confidentiality of the deleted file cannot be
protected. Through wiping tools, the files are overwritten with
random strings to make the files no longer readable. Thus, the
integrity and the confidentiality of the file can be protected.
Regarding wiping tools, nowadays, lots of wiping tools face issue
such as data breach because the wiping tools are unable to delete
the data permanently from the devices. This situation might
affect their main function and a threat to their users. Hence, a
new wiping tool is developed to overcome the problem. A new
wiping tool named Data Wiping tool is applying two wiping
techniques. The first technique is Randomized Data while the
next one is enhancing wiping technique, known as ByteEditor.
ByteEditor is a combination of two different techniques, byte
editing and byte deletion. With the implementation of Object�Oriented methodology, this wiping tool is built. This
methodology consists of analyzing, designing, implementation
and testing. The tool is analyzed and compared with other
wiping tools before the designing of the tool start. Once the
designing is done, implementation phase take place. The code of
the tool is created using Visual Studio 2010 with C# language
and being tested their functionality to ensure the developed tool
meet the objectives of the project. This tool is believed able to
contribute to the development of wiping tools and able to solve
problems related to other wiping tools
Research on digital image watermark encryption based on hyperchaos
The digital watermarking technique embeds meaningful information into one or more watermark images hidden in one image, in which it is known as a secret carrier. It is difficult for a hacker to extract or remove any hidden watermark from an image, and especially to crack so called digital watermark. The combination of digital watermarking technique and traditional image encryption technique is able to greatly improve anti-hacking capability, which suggests it is a good method for keeping the integrity of the original image. The research works contained in this thesis include: (1)A literature review the hyperchaotic watermarking technique is relatively more advantageous, and becomes the main subject in this programme. (2)The theoretical foundation of watermarking technologies, including the human visual system (HVS), the colour space transform, discrete wavelet transform (DWT), the main watermark embedding algorithms, and the mainstream methods for improving watermark robustness and for evaluating watermark embedding performance. (3) The devised hyperchaotic scrambling technique it has been applied to colour image watermark that helps to improve the image encryption and anti-cracking capabilities. The experiments in this research prove the robustness and some other advantages of the invented technique. This thesis focuses on combining the chaotic scrambling and wavelet watermark embedding to achieve a hyperchaotic digital watermark to encrypt digital products, with the human visual system (HVS) and other factors taken into account. This research is of significant importance and has industrial application value
Robust and imperceptible digital video watermarking techniques.
Pengeluaran bahan video dan imej yang banyak dalam sistem berperantaraan komputer di Internet telah memberikan cabaran besar dalam bidang perlindungan hak milik. Banyak cetakan yang tidak sah telah dibuat dan usaha untuk membuktikan perlindungan hak milik terpelihara terhadap bahan media berkenaan adalah satu tugas yang mencabar.
The massive production of image and video materials on the Computer Mediated Systems (CMS) over the Internet has created a challenge in the area of copyright protection. Numerous illegal copies have been made and efforts on proving the owner copyright of those media are indeed a challenging task
Recommended from our members
Combined robust and fragile watermarking algorithms for still images. Design and evaluation of combined blind discrete wavelet transform-based robust watermarking algorithms for copyright protection using mobile phone numbers and fragile watermarking algorithms for content authentication of digital still images using hash functions.
This thesis deals with copyright protection and content authentication for still images. New blind
transform domain block based algorithms using one-level and two-level Discrete Wavelet Transform
(DWT) were developed for copyright protection. The mobile number with international code is used as
the watermarking data. The robust algorithms used the Low-Low frequency coefficients of the DWT to
embed the watermarking information. The watermarking information is embedded in the green channel of
the RGB colour image and Y channel of the YCbCr images. The watermarking information is scrambled
by using a secret key to increase the security of the algorithms. Due to the small size of the watermarking
information comparing to the host image size, the embedding process is repeated several times which
resulted in increasing the robustness of the algorithms. Shuffling process is implemented during the multi
embedding process in order to avoid spatial correlation between the host image and the watermarking
information. The effects of using one-level and two-level of DWT on the robustness and image quality
have been studied. The Peak Signal to Noise Ratio (PSNR), the Structural Similarity Index Measure
(SSIM) and Normalized Correlation Coefficient (NCC) are used to evaluate the fidelity of the images.
Several grey and still colour images are used to test the new robust algorithms. The new algorithms
offered better results in the robustness against different attacks such as JPEG compression, scaling, salt
and pepper noise, Gaussian noise, filters and other image processing compared to DCT based algorithms.
The authenticity of the images were assessed by using a fragile watermarking algorithm by using hash
function (MD5) as watermarking information embedded in the spatial domain. The new algorithm
showed high sensitivity against any tampering on the watermarked images. The combined fragile and
robust watermarking caused minimal distortion to the images. The combined scheme achieved both the
copyright protection and content authentication
Audio watermarking using transformation techniques
Watermarking is a technique, which is used in protecting digital information like images, videos and audio as it provides copyrights and ownership. Audio watermarking is more challenging than image watermarking due to the dynamic supremacy of hearing capacity over the visual field. This thesis attempts to solve the quantization based audio watermarking technique based on both the Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). The underlying system involves the statistical characteristics of the signal. This study considers different wavelet filters and quantization techniques. A comparison is performed on diverge algorithms and audio signals to help examine the performance of the proposed method. The embedded watermark is a binary image and different encryption techniques such as Arnold Transform and Linear Feedback Shift Register (LFSR) are considered. The watermark is distributed uniformly in the areas of low frequencies i.e., high energy, which increases the robustness of the watermark. Further, spreading of watermark throughout the audio signal makes the technique robust against desynchronized attacks. Experimental results show that the signals generated by the proposed algorithm are inaudible and robust against signal processing techniques such as quantization, compression and resampling. We use Matlab (version 2009b) to implement the algorithms discussed in this thesis. Audio transformation techniques for compression in Linux (Ubuntu 9.10) are applied on the signal to simulate the attacks such as re-sampling, re-quantization, and mp3 compression; whereas, Matlab program for de-synchronized attacks like jittering and cropping. We envision that the proposed algorithm may work as a tool for securing intellectual properties of the musicians and audio distribution companies because of its high robustness and imperceptibility
A robust audio watermarking scheme based on reduced singular value decomposition and distortion removal
This paper presents a blind audio watermarking algorithm based on the reduced singular value decomposition(RSVD).
A new observation on one of the resulting unitary matrices is uncovered. The proposed scheme manipulates coefficients based on this observation in order to embed watermark bits. To preserve audio fidelity a threshold-
based distortion control technique is applied and this is further supplemented by distortion suppression utilizing psychoacoustic principles. Test results on real music
signals show that this watermarking scheme is in the range of imperceptibility for human hearing, is accurate and also robust against MP3 compression at various bit
rates as well as other selected attacks. The data payload is comparatively high compared to existing audio watermarking schemes
- …