259 research outputs found

    Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection

    Full text link
    Communication channel established from a display to a device's camera is known as visual channel, and it is helpful in securing key exchange protocol. In this paper, we study how visual channel can be exploited by a network terminal and mobile device to jointly verify information in an interactive session, and how such information can be jointly presented in a user-friendly manner, taking into account that the mobile device can only capture and display a small region, and the user may only want to authenticate selective regions-of-interests. Motivated by applications in Kiosk computing and multi-factor authentication, we consider three security models: (1) the mobile device is trusted, (2) at most one of the terminal or the mobile device is dishonest, and (3) both the terminal and device are dishonest but they do not collude or communicate. We give two protocols and investigate them under the abovementioned models. We point out a form of replay attack that renders some other straightforward implementations cumbersome to use. To enhance user-friendliness, we propose a solution using visual cues embedded into the 2D barcodes and incorporate the framework of "augmented reality" for easy verifications through visual inspection. We give a proof-of-concept implementation to show that our scheme is feasible in practice.Comment: 16 pages, 10 figure

    Printed document integrity verification using barcode

    Get PDF
    Printed documents are still relevant in our daily life and information in it must be protected from threats and attacks such as forgery, falsification or unauthorized modification. Such threats make the document lose its integrity and authenticity. There are several techniques that have been proposed and used to ensure authenticity and originality of printed documents. But some of the techniques are not suitable for public use due to its complexity, hard to obtain special materials to secure the document and expensive. This paper discuss several techniques for printed document security such as watermarking and barcode as well as the usability of two dimensional barcode in document authentication and data compression with the barcode. A conceptual solution that are simple and efficient to secure the integrity and document sender's authenticity is proposed that uses two dimensional barcode to carry integrity and authenticity information in the document. The information stored in the barcode contains digital signature that provides sender's authenticity and hash value that can ensure the integrity of the printed document

    Optimal Radiometric Calibration for Camera-Display Communication

    Full text link
    We present a novel method for communicating between a camera and display by embedding and recovering hidden and dynamic information within a displayed image. A handheld camera pointed at the display can receive not only the display image, but also the underlying message. These active scenes are fundamentally different from traditional passive scenes like QR codes because image formation is based on display emittance, not surface reflectance. Detecting and decoding the message requires careful photometric modeling for computational message recovery. Unlike standard watermarking and steganography methods that lie outside the domain of computer vision, our message recovery algorithm uses illumination to optically communicate hidden messages in real world scenes. The key innovation of our approach is an algorithm that performs simultaneous radiometric calibration and message recovery in one convex optimization problem. By modeling the photometry of the system using a camera-display transfer function (CDTF), we derive a physics-based kernel function for support vector machine classification. We demonstrate that our method of optimal online radiometric calibration (OORC) leads to an efficient and robust algorithm for computational messaging between nine commercial cameras and displays.Comment: 10 pages, Submitted to CVPR 201

    Subjective and objective watermark detection using a novel approach: Bar-coded watermarking

    Get PDF
    Many digital watermarking algorithms are proposed in the literature. Broadly these watermarking algorithms can be classified into two main categories. The first category of algorithms uses a pseudo random Gaussian sequence (PRGS) watermark whereas the second category of algorithms uses a binary logo as a watermark. The main advantage of PRGS based watermarking scheme is its ability to detect the presence of watermark without manual intervention. However the main drawback is calculating reliable threshold value. In the similar manner the main advantage of binary logo watermark is that there is no need to calculate threshold value but requires manual intervention to detect the presence of watermark. The advantage and disadvantage of either approach is quite clear hence it would be a good idea to design a watermarking scheme which inherits the advantages from both these approaches. In this paper we present one such approach which is termed as bar-code watermarking. The proposed scheme offers objective as well as subjective detection. A PRGS sequence watermark is represented as a bar-code on a binary logo and embedded in the host image. Watermark detection can be either done subjectively or objectively

    VALIDASI IJAZAH DENGAN MENGGUNAKAN WATERMARKING DAN QR CODE PADA FAKULTAS TEKNIK UNIS TANGERANG

    Get PDF
    Ijazah umumnya digunakan sebagai salah satu syarat untuk melamar pekerjaan disuatu perusahaan, syarat administrasi di perusahaan, melanjutkan ke jenjang pendidikan yang selanjutnya. Sebagai besar Universitas saat melakukan legalisir terhadap ijazah masih dengan cara memfotocopy ijazah kemudian dibubuhi tanda tangan dan stempel basah. Hal ini memberikan celah untuk memodifikasi ijazah tersebut. Saat ini pun banyak beredar ijazah palsu. Watermarking merupakan jenis turunan dari steganografi, menyisipkan gambar kedalam suatu citra, selanjutnya menggunakan QR Code untuk mempermudah dalam pencarian data, Kode QR kode dua dimensi (2D kode, kode matriks) simbol kode QR dapat ditangkap dengan pencitraan perangkat seperti kamera dan kemudian diproses secara digital. Teknik pengujian validasi sistem dalam penelitian ini dilakukan dengan pendekatan blackbox testing. Kualitas perangkat lunak yang nantinya akan dibuat dan diuji dengan menggunakan metode kuesioner. Dari hasil yang dilakukan diharapkan dapat minimalisir proses modifikasi ijazah dan mempermudah perusahaan  yang berkerjasama dengan universitas untuk mengeditifikasi keabsyahan ijazah tersebut

    QR Code Approach for Examination Process

    Get PDF
    Using the QR codes is one of the most intriguing ways of digitally connecting consumers to the internet via mobile phones since the mobile phones have become a basic necessity thing of everyone The detection of QR codes, a type of 2D barcode, as described in the literature consists merely in the determination of the boundaries of the symbol region in images obtained with the specific intent of highlighting the symbol .In order to improve the practical application property of the two-dimensional barcode Quick Response (QR) code, we investigate the coding and decoding process of the QR code image. The barcode is a real mechanism for data reads. Data can be stored, embedded and through the scanning device to show. The store of data which being read. In this paper, we present a methodology for creating QR code approach for virtual word examination process by using different techniques like SHA256, encoding, decoding, and Error correction. DOI: 10.17762/ijritcc2321-8169.15024

    Digital watermarking and novel security devices

    Get PDF
    EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Print-Scan Resilient Text Image Watermarking Based on Stroke Direction Modulation for Chinese Document Authentication

    Get PDF
    Print-scan resilient watermarking has emerged as an attractive way for document security. This paper proposes an stroke direction modulation technique for watermarking in Chinese text images. The watermark produced by the idea offers robustness to print-photocopy-scan, yet provides relatively high embedding capacity without losing the transparency. During the embedding phase, the angle of rotatable strokes are quantized to embed the bits. This requires several stages of preprocessing, including stroke generation, junction searching, rotatable stroke decision and character partition. Moreover, shuffling is applied to equalize the uneven embedding capacity. For the data detection, denoising and deskewing mechanisms are used to compensate for the distortions induced by hardcopy. Experimental results show that our technique attains high detection accuracy against distortions resulting from print-scan operations, good quality photocopies and benign attacks in accord with the future goal of soft authentication

    A Review on Combined Techniques of Cryptography and Steganography using Color QR code

    Get PDF
    In the internet eras, where security is main concern and access to any service is quite easy, the issue of cyber security aimed at protecting customer data and thus this leads to creation of such a safe environment where user can be ensured of safety and security of all fields which aftereffect the usage of cryptography and steganography has increased. Cryptography encrypts a message so it cannot be understood while the Steganography hides the message inside a cover medium so that it?s concealed. In this paper we use color QR (Quick Response) Codes which are 2-dimensional bar codes that encode data or text strings and color QR code for increase QR code capacity. They are able to encode the information in both vertical and horizontal direction, thus able to encode more information, for secret communication we combine the concepts of Cryptography and Steganography and color QR codes. We use Cryptography side for encrypting the message by a color QR code encoder and thus creating a color QR code, whereas steganography hides the color QR code inside a cover image, after the encryption process, the color QR code image which has the original data is watermarked over a cover image using Spatial domain (LSB) and transform domain (DCT& DWT). In reverse, De-Watermarking extracts and decrypts the color QR coded data image from the Stego- image to recover the original image
    corecore