259 research outputs found
Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Communication channel established from a display to a device's camera is
known as visual channel, and it is helpful in securing key exchange protocol.
In this paper, we study how visual channel can be exploited by a network
terminal and mobile device to jointly verify information in an interactive
session, and how such information can be jointly presented in a user-friendly
manner, taking into account that the mobile device can only capture and display
a small region, and the user may only want to authenticate selective
regions-of-interests. Motivated by applications in Kiosk computing and
multi-factor authentication, we consider three security models: (1) the mobile
device is trusted, (2) at most one of the terminal or the mobile device is
dishonest, and (3) both the terminal and device are dishonest but they do not
collude or communicate. We give two protocols and investigate them under the
abovementioned models. We point out a form of replay attack that renders some
other straightforward implementations cumbersome to use. To enhance
user-friendliness, we propose a solution using visual cues embedded into the 2D
barcodes and incorporate the framework of "augmented reality" for easy
verifications through visual inspection. We give a proof-of-concept
implementation to show that our scheme is feasible in practice.Comment: 16 pages, 10 figure
Printed document integrity verification using barcode
Printed documents are still relevant in our daily life and information in it must be protected from threats and attacks such as forgery, falsification or unauthorized modification. Such threats make the document lose its integrity and authenticity. There are several techniques that have been proposed and used to ensure authenticity and originality of printed documents. But some of the techniques are not suitable for public use due to its complexity, hard to obtain special materials to secure the document and expensive. This paper discuss several techniques for printed document security such as watermarking and barcode as well as the usability of two dimensional barcode in document authentication and data compression with the barcode. A conceptual solution that are simple and efficient to secure the integrity and document sender's authenticity is proposed that uses two dimensional barcode to carry integrity and authenticity information in the document. The information stored in the barcode contains digital signature that provides sender's authenticity and hash value that can ensure the integrity of the printed document
Optimal Radiometric Calibration for Camera-Display Communication
We present a novel method for communicating between a camera and display by
embedding and recovering hidden and dynamic information within a displayed
image. A handheld camera pointed at the display can receive not only the
display image, but also the underlying message. These active scenes are
fundamentally different from traditional passive scenes like QR codes because
image formation is based on display emittance, not surface reflectance.
Detecting and decoding the message requires careful photometric modeling for
computational message recovery. Unlike standard watermarking and steganography
methods that lie outside the domain of computer vision, our message recovery
algorithm uses illumination to optically communicate hidden messages in real
world scenes. The key innovation of our approach is an algorithm that performs
simultaneous radiometric calibration and message recovery in one convex
optimization problem. By modeling the photometry of the system using a
camera-display transfer function (CDTF), we derive a physics-based kernel
function for support vector machine classification. We demonstrate that our
method of optimal online radiometric calibration (OORC) leads to an efficient
and robust algorithm for computational messaging between nine commercial
cameras and displays.Comment: 10 pages, Submitted to CVPR 201
Subjective and objective watermark detection using a novel approach: Bar-coded watermarking
Many digital watermarking algorithms are proposed in the literature. Broadly these watermarking algorithms can be classified into two main categories. The first category of algorithms uses a pseudo random Gaussian sequence (PRGS) watermark whereas the second category of algorithms uses a binary logo as a watermark. The main advantage of PRGS based watermarking scheme is its ability to detect the presence of watermark without manual intervention. However the main drawback is calculating reliable threshold value. In the similar manner the main advantage of binary logo watermark is that there is no need to calculate threshold value but requires manual intervention to detect the presence of watermark. The advantage and disadvantage of either approach is quite clear hence it would be a good idea to design a watermarking scheme which inherits the advantages from both these approaches. In this paper we present one such approach which is termed as bar-code watermarking. The proposed scheme offers objective as well as subjective detection. A PRGS sequence watermark is represented as a bar-code on a binary logo and embedded in the host image. Watermark detection can be either done subjectively or objectively
VALIDASI IJAZAH DENGAN MENGGUNAKAN WATERMARKING DAN QR CODE PADA FAKULTAS TEKNIK UNIS TANGERANG
Ijazah umumnya digunakan sebagai salah satu syarat untuk melamar pekerjaan disuatu perusahaan, syarat administrasi di perusahaan, melanjutkan ke jenjang pendidikan yang selanjutnya. Sebagai besar Universitas saat melakukan legalisir terhadap ijazah masih dengan cara memfotocopy ijazah kemudian dibubuhi tanda tangan dan stempel basah. Hal ini memberikan celah untuk memodifikasi ijazah tersebut. Saat ini pun banyak beredar ijazah palsu. Watermarking merupakan jenis turunan dari steganografi, menyisipkan gambar kedalam suatu citra, selanjutnya menggunakan QR Code untuk mempermudah dalam pencarian data, Kode QR kode dua dimensi (2D kode, kode matriks) simbol kode QR dapat ditangkap dengan pencitraan perangkat seperti kamera dan kemudian diproses secara digital. Teknik pengujian validasi sistem dalam penelitian ini dilakukan dengan pendekatan blackbox testing. Kualitas perangkat lunak yang nantinya akan dibuat dan diuji dengan menggunakan metode kuesioner. Dari hasil yang dilakukan diharapkan dapat minimalisir proses modifikasi ijazah dan mempermudah perusahaan yang berkerjasama dengan universitas untuk mengeditifikasi keabsyahan ijazah tersebut
QR Code Approach for Examination Process
Using the QR codes is one of the most intriguing ways of digitally connecting consumers to the internet via mobile phones since the mobile phones have become a basic necessity thing of everyone The detection of QR codes, a type of 2D barcode, as described in the literature consists merely in the determination of the boundaries of the symbol region in images obtained with the specific intent of highlighting the symbol .In order to improve the practical application property of the two-dimensional barcode Quick Response (QR) code, we investigate the coding and decoding process of the QR code image. The barcode is a real mechanism for data reads. Data can be stored, embedded and through the scanning device to show. The store of data which being read. In this paper, we present a methodology for creating QR code approach for virtual word examination process by using different techniques like SHA256, encoding, decoding, and Error correction.
DOI: 10.17762/ijritcc2321-8169.15024
Digital watermarking and novel security devices
EThOS - Electronic Theses Online ServiceGBUnited Kingdo
Print-Scan Resilient Text Image Watermarking Based on Stroke Direction Modulation for Chinese Document Authentication
Print-scan resilient watermarking has emerged as an attractive way for document security. This paper proposes an stroke direction modulation technique for watermarking in Chinese text images. The watermark produced by the idea offers robustness to print-photocopy-scan, yet provides relatively high embedding capacity without losing the transparency. During the embedding phase, the angle of rotatable strokes are quantized to embed the bits. This requires several stages of preprocessing, including stroke generation, junction searching, rotatable stroke decision and character partition. Moreover, shuffling is applied to equalize the uneven embedding capacity. For the data detection, denoising and deskewing mechanisms are used to compensate for the distortions induced by hardcopy. Experimental results show that our technique attains high detection accuracy against distortions resulting from print-scan operations, good quality photocopies and benign attacks in accord with the future goal of soft authentication
A Review on Combined Techniques of Cryptography and Steganography using Color QR code
In the internet eras, where security is main concern and access to any service is quite easy, the issue of cyber security aimed at protecting customer data and thus this leads to creation of such a safe environment where user can be ensured of safety and security of all fields which aftereffect the usage of cryptography and steganography has increased. Cryptography encrypts a message so it cannot be understood while the Steganography hides the message inside a cover medium so that it?s concealed. In this paper we use color QR (Quick Response) Codes which are 2-dimensional bar codes that encode data or text strings and color QR code for increase QR code capacity. They are able to encode the information in both vertical and horizontal direction, thus able to encode more information, for secret communication we combine the concepts of Cryptography and Steganography and color QR codes. We use Cryptography side for encrypting the message by a color QR code encoder and thus creating a color QR code, whereas steganography hides the color QR code inside a cover image, after the encryption process, the color QR code image which has the original data is watermarked over a cover image using Spatial domain (LSB) and transform domain (DCT& DWT). In reverse, De-Watermarking extracts and decrypts the color QR coded data image from the Stego- image to recover the original image
- …