207 research outputs found
VLSI Watermark Implementations and Applications
This paper presents an up to date review of digital watermarking (WM) from a VLSI designer point of
view. The reader is introduced to basic principles and terms in the field of image watermarking. It goes through a
brief survey on WM theory, laying out common classification criterions and discussing important design
considerations and trade-offs. Elementary WM properties such as robustness, computational complexity and their
influence on image quality are discussed. Common attacks and testing benchmarks are also briefly mentioned. It
is shown that WM design must take the intended application into account. The difference between software and
hardware implementations is explained through the introduction of a general scheme of a WM system and two
examples from previous works. A versatile methodology to aid in a reliable and modular design process is
suggested. Relating to mixed-signal VLSI design and testing, the proposed methodology allows an efficient
development of a CMOS image sensor with WM capabilities
Smart Cameras with onboard Signcryption for Securing IoT Applications
Cameras are expected to become key sensor devices for various internet of things (IoT) applications. Since cameras often capture highly sensitive information, security is a major concern. Our approach towards data security for smart cameras is rooted on protecting the captured images by signcryption based on elliptic curve cryptography (ECC).
Signcryption achieves resource-efficiency by performing data signing and encryption in a single step. By running the signcryption on the sensing unit, we can relax some security assumptions for the camera host unit which typically runs a complex software stack. We introduce our system architecture motivated by a typical case study for camera-based IoT applications, evaluate security properties and present performance results of an ARM-based implementatio
Watermarking technique for wireless multimedia sensor networks: A state of the art
Wireless multimedia sensor networks (WMSNs) are an emerging type of sensor network which contain sensor nodes equipped with microphones, cameras, and other sensors that produce multimedia content. These networks have the potential to enable a large class of applications ranging from military to modern healthcare. Multimedia nodes are susceptible to various types of attack, such as cropping, compression, or even physical capture and sensor replacement. Hence, security becomes an important issue in WMSNs. However, given the fact that sensors are resource constrained, the traditional intensive security algorithms are not well suited for WMSNs. This makes the traditional security techniques, based on data encryption, not very suitable for WMSNs. Watermarking techniques are usually computationally lightweight and do not require much memory resources. These techniques are being considered as an attractive alternative to the traditional techniques, because of their light resource requirements. The objective of this paper is to present a critical analysis of the existing state-of-the-art watermarking algorithms developed for WMSNs
Copyright protection of scalar and multimedia sensor network data using digital watermarking
This thesis records the research on watermarking techniques to address the issue of copyright protection of the scalar data in WSNs and image data in WMSNs, in order to ensure that the proprietary information remains safe between the sensor nodes in both. The first objective is to develop LKR watermarking technique for the copyright protection of scalar data in WSNs. The second objective is to develop GPKR watermarking technique for copyright protection of image data in WMSN
Secure Communication in Wireless Multimedia Sensor Networks using Watermarking
Wireless multimedia sensor networks (WMSNs) are an emerging type of sensor networks which contain sensor nodes equipped with microphones, cameras, and other sensors that producing multimedia content. These networks have the potential to enable a large class of applications ranging from military to modern healthcare. Since in WMSNs information is multimedia by nature and it uses wireless link as mode of communication so this posse?s serious security threat to this network. Thereby, the security mechanisms to protect WMSNs communication have found importance lately. However given the fact that WMSN nodes are resources constrained, so the traditionally intensive security algorithm is not well suited for WMSNs. Hence in this research, we aim to a develop lightweight digital watermarking enabled techniques as a security approach to ensure secure wireless communication. Finally aim is to provide a secure communication framework for WMSNs by developing new
Recommended from our members
VLSI Architecture and FPGA Prototyping of a Secure Digital Camera for Biometric Application
This thesis presents a secure digital camera (SDC) that inserts biometric data into images found in forms of identification such as the newly proposed electronic passport. However, putting biometric data in passports makes the data vulnerable for theft, causing privacy related issues. An effective solution to combating unauthorized access such as skimming (obtaining data from the passport's owner who did not willingly submit the data) or eavesdropping (intercepting information as it moves from the chip to the reader) could be judicious use of watermarking and encryption at the source end of the biometric process in hardware like digital camera or scanners etc. To address such issues, a novel approach and its architecture in the framework of a digital camera, conceptualized as an SDC is presented. The SDC inserts biometric data into passport image with the aid of watermarking and encryption processes. The VLSI (very large scale integration) architecture of the functional units of the SDC such as watermarking and encryption unit is presented. The result of the hardware implementation of Rijndael advanced encryption standard (AES) and a discrete cosine transform (DCT) based visible and invisible watermarking algorithm is presented. The prototype chip can carry out simultaneous encryption and watermarking, which to our knowledge is the first of its kind. The encryption unit has a throughput of 500 Mbit/s and the visible and invisible watermarking unit has a max frequency of 96.31 MHz and 256 MHz respectively
Wireless Multimedia Sensor Networks Applications and Security Challenges
The emergence of low-cost and mature technologies in wireless communication, visual sensor devices, and digital signal processing facilitate of wireless multimedia sensor networks (WMSNs). Like sensor networks which respond to sensory information such as humidity and temperature, WMSN interconnects autonomous devices for capturing and processing video and audio sensory information. WMSNs will enable new applications such as multimedia surveillance, traffic enforcement and control systems, advanced health care delivery, structural health monitoring, and industrial process control. Due to WMSNs have some novel features which stem the fact that some of the sensor node will have video cameras and higher computation capabilities. Consequently, the WMSNs bring new security of challenges as well as new opportunities. This paper presents WMSNs application and security challenges
Multibiometric security in wireless communication systems
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and
WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition.
First is the enrolment phase by which the database of watermarked fingerprints with
memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel.
Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present oneâs fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user.
The following three steps then involve speaker recognition including the user
responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user.
In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint
image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and
sliding neighborhood) have been followed with further two steps for embedding, and
extracting the watermark into the enhanced fingerprint image utilising Discrete
Wavelet Transform (DWT).
In the speaker recognition stage, the limitations of this technique in wireless
communication have been addressed by sending voice feature (cepstral coefficients)
instead of raw sample. This scheme is to reap the advantages of reducing the
transmission time and dependency of the data on communication channel, together
with no loss of packet. Finally, the obtained results have verified the claims
CCTV Technology Handbook
This CCTV Technology Handbook provides emergency responders, law enforcement security managers, and other security specialists with a reference to aid in planning, designing, and purchasing a CCTV system. This handbook includes a description of the capabilities and limitations of CCTV components used in security applications
- âŠ