389 research outputs found

    Applied public-key steganography

    No full text
    International audienceWe consider the problem of hiding information in a steganographic framework, i.e. embedding a binary message within an apparently innocuous content, in order to establish a `suspicion-free' digital communication channel. The adversary is passive as no intentional attack is foreseen. The only threat is that she discovers the presence of a hidden communication. The main goal of this article is to find if the calar Costa Scheme, a recently published embedding method exploiting side information at the encoder, is suitable for that framework. We justify its use assessing its security level with respect to the Cachin's criterion. We derive a public-key stegosystem following the ideas of R. Anderson and P. Petitcolas. This technique is eventually applied to PCM audio contents. Experimental performances are detailed in terms of bit-rate and Kullback-Leibler distance

    300 years of copyright: have we gone full circle? On the use of technology to address limitations in distributing public performance broadcast royalties.

    Get PDF
    This paper briefly examines the concept and rationale of Copyright at the time of its inception and considers whether current legislation and, more distinctly, the administration of some of the rights specified by Copyright legislation has created a situation whereby authors of works in the music industry are being adversely affected and even exploited by such schemes thereby completing the circle by returning many authors to the point which made Copyright legislation necessary. This paper also outlines the design and implementation of a completely automatic, open and transparent blind-detection digital audio watermarking system that will enable automatic monitoring and reporting of public performance of both digital and analogue radio and television transmissions using modern computer technology in order to generate accurate royalty distributions to ‘authors’ in order to administer their rights more equitably

    Open research issues on multi-models for complex technological systems

    Get PDF
    Abstract -We are going to report here about state of the art works on multi-models for complex technological systems both from the theoretical and practical point of view. A variety of algorithmic approaches (k-mean, dss, etc.) and applicative domains (wind farms, neurological diseases, etc.) are reported to illustrate the extension of the research area

    Information Fusion in Multibiometric Systems

    Get PDF

    Information Fusion in Multibiometric Systems

    Get PDF

    Research on digital image watermark encryption based on hyperchaos

    Get PDF
    The digital watermarking technique embeds meaningful information into one or more watermark images hidden in one image, in which it is known as a secret carrier. It is difficult for a hacker to extract or remove any hidden watermark from an image, and especially to crack so called digital watermark. The combination of digital watermarking technique and traditional image encryption technique is able to greatly improve anti-hacking capability, which suggests it is a good method for keeping the integrity of the original image. The research works contained in this thesis include: (1)A literature review the hyperchaotic watermarking technique is relatively more advantageous, and becomes the main subject in this programme. (2)The theoretical foundation of watermarking technologies, including the human visual system (HVS), the colour space transform, discrete wavelet transform (DWT), the main watermark embedding algorithms, and the mainstream methods for improving watermark robustness and for evaluating watermark embedding performance. (3) The devised hyperchaotic scrambling technique it has been applied to colour image watermark that helps to improve the image encryption and anti-cracking capabilities. The experiments in this research prove the robustness and some other advantages of the invented technique. This thesis focuses on combining the chaotic scrambling and wavelet watermark embedding to achieve a hyperchaotic digital watermark to encrypt digital products, with the human visual system (HVS) and other factors taken into account. This research is of significant importance and has industrial application value

    Robustness of data hiding in image the Fourier spectrum

    Get PDF
    The following paper presents the results of tests conducted by the author in the field of verification of influence of JPEG lossy compression on the robustness of data hiding methods used for the colour image which has been transformed to the frequency domain. The data have been embedded to the Fourier magnitude spectrum of the image. The possibility of decoding the hidden data with two embedding methods and various parameter values as well as diverse compression rates has also been examined. The paper also contains a short description of the discrete Fourier transform

    Thermal Fingerprinting—Multi-Dimensional Analysis of Computational Loads

    Get PDF
    Digital fingerprinting is used in several domains to identify and track variable activities and processes. In this paper, we propose a novel approach to categorize and recognize computational tasks based on thermal system information. The concept focuses on all kinds of data center environments to control required cooling capacity dynamically. The concept monitors basic thermal sensor data from each server and chassis entity. The respective, characteristic curves are merged with additional general system information, such as CPU load behavior, memory usage, and I/O characteristics. This results in two-dimensional thermal fingerprints, which are unique and achievable. The fingerprints are used as input for an adaptive, pre-active air-conditioning control system. This allows a precise estimation of the data center health status. First test cases and reference scenarios clarify a huge potential for energy savings without any negative aspects regarding health status or durability. In consequence, we provide a cost-efficient, light-weight, and flexible solution to optimize the energy-efficiency for a huge number of existing, conventional data center environments

    A GEOMETRICAL ROBUST IMAGE DATA HIDING SCHEME BASED ON CONTOURLET TRANSFORM

    Get PDF
    ABSTRACTIn this paper, we present a new approach for data hiding in digital images by using multiple embedded stages. The new scheme involves feature point detector that orient for a novel Contourlet transform-hiding algorithm. By this way,our model can withstand geometric, desynchronization attacks and other common attacks  with a high capacity. The resulting watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. Experimental results demonstrate that our proposed technique is robust to a wide range of attacks.Keywords. data hiding, geometrical attacks, watermarking Contourlet transform

    New Digital Audio Watermarking Algorithms for Copyright Protection

    Get PDF
    This thesis investigates the development of digital audio watermarking in addressing issues such as copyright protection. Over the past two decades, many digital watermarking algorithms have been developed, each with its own advantages and disadvantages. The main aim of this thesis was to develop a new watermarking algorithm within an existing Fast Fourier Transform framework. This resulted in the development of a Complex Spectrum Phase Evolution based watermarking algorithm. In this new implementation, the embedding positions were generated dynamically thereby rendering it more difficult for an attacker to remove, and watermark information was embedded by manipulation of the spectral components in the time domain thereby reducing any audible distortion. Further improvements were attained when the embedding criteria was based on bin location comparison instead of magnitude, thereby rendering it more robust against those attacks that interfere with the spectral magnitudes. However, it was discovered that this new audio watermarking algorithm has some disadvantages such as a relatively low capacity and a non-consistent robustness for different audio files. Therefore, a further aim of this thesis was to improve the algorithm from a different perspective. Improvements were investigated using an Singular Value Decomposition framework wherein a novel observation was discovered. Furthermore, a psychoacoustic model was incorporated to suppress any audible distortion. This resulted in a watermarking algorithm which achieved a higher capacity and a more consistent robustness. The overall result was that two new digital audio watermarking algorithms were developed which were complementary in their performance thereby opening more opportunities for further research
    corecore