74 research outputs found
Recommended from our members
Combined robust and fragile watermarking algorithms for still images. Design and evaluation of combined blind discrete wavelet transform-based robust watermarking algorithms for copyright protection using mobile phone numbers and fragile watermarking algorithms for content authentication of digital still images using hash functions.
This thesis deals with copyright protection and content authentication for still images. New blind
transform domain block based algorithms using one-level and two-level Discrete Wavelet Transform
(DWT) were developed for copyright protection. The mobile number with international code is used as
the watermarking data. The robust algorithms used the Low-Low frequency coefficients of the DWT to
embed the watermarking information. The watermarking information is embedded in the green channel of
the RGB colour image and Y channel of the YCbCr images. The watermarking information is scrambled
by using a secret key to increase the security of the algorithms. Due to the small size of the watermarking
information comparing to the host image size, the embedding process is repeated several times which
resulted in increasing the robustness of the algorithms. Shuffling process is implemented during the multi
embedding process in order to avoid spatial correlation between the host image and the watermarking
information. The effects of using one-level and two-level of DWT on the robustness and image quality
have been studied. The Peak Signal to Noise Ratio (PSNR), the Structural Similarity Index Measure
(SSIM) and Normalized Correlation Coefficient (NCC) are used to evaluate the fidelity of the images.
Several grey and still colour images are used to test the new robust algorithms. The new algorithms
offered better results in the robustness against different attacks such as JPEG compression, scaling, salt
and pepper noise, Gaussian noise, filters and other image processing compared to DCT based algorithms.
The authenticity of the images were assessed by using a fragile watermarking algorithm by using hash
function (MD5) as watermarking information embedded in the spatial domain. The new algorithm
showed high sensitivity against any tampering on the watermarked images. The combined fragile and
robust watermarking caused minimal distortion to the images. The combined scheme achieved both the
copyright protection and content authentication
Modeling and Simulation in Engineering
The general aim of this book is to present selected chapters of the following types: chapters with more focus on modeling with some necessary simulation details and chapters with less focus on modeling but with more simulation details. This book contains eleven chapters divided into two sections: Modeling in Continuum Mechanics and Modeling in Electronics and Engineering. We hope our book entitled "Modeling and Simulation in Engineering - Selected Problems" will serve as a useful reference to students, scientists, and engineers
Study and Implementation of Watermarking Algorithms
Water Making is the process of embedding data called a watermark into a multimedia object such that watermark can be detected or extracted later to make an assertion about the object. The object may be an audio, image or video. A copy of a digital image is identical to the original. This has in many instances, led to the use of digital content with malicious intent. One way to protect multimedia data against illegal recording and retransmission is to embed a signal, called digital signature or copyright label or watermark that authenticates the owner of the data. Data hiding, schemes to embed secondary data in digital media, have made considerable progress in recent years and attracted attention from both academia and industry. Techniques have been proposed for a variety of applications, including ownership protection, authentication and access control. Imperceptibility, robustness against moderate processing such as compression, and the ability to hide many bits are the basic but rat..
Establishing the digital chain of evidence in biometric systems
Traditionally, a chain of evidence or chain of custody refers to the chronological documentation, or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of evidence, physical or electronic. Whether in the criminal justice system, military applications, or natural disasters, ensuring the accuracy and integrity of such chains is of paramount importance. Intentional or unintentional alteration, tampering, or fabrication of digital evidence can lead to undesirable effects. We find despite the consequences at stake, historically, no unique protocol or standardized procedure exists for establishing such chains. Current practices rely on traditional paper trails and handwritten signatures as the foundation of chains of evidence.;Copying, fabricating or deleting electronic data is easier than ever and establishing equivalent digital chains of evidence has become both necessary and desirable. We propose to consider a chain of digital evidence as a multi-component validation problem. It ensures the security of access control, confidentiality, integrity, and non-repudiation of origin. Our framework, includes techniques from cryptography, keystroke analysis, digital watermarking, and hardware source identification. The work offers contributions to many of the fields used in the formation of the framework. Related to biometric watermarking, we provide a means for watermarking iris images without significantly impacting biometric performance. Specific to hardware fingerprinting, we establish the ability to verify the source of an image captured by biometric sensing devices such as fingerprint sensors and iris cameras. Related to keystroke dynamics, we establish that user stimulus familiarity is a driver of classification performance. Finally, example applications of the framework are demonstrated with data collected in crime scene investigations, people screening activities at port of entries, naval maritime interdiction operations, and mass fatality incident disaster responses
- …