64 research outputs found
A New Video authentication Template Based on Bubble random Sampling
The rapid growth of digital video distribution has highlighted new important issues in digital rights management, as well as in other important applications such as video authentication. Digital watermarking offers a promising solution against piracy and it is therefore a very active area of research. However, robustness to video manipulations, either malicious or not, is a demanding task because there are many different types of possible attacks that can be envisioned. Among these, geometric and temporal distortions play the major roles. The countermeasures against these specific attacks are still an open challenge. In this paper we propose the use of a video authentication template based on bubble random sampling. The authentication template is introduced in order to ensure temporal synchronization
and to prevent content tampering. The simulation results are encouraging and this approach is therefore worth further development efforts
Generation and Detection of Watermarks Derived from Chaotic Functions
A digital watermark is a visible, or preferably invisible, identification code that is permanently embedded in digital media, to prove owner authentication thereby providing a level of document protection. In this paper, we review several approaches for the generation of watermarks using chaotic functions, and in particular, the logistic chaotic function. Using this function, in conjunction with seed management, it is to generate chaotic sequences that may be used to create highpass or lowpass digital watermarks.A slight change in the initial conditions will quickly lead to a significant change in the subsequent states of the system, and thus will generate substantially different watermarks. This technique has been shown to offer an added security advantage over tha more traditionally generated watermarks created from pseudorandom sequences, in that only the function seed needs to be stored. It also has the advantage that , through examination of the theoretical properties of the function, it is possible to choose seeds that lead to robust, lowpass watermarks. We review various detection techniques including correlation and statistical methods, and present an analysis of the impact of noise present in a model optical detector. The logistic function presented in this paper is ill defined for certain seed values and has not been fully investigated for the purpose of watermark generation. We consider the impact of the theoretical properties of the logistic function for several chaos-based watermark generation techniques, in particular, their highpass and low pass properties, which when embedded in digital media, are suitable for correlation and statistical based detection methods
Using Design Science to Build a Watermark System for Cloud Rightful Ownership Protection
Cloud computing opportunities have presented service options for users that are both economical and flexible to use requirements. However, the risk analysis for the user identifies vulnerabilities for intellectual property ownership and vulnerabilities for the identification of rightful property owners when cloud services are used. It is common for image owners to embed watermarks and other security mechanisms into their property so that the rightful ownership may be identified. In this paper we present a design that overcomes many of the current limitations in cloud watermarking uses; and propose a schema that places responsibility on the cloud provider to have a robust information protection program. Such a design solution lays out an information security architecture that enhances utility for cloud services and gives better options for users to securely place properties in the cloud. The Design Science methodology is used to build the artefact and answer the research question: How can rightful ownership be protected in the Cloud
Improved content based watermarking for images
Due to improvements in imaging technologies and the ease with which digital content can be created and manipulated, there is need for the copyright protection of digital content. It is also essential to have techniques for authentication of the content as well as the owner. To this end, this thesis proposes a robust and transparent scheme of watermarking that exploits the human visual systems’ sensitivity to frequency, along with local image characteristics obtained from the spatial domain, improving upon the content based image watermarking scheme of Kay and Izquierdo. We implement changes in this algorithm without much distortion to the image, while making it possible to extract the watermark by use of correlation. The underlying idea is generating a visual mask based on the human visual systems’ perception of image content. This mask is used to embed a decimal sequence, while keeping its amplitude below the distortion sensitivity of the image pixel. We consider texture, luminance, corner and the edge information in the image to generate a mask that makes the addition of the watermark less perceptible to the human eye. The operation of embedding and extraction of the watermark is done in the frequency domain thereby providing robustness against common frequency-based attacks including image compression and filtering. We use decimal sequences for watermarking instead of pseudo random sequences, providing us with a greater flexibility in the choice of sequence. Weighted Peak Signal to Noise Ratio is used to evaluate the perceptual change between the original and the watermarked image
Data wiping tool: ByteEditor Technique
This Wiping Tool is an anti-forensic tool that is
built to wipe data permanently from laptop’s storage. This tool
is capable to ensure the data from being recovered with any
recovery tools. The objective of building this wiping tool is to
maintain the confidentiality and integrity of the data from
unauthorized access. People tend to delete the file in normal
way, however, the file face the risk of being recovered. Hence,
the integrity and confidentiality of the deleted file cannot be
protected. Through wiping tools, the files are overwritten with
random strings to make the files no longer readable. Thus, the
integrity and the confidentiality of the file can be protected.
Regarding wiping tools, nowadays, lots of wiping tools face issue
such as data breach because the wiping tools are unable to delete
the data permanently from the devices. This situation might
affect their main function and a threat to their users. Hence, a
new wiping tool is developed to overcome the problem. A new
wiping tool named Data Wiping tool is applying two wiping
techniques. The first technique is Randomized Data while the
next one is enhancing wiping technique, known as ByteEditor.
ByteEditor is a combination of two different techniques, byte
editing and byte deletion. With the implementation of Object�Oriented methodology, this wiping tool is built. This
methodology consists of analyzing, designing, implementation
and testing. The tool is analyzed and compared with other
wiping tools before the designing of the tool start. Once the
designing is done, implementation phase take place. The code of
the tool is created using Visual Studio 2010 with C# language
and being tested their functionality to ensure the developed tool
meet the objectives of the project. This tool is believed able to
contribute to the development of wiping tools and able to solve
problems related to other wiping tools
A Survey on ChatGPT: AI-Generated Contents, Challenges, and Solutions
With the widespread use of large artificial intelligence (AI) models such as
ChatGPT, AI-generated content (AIGC) has garnered increasing attention and is
leading a paradigm shift in content creation and knowledge representation. AIGC
uses generative large AI algorithms to assist or replace humans in creating
massive, high-quality, and human-like content at a faster pace and lower cost,
based on user-provided prompts. Despite the recent significant progress in
AIGC, security, privacy, ethical, and legal challenges still need to be
addressed. This paper presents an in-depth survey of working principles,
security and privacy threats, state-of-the-art solutions, and future challenges
of the AIGC paradigm. Specifically, we first explore the enabling technologies,
general architecture of AIGC, and discuss its working modes and key
characteristics. Then, we investigate the taxonomy of security and privacy
threats to AIGC and highlight the ethical and societal implications of GPT and
AIGC technologies. Furthermore, we review the state-of-the-art AIGC
watermarking approaches for regulatable AIGC paradigms regarding the AIGC model
and its produced content. Finally, we identify future challenges and open
research directions related to AIGC.Comment: 20 pages, 6 figures, 4 table
Comparative evaluation of video watermarking techniques in the uncompressed domain
Thesis (MScEng)--Stellenbosch University, 2012.ENGLISH ABSTRACT: Electronic watermarking is a method whereby information can be imperceptibly
embedded into electronic media, while ideally being robust against common signal
manipulations and intentional attacks to remove the embedded watermark. This
study evaluates the characteristics of uncompressed video watermarking techniques
in terms of visual characteristics, computational complexity and robustness against
attacks and signal manipulations.
The foundations of video watermarking are reviewed, followed by a survey of
existing video watermarking techniques. Representative techniques from different
watermarking categories are identified, implemented and evaluated.
Existing image quality metrics are reviewed and extended to improve their performance
when comparing these video watermarking techniques. A new metric for
the evaluation of inter frame flicker in video sequences is then developed.
A technique for possibly improving the robustness of the implemented discrete
Fourier transform technique against rotation is then proposed. It is also shown that
it is possible to reduce the computational complexity of watermarking techniques
without affecting the quality of the original content, through a modified watermark
embedding method.
Possible future studies are then recommended with regards to further improving
watermarking techniques against rotation.AFRIKAANSE OPSOMMING: ’n Elektroniese watermerk is ’n metode waardeur inligting onmerkbaar in elektroniese
media vasgelĂŞ kan word, met die doel dat dit bestand is teen algemene manipulasies
en doelbewuste pogings om die watermerk te verwyder. In hierdie navorsing
word die eienskappe van onsaamgeperste video watermerktegnieke ondersoek
in terme van visuele eienskappe, berekeningskompleksiteit en weerstandigheid teen
aanslae en seinmanipulasies.
Die onderbou van video watermerktegnieke word bestudeer, gevolg deur ’n oorsig
van reedsbestaande watermerktegnieke. Verteenwoordigende tegnieke vanuit verskillende
watermerkkategorieë word geïdentifiseer, geïmplementeer en geëvalueer.
Bestaande metodes vir die evaluering van beeldkwaliteite word bestudeer en uitgebrei
om die werkverrigting van die tegnieke te verbeter, spesifiek vir die vergelyking
van watermerktegnieke. ’n Nuwe stelsel vir die evaluering van tussenraampie flikkering
in video’s word ook ontwikkel.
’n Tegniek vir die moontlike verbetering van die geïmplementeerde diskrete Fourier
transform tegniek word voorgestel om die tegniek se bestandheid teen rotasie
te verbeter. Daar word ook aangetoon dat dit moontlik is om die berekeningskompleksiteit
van watermerktegnieke te verminder, sonder om die kwaliteit van die
oorspronklike inhoud te beïnvloed, deur die gebruik van ’n verbeterde watermerkvasleggingsmetode.
Laastens word aanbevelings vir verdere navorsing aangaande die verbetering van
watermerktegnieke teen rotasie gemaak
- …