367 research outputs found

    A Survey on Biometrics based Digital Image Watermarking Techniques and Applications

    Get PDF
    The improvements in Internet technologies and growing demands on online multimedia businesses have made digital copyrighting as a major challenge for businesses that are associated with online content distribution via diverse business models including pay-per-view subscription trading etc Copyright protection and the evidence for rightful ownership are major issues associated with the distribution of any digital images Digital watermarking is a probable solution for digital content owners that offer security to the digital content In recent years digital watermarking plays a vital role in providing the apposite solution and numerous researches have been carried out In this paper an extensive review of the prevailing literature related to the Bio- watermarking is presented together with classification by utilizing an assortment of techniques In addition a terse introduction about the Digital Watermarking is presented to get acquainted with the vital information on the subject of Digital Watermarkin

    AES (Advanced Encryption Standard) and RSA (Rivest–Shamir–Adleman) Encryption on Digital Signature Document: A Literature Review

    Get PDF
    Distributed digital documents, it can utilize cryptographic methods to provide confidentiality, data integrity, authentication and non repudiation services. Watermark in this case serves as authentic proof of ownership of the data or document, and its existence should not damage or change the contents or counter of digital data or digital documents. The RSA and AES encryption methods in digital signatures are appropriate to be taken as a reliable method. But a unique biometric key idea emerged, one of which was used to authenticate users

    Establishing the digital chain of evidence in biometric systems

    Get PDF
    Traditionally, a chain of evidence or chain of custody refers to the chronological documentation, or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of evidence, physical or electronic. Whether in the criminal justice system, military applications, or natural disasters, ensuring the accuracy and integrity of such chains is of paramount importance. Intentional or unintentional alteration, tampering, or fabrication of digital evidence can lead to undesirable effects. We find despite the consequences at stake, historically, no unique protocol or standardized procedure exists for establishing such chains. Current practices rely on traditional paper trails and handwritten signatures as the foundation of chains of evidence.;Copying, fabricating or deleting electronic data is easier than ever and establishing equivalent digital chains of evidence has become both necessary and desirable. We propose to consider a chain of digital evidence as a multi-component validation problem. It ensures the security of access control, confidentiality, integrity, and non-repudiation of origin. Our framework, includes techniques from cryptography, keystroke analysis, digital watermarking, and hardware source identification. The work offers contributions to many of the fields used in the formation of the framework. Related to biometric watermarking, we provide a means for watermarking iris images without significantly impacting biometric performance. Specific to hardware fingerprinting, we establish the ability to verify the source of an image captured by biometric sensing devices such as fingerprint sensors and iris cameras. Related to keystroke dynamics, we establish that user stimulus familiarity is a driver of classification performance. Finally, example applications of the framework are demonstrated with data collected in crime scene investigations, people screening activities at port of entries, naval maritime interdiction operations, and mass fatality incident disaster responses

    Security of Biometric Data Using Compressed Watermarking Technique

    Get PDF
    This paper has focus on biometric data security over open communication channel of biometric system. Here biometric data is encoded using cs theory and wavelet based embedding technique. The biometric data is convert into encoded sparse measurements which is generating using SVD, random seed and uniform quantization process. Then these encoded sparse measurements are embedding into the host color biometric data using wavelet based watermarking technique. This proposed technique has explored dimension reduction and computational security provided by compressive sensing. This proposed technique has also helps to compressed and to send secret data over noisy communication channel of biometric system against various attacks. The proposed technique provides more security compare to existed technique in literature due to CS theory. The novelty of proposed technique is that, watermark iris image information is compressed and encoded using CS theory and uniform quantization.DOI:http://dx.doi.org/10.11591/ijece.v4i5.664

    Application Analyses of Visual Information Processing Techniques in E-Commerce

    Get PDF
    Digital visual information plays a very important role in E-Commerce (EC). Their usage brings forth many novel research topics for digital visual information processing skills and software. Some issues of application analysis of image/video information processing techniques suitable for EC are described in the paper. Visual design for goods or services trading, image retrieval based on visual contents, applications of images to the trade safety on the Internet, 3-dimensional display, virtual reality for goods browsing, inquiry based on image and video contents, trade safety and copyright protection of digital works based on digital watermarking are mainly discussed which are considered as the technological solutions that could enhance EC

    Information Forensics and Security: A quarter-century-long journey

    Get PDF
    Information forensics and security (IFS) is an active R&D area whose goal is to ensure that people use devices, data, and intellectual properties for authorized purposes and to facilitate the gathering of solid evidence to hold perpetrators accountable. For over a quarter century, since the 1990s, the IFS research area has grown tremendously to address the societal needs of the digital information era. The IEEE Signal Processing Society (SPS) has emerged as an important hub and leader in this area, and this article celebrates some landmark technical contributions. In particular, we highlight the major technological advances by the research community in some selected focus areas in the field during the past 25 years and present future trends

    Design a system for an approved video copyright over cloud based on biometric iris and random walk generator using watermark technique

    Get PDF
    Copyright is a tool for preventing anyone forged to copy an electronic work from another person and claim that electronic work is referred to him. Since the identity of the person is always determined by his name and biometrics, there is a concern to handle this information, to preserve the copyright. In this paper, a new idea for copyright technology is used to prove video copyright, by using blind watermarking technique, the ownership information is hidden inside video frames using linear congruential generator (LCG) for adapted the locations of vector features extracted from the name and biometric image of the owner instead of hidden the watermark in the Pseudo Noise sequences or any other feature extraction technique. When providing the watermarked vector, a statistical operation is used to increase randomization state for the amplifier factors of LCG function. LCG provides random positions where the owner's information is stored inside the video. The proposed method is not difficult to execute and can present an adaptable imperceptibility and robustness performance. The output results show the robustness of this approach based on the average PSNR of frames for the embedded in 50 frames is around 47.5 dB while the watermark remains undetectable. MSSIM values with range (0.83 to 0.99)
    • …
    corecore