38 research outputs found

    Electronic marking and identification techniques to discourage document copying

    Get PDF
    Modern computer networks make it possible to distribute documents quickly and economically by electronic means rather than by conventional paper means. However, the widespread adoption of electronic distribution of copyrighted material is currently impeded by the ease of illicit copying and dissemination. In this paper we propose techniques that discourage illicit distribution by embedding each document with a unique codeword. Our encoding techniques are indiscernible by readers, yet enable us to identify the sanctioned recipient of a document by examination of a recovered document. We propose three coding methods, describe one in detail, and present experimental results showing that our identification techniques are highly reliable, even after documents have been photocopied

    Information Technologies for Presentation of Bulgarian-Indian Cooperation in a Virtual Museum

    Get PDF
    We investigate digitalization and security of the Bulgarian and Indian cultural artifacts in multimedia archive. In the paper we describe project implementation and methods for intellectual property protection that are result of bilateral cultural and scientific cooperation between research-workers in India and Bulgaria

    Anonymous credit cards and their collusion analysis

    Get PDF
    Communications networks are traditionally used to bring information together. They can also be used to keep information apart in order to protect personal privacy. A cryptographic protocol specifies a process by which some information is transferred among some users and hidden from others. We show how to implement anonymous credit cards using simple cryptographic protocols. We pose, and solve, a collusion problem which determines whether it is possible for a subset of users to discover information that is designed to be hidden from them during or after execution of the anonymous credit card protocol

    Программная реализация метода текстовой стеганографии посредством изменения параметров контура символов

    Get PDF
    Описывается метод стеганографии, основанный на использовании параметров текста, в котором в качестве контейнера применяется документ формата .doc или .docx. Излагаются возможности использования стеганографического метода в электронных изданиях для осаждения тайной информации с целью защиты документов-контейнеров от несанкционированного копирования и распространения

    Защита текстовой информации с помощью добавления контура к символам текста

    Get PDF
    Описывается метод стеганографии, основанный на использовании параметров текста, в котором в качестве контейнера применяется документ формата .doc или .docx. При помощи указанного метода предлагается скрывать тайное сообщение в файлах различного формата. Новизна рассматриваемого метода заключается в размещении тайного сообщения в контейнерах с помощью определенных параметров настройки характеристики текста, такой как контур

    Review of Linguistic Text Steganographic Methods

    Get PDF
    Steganography is a method of concealing confidential data in a cover file such that attacker cannot predict about clandestine data. Steganography exploit cover message, for example content, picture, sound, video record and so forth to conceal a mystery or secret message. Text Steganography is one of a procedure to conceal the one kind (text) of content data inside same type of content messages. Linguistic steganography is the language based steganographic scheme which proposes more advanced methods to hide the secret messages in text. Initially linguistic text steganographic techniques are developed only for the English language. But now days different regional languages are also used to hide the information like Hindi. This paper reviews the different linguistic text steganographic methods of hindi and English language

    A study and some experimental work of digital image and video watermarking

    Get PDF
    The rapid growth of digitized media and the emergence of digital networks have created a pressing need for copyright protection and anonymous communications schemes. Digital watermarking (or data hiding in a more general term) is a kind of steganography technique by adding information into a digital data stream. Several most important watermarking schemes applied to multilevel and binary still images and digital videos were studied. They include schemes based on DCT (Discrete Cosine Transform), DWT (Discrete Wavelet Transform), and fractal transforms. The question whether these invisible watermarking techniques can resolve the issue of rightful ownership of intellectual properties was discussed. The watermarking schemes were further studied from malicious attack point of view, which is considered an effective way to advance the watermarking techniques. In particular, the StirMark robustness tests based on geometrical distortion were carried out. A binary watermarking scheme applied in the DCT domain is presented in this research project. The effect of the binarization procedure necessarily encountered in dealing with binary document images is found so strong that most of conventional embedding schemes fail in dealing with watermarking of binary document images. Some particular measures have to be taken. The initial simulation results indicate that the proposed technique is promising though further efforts need to be made

    Print-Scan Resilient Text Image Watermarking Based on Stroke Direction Modulation for Chinese Document Authentication

    Get PDF
    Print-scan resilient watermarking has emerged as an attractive way for document security. This paper proposes an stroke direction modulation technique for watermarking in Chinese text images. The watermark produced by the idea offers robustness to print-photocopy-scan, yet provides relatively high embedding capacity without losing the transparency. During the embedding phase, the angle of rotatable strokes are quantized to embed the bits. This requires several stages of preprocessing, including stroke generation, junction searching, rotatable stroke decision and character partition. Moreover, shuffling is applied to equalize the uneven embedding capacity. For the data detection, denoising and deskewing mechanisms are used to compensate for the distortions induced by hardcopy. Experimental results show that our technique attains high detection accuracy against distortions resulting from print-scan operations, good quality photocopies and benign attacks in accord with the future goal of soft authentication
    corecore