190 research outputs found

    Aplikasi Watermarking Citra Digital Pada Mobile Device Menggunakan J2ME

    Get PDF
    Skripsi ini membahas mengenai pembuatan aplikasi watermarkingdari sebuah citra pada mobile device yang mendukung fitur kamera. Watermarkingcitra digital merupakan salah satu jenis watermarking untuk melindungi kepemilikan (copyright) dari sebuah citra. Sedangkan Watermarking merupakan bagian dari ilmu kriptografi dengan metode menyisipkan sebuah informasi ke dalam media tertentu. Implementasi watermarking citra digital dalam skripsi ini meliputi penerapan penggunaannya pada mobile device untuk citra yang diambil dari kamera watermark. Sebuah perangkat lunak yang bernama Marza akan dibangun pada sebuah mobile device untuk mendukung implementasi dari watremarking citra digital. Aplikasi ini dikembangkan dengan menggunakan bahasa pemograman JAVA khusunya J2ME yang menyediakan berbagai interface untuk melakukan pengambilan citra melalui kamera mobile device. Aplikasi ini juga dapat menghitung lamanya waktu untuk proses penyisipan dan pendeteksian sebuah file citra. Penulis menggunakan PSNR untuk membandingkan hasil citra sebelum dan sesudah diwatermark. Hasil pengujian menunjukkan bahwa mobile device memiliki kemampuan untuk melakukan proses digital image wateramarking pada sebuah citra yang diambil dari fitur kameranya tanpa menurunkan kualitas dari citra tersebut. Selain itu, implementasi dari digital image watermarking pada mobile device ini memiliki keterbatasan dalam melakukan proses algoritma penyisipan watermark dan ekstrasi atau deteksi watermark dari citra yang dihasikannya dikarenakan keterbatasan melakukan komputasi dan kapasitas memori dari mobile devicetersebut

    Recent Trends in Communication Networks

    Get PDF
    In recent years there has been many developments in communication technology. This has greatly enhanced the computing power of small handheld resource-constrained mobile devices. Different generations of communication technology have evolved. This had led to new research for communication of large volumes of data in different transmission media and the design of different communication protocols. Another direction of research concerns the secure and error-free communication between the sender and receiver despite the risk of the presence of an eavesdropper. For the communication requirement of a huge amount of multimedia streaming data, a lot of research has been carried out in the design of proper overlay networks. The book addresses new research techniques that have evolved to handle these challenges

    Mobile Music Distribution: A Multichannel Approach

    Get PDF
    In contrast to what is happening in the Internet-based scenario, the music market in the mobile scenario is far from beingconsidered a large success. Several studies state that excessive downloading time and high cost are the main burdens.Motivated by the growth of social and mobile applications, in this paper we propose an approach that aims at reducing both the downloadingtime and the cost to get digital music when acquired in the mobile scenario. The proposed architecture exploits the usage ofpersonal communication technologies embedded in cellphones (e.g., Bluetooth and Wi-Fi) to couple the current distributionmodel (mainly based on 3G networks), so as to provide a multichannel distribution model where users are free to redistributedigitalmusic. The architecture includes a license-based securitymechanism that prevents unauthorized usage of digitalmusic, and makes use of an incentive mechanism to stimulate and reward the music distribution among customers. By analyzing pros and cons of the music distribution chain, results show that the proposed architecture might help in reducing both the downloading time and the cost to get digital music when acquired in the mobile scenario. Therefore, it might be helpful to the success of the mobile music scenario

    TechNews digests: Jan - Nov 2009

    Get PDF
    TechNews is a technology, news and analysis service aimed at anyone in the education sector keen to stay informed about technology developments, trends and issues. TechNews focuses on emerging technologies and other technology news. TechNews service : digests september 2004 till May 2010 Analysis pieces and News combined publish every 2 to 3 month

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims

    Authentication of Images

    Get PDF
    Proposing a technique which embeds personal mobile phone numbers along with IMEI number inside the image using invisible watermarking technique.B.S. (Bachelor of Science

    Educational Handheld Video: Examining Shot Composition, Graphic Design, And Their Impact On Learning

    Get PDF
    Formal features of video such as shot composition and graphic design can weigh heavily on the success or failure of educational videos. Many studies have assessed the proper use of these techniques given the psychological expectations that viewers have for video programming (Hawkins et al., 2002; Kenny, 2002; Lang, Zhou, Schwardtz, Bolls, & Potter, 2000; McCain, Chilberg, & Wakshlag, 1977; McCain & Repensky, 1972; Miller, 2005; Morris, 1984; Roe, 1998; Schmitt, Anderson, & Collins, 1999; Sherman & Etling, 1991; Tannenbaum & Fosdick, 1960; Wagner, 1953). This study examined formal features within the context of the newly emerging distribution method of viewing video productions on mobile handheld devices. Shot composition and graphic design were examined in the context of an educational video to measure whether or not they had any influence on user perceptions of learning and learning outcomes. The two formal features were modified for display on 24 inch screens and on 3.5 inch or smaller screens. Participants were shown one of the four modified treatments, then presented with a test to measure whether or not the modified formal features had any impact or influence on learning outcomes from a sample of 132 undergraduate college students. No significant differences were found to occur as a result of manipulation of formal features between the treatment groups
    • 

    corecore