11 research outputs found
Multiparty multilevel watermarking protocol for digital secondary market based on iris recognition technology
Background: In order to design secure digital right management architecture between different producers and different consumers, this paper proposes a multiparty and multilevel watermarking protocol for primary and secondary market. Comparing with the traditional buyer-seller watermarking protocols, this paper makes several outstanding achievements. Method: First of all, this paper extends traditional buyer-seller two-party architecture to multiparty architecture which contains producer, multiply distributors, consumers, etc. Secondly, this paper pays more attention on the security issues, for example, this paper applies iris recognition technology as an advanced security method. Conclusion: Finally, this paper also presents a second-hand market scheme to overcome the copyright issues that may happen in the real world. © 2017 Bentham Science Publishers
A SECURED AUTHENTICATED WATERMARKING TECHNIQUE
Whenever media contents transmitted through the network, compressed and encrypted media data is used so it is important to give proper protection to the data items to avoid unauthorized access and for that we need to enhance media authentication and for that the compressed encrypted media data which is used to distribute through the network is watermarked for providing proof of ownership or distributorship. For doing compression JPEG 2000 compression and while doing compression the data is packed to low number of bits and to this data encryption is applied so stream cipher technique is used for avoiding media quality degradation and also this technique allow to do watermarking in a predictable manner. And a robust watermarking algorithm is used for watermarking this compressed and encrypted media data
A High Security Buyer-Seller Watermark Protocol based on Iris Biometric
With the development of digital watermarking technology, digital watermarking protocol is now drawing the attention for protecting copyrights of digital products. However, the copyright protection is fully protected by watermark technology if it is employed a suitable protocol between the rights owner and the customer. Therefore, currently, there are a number of buyer-seller watermarking protocols proposed, however, an anonymous problem and collusion problem are still unsolved completely. Thus, this paper proposes a high security watermark protocol based on iris biometric for resolving these problems. In addition, this paper also produces watermarking generation mechanism which aims to improve the efficiency of the whole mechanism. Finally, the investigation indicates that the proposed buyer-seller watermark protocol takes care of the security concerns of all parties involved, and the proposed scheme could also find an illegal copy of the content, the violators can be traced back
Mikey for Keys Management of H.264 Scalable Video Coded Layers
The paper investigates the problem of managing multiple encryption keys generation overhead issues in scalable video coding (H.264/SVC) and proposes a hierarchical top down keys generation and distribution system by using a standard key management protocol MIKEY (Multimedia Internet Keying Protocol). The research goal is two-fold; (1) prevention of information leakage by the selective encryption of network abstraction layer (NAL) units with AES-CTR block cipher algorithm, and (2) reduction of multiple layer encryption keys overhead for scalable video distribution. We combine a MIKEY with the digital rights management (DRM) techniques to derive a mechanism in which every entitled user of each layer has only one encryption key to use, but this key will transparently open the doors of all layers below. The timing results are calculated for the encryption/decryption and the key generation processes relative to encoding/decoding time of test video files, which are noticeably negligible. The scheme is enormously suitable for video distribution to users who have subscribed to various video qualities regarding their desire or constraints on their devices and helps in preventing the loss of revenue of paid services
Data Hiding and Its Applications
Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others
A Decentralised Digital Identity Architecture
Current architectures to validate, certify, and manage identity are based on
centralised, top-down approaches that rely on trusted authorities and
third-party operators. We approach the problem of digital identity starting
from a human rights perspective, with a primary focus on identity systems in
the developed world. We assert that individual persons must be allowed to
manage their personal information in a multitude of different ways in different
contexts and that to do so, each individual must be able to create multiple
unrelated identities. Therefore, we first define a set of fundamental
constraints that digital identity systems must satisfy to preserve and promote
privacy as required for individual autonomy. With these constraints in mind, we
then propose a decentralised, standards-based approach, using a combination of
distributed ledger technology and thoughtful regulation, to facilitate
many-to-many relationships among providers of key services. Our proposal for
digital identity differs from others in its approach to trust in that we do not
seek to bind credentials to each other or to a mutually trusted authority to
achieve strong non-transferability. Because the system does not implicitly
encourage its users to maintain a single aggregated identity that can
potentially be constrained or reconstructed against their interests,
individuals and organisations are free to embrace the system and share in its
benefits.Comment: 30 pages, 10 figures, 3 table
Cryptography and Its Applications in Information Security
Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue “Cryptography and Its Applications in Information Security” addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information
Joint watermarking scheme for multiparty multilevel drm architecture
10.1109/TIFS.2009.2033229IEEE Transactions on Information Forensics and Security44758-76
ESIIG2
331 p. , Il, Tablas, Gráficos.Libro ElectrónicoESIIG2 - The Second European Summit on Interoperability in the iGovernment, represents an unprecedented occasion to develop new synergies and create contacts with representatives of the European Commission, of the national and regional governments of Europe, of the research field, the Academia and experts of the ICT sector.
Mrs Viviane Reding, Member of the European Commission for Information Society and Media gave her official patronage to the Second European Summit of Interoperability in the iGovernment, ESIIG2.
Event with the patronage CISIS (Italian Interregional Centre of Information and Statistic Systems)
The European Commission initiative i2010, through the DG Information and Media Society offered its support to ESIIG2.ForewordXI
ESIIG 3
What is ESIIG2? 3
Commissioner Reding message 4
ESIIG 2 Co - hosted events5
The Programme 6
ESIIG2 Supporters8
The Regional Ministry for consumer protection and administrative simplification13
The Technical and Scientific Committee15
Structure of the Technical and Scientific Committee15
What does the Committee do?15
Important and innovative initiatives of ESIIG 219
Publication of the Call for Papers Results23
T-Seniority: E-inclusion and Interoperability25
Alejandro Echeverria
Security and Privacy Preserving Data in E-Government Integration31
Claudio Biancalana, Francesco Saverio Profiti
Proposal for Interoperability Between Public Universities39
Correcher E, Universidad Politécnica de Valencia, Spain
A Cross-Application Reference Model to Support Interoperability 53
Elena Baralis, Tania Cerquitelli, Silvana Raffa
Table of Contents
VII
Applying Soa to Mobile Secure eGovernment Services The Sweb Approach65
Silke Cuno, Yuri Glickman, Petra Hoepner, Linda Strick
An Identity Metasystem Approach to Improve Eid Interoperability and Assure
Privacy Compliance 74
Andrea Valboni
Towards Interoperable Infrastructures of Geospatial Data 86
Sergio Farruggia, Emanuele Roccatagliata
Modernization and Administrative Simplification Master Plan
for the Local Councils of the Region of Murcia 101
Leandro Marín Muñoz, Pedro Olivares Sánchez, Isabel Belmonte Martínez
Organizational Interoperability and Organizing for Interoperability in eGovernment109
Ralf Cimander, Herbert Kubicek
The National Interoperability Framework: a New Regulatory Tool to Guarantee
Interoperability Among Spanish Public Administrations 123
Agustí Cerrillo
The Realization of the Greek E-Gif 131
Andreas Papadakis, Kostas Rantos, Antonis Stasis
Build Government Interoperability Through Open Standard Technology 141
Goodwin Ting, Anne Rasanen, Marco Pappalardo
Towards an Intercultural Representation of Mediterranean Intangible Cultural
Heritage (Ich) An Xml Interoperability Framework for Regional Ich Databases 154
Jesse Marsh, Francesco Passantino
Castile and Leon, a Model of Interoperability 168
Isabel Alonso Sánchez, José Ignacio de Uribe Ladrón de Cegama,
Antonio Francisco Pérez Fernández, Jorge Ordás Alonso
The Catalan Interoperability Model182
Ignasi Albors
Identity and Residence Verification Data System189
Nimia Rodríguez Escolar, Jose A Eusamio Mazagatos
From Extended Enterprise to Extended Government: Regione Lazio
Interoperability and Egovernment Point of View 199
Claudio Biancalana, Dante Chiroli, Claudio Pisu, Francesco Saverio Profiti, Fabio Raimondi
Contribution by the Members of the Technical and Scientific Committee 215
Interoperability and Egovernment Through Adoption of Standards 215
Flavia Marzano
A Brief Compendium on Interoperability in Egovernment 224
Michele M Missikoff
Table of Contents
VIII
Spc – The Italian Interoperabilty Framework with Services241
Francesco Tortorelli, Roberto Baldoni
Exploitation of Digital Contents for the Public Administration 254
Giulio De Petra, Fabrizio Gianneschi, Giaime Ginesu
Deploying the full transformational power of egovernment
– collaboration and interoperability –270
Sylvia Archmann, Just Castillo Iglesias
ICAR Report: Interoperability and Cooperation between applications among
Italian Regions (English summary)278
CISIS - Central Staff of ICAR Project
List of the finalists of the iG20 Award 297
IG20 AWARDS: Eucaris, the European car and driving licence
information system297
INNOVATIVNESS: Interopcyl299
TRANSFERABILITY: Semic, Semantic Interoperability
Center Europe301
IMPACT: Employment/unemployment status management:
actual interoperability through the CO eService303
PRACTICAL RESULTS: Emilia Romagna Labour Information System 305
The ESIIG2 Summit results: the creation of ERNI and the Interoperability
Declaration of Rome 309
The Interoperability Declaration of Rome 311
Follow the new and interesting developments of Esiig2 31