906 research outputs found
A Chaotic IP Watermarking in Physical Layout Level Based on FPGA
A new chaotic map based IP (Intellectual Property) watermarking scheme at physical design level is presented. An encrypted watermark is embedded into the physical layout of a circuit by configuring LUT (Lookup Table) as specific functions when it is placed and routed onto the FPGA (Field-Programmable Gate Array). The main contribution is the use of multiple chaotic maps in the processes of watermark design and embedding, which efficiently improves the security of watermark. A hashed chaotic sequence is used to scramble the watermark. Secondly, two pseudo-random sequences are generated by using chaotic maps. One is used to determine unused LUT locations, and the other divides the watermark into groups. The watermark identifies original owner and is difficult to detect. This scheme was tested on a Xilinx Virtex XCV600-6bg432 FPGA. The experimental results show that our method has low impact on functionality, short path delay and high robustness in comparison with other methods
Recommended from our members
Protection of an intrusion detection engine with watermarking in ad hoc networks
Mobile ad hoc networks have received great attention in recent years, mainly due to the evolution of wireless networking and mobile computing hardware. Nevertheless, many inherent vulnerabilities exist in mobile ad hoc networks and their applications that affect the security of wireless transactions. As intrusion prevention mechanisms, such as encryption and authentication, are not sufficient we need a second line of defense, Intrusion Detection. In this pa-per we present an intrusion detection engine based on neural networks and a protection method based on watermarking techniques. In particular, we exploit information visualization and machine learning techniques in order to achieve intrusion detection and we authenticate the maps produced by the application of the intelligent techniques using a novel combined watermarking embedding method. The performance of the proposed model is evaluated under different traffic conditions, mobility patterns and visualization metrics
Digital Copyright Protection: Focus on Some Relevant Solutions
Copyright protection of digital content is considered a relevant problem of the current Internet since content digitalization and high performance interconnection networks have greatly increased the possibilities to reproduce and distribute digital content. Digital Rights Management (DRM) systems try to prevent the inappropriate or illegal use of copyrighted digital content. They are promoted by the major global media players, but they are also perceived as proprietary solutions that give rise to classic problems of privacy and fair use. On the other hand, watermarking protocols have become a possible solution to the problem of copyright protection. They have evolved during the last decade, and interesting proposals have been designed. This paper first presents current trends concerning the most significant solutions to the problem of copyright protection based on DRM systems and then focuses on the most promising approaches in the field of watermarking protocols. In this regard, the examined protocols are discussed in order to individuate which of them can better represent the right trade-off between opposite goals, such as, for example, security and easy of use, so as to prove that it is possible to implement open solutions compatible with the current web context without resorting to proprietary architectures or impairing the protection of copyrighted digital content
Copyright issues in digital enviornment
This paper discusses about the copyright issues in the digital environment. And it also discusses the security of information over networks.it gives a brief note about Databases and multimedia technologies also.And what all are the technologies we can use for right protection that also discusses
Intellectual Property Rights of Electronic Information in the Age of Digital Convergence
The laws of intellectual property aim to protect owners of the literary, dramatic, musical, and artistic works; designs, innovations and inventions from unauthorized use or exploitation by some one else. Though every country has enacted laws to protect intellectual property of its citizens, many infringements take place and a majority of them end up in courts of law. The developments in information and communication technologies made the situation grimmer. This paper briefly explains the copyright and protection of electronic information, its security in network environment, and copyright provisions for databases, multimedia works, and computer software. The relevant provisions of the European Union, the American and the Indian legislative developments as well as the international efforts were touched. The various facets of the information Technology Act and the recently tabled Communications Convergence Bill have been discussed. Despite all the legislative efforts, a level playing field is needed for the rights owners, publishers, library professionals and user
A novel image authenticationand rightful ownership detection framework based on DWT watermarking in cloud environment
Cloud computing has been highlighted by many organizations because of its benefits to use it anywhere. Efficiency, Easy access information, quick deployment, and a huge reduce of cost of using it, are some of the cloud advantages. While cost reduction is one of the great benefits of cloud, privacy protection of the users‘ data is also a significant issue of the cloud that cloud providers have to consider about. This is a vital component of the cloud‘s critical infrastructure. Cloud users use this environment to enable numerous online transactions crossways a widespread range of sectors and to exchange information. Especially, misuse of the users‘ data and private information are some of the important problems of using cloud environment. Cloud untrustworthy environment is a good area for hackers to steal user‘s stored data by Phishing and Pharming techniques. Therefore, cloud vendors should utilize easy- to-use, secure, and efficient environment. Besides they should prepare a way to access cloud services that promote data privacy and ownership protection. The more data privacy and ownership protection in cloud environment, the more users will attract to use this environment to put their important private data. In this study, a rightful ownership detection framework has been proposed to mitigate the ownership protection in cloud environment. Best methods for data privacy protection such as image authentication methods, watermarking methods and cryptographic methods, for mitigating the ownership protection problem to use in cloud environment, have been explored. Finally, efficiency and reliability of the proposed framework have been evaluated and analyzed
Data Hiding and Its Applications
Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others
- …