68 research outputs found

    Color Image Watermarking For Copyright Protection

    Get PDF
    Watermarking is an effective and potential method for copyright protection in digital audio, image and video data. One of the media is digital image, where it can be copied and displayed widely while still maintaining the quality. Protections to these images become more and more important. One of the simple methods is to hide the data and then get back the data by owner itself, with certain secret key. The main objective of my project is to find out which color model representation is suitable apply the digital image watermarking for copyright protection. One of the watermarking techniques in frequency domain is applied. At the same time, the robustness of the implemented algorithm to the common image processing operation, example, filtering attack, noise attack, rotation attack, and lossy JPEG compression. Some images are used in the testing. Detailed description of every resulted image and watermark is show out in this report. Quality evaluation to the images is carried out and comparison is made. The quality metrics used in this project is PSNR

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others

    Digital Watermarking for Verification of Perception-based Integrity of Audio Data

    Get PDF
    In certain application fields digital audio recordings contain sensitive content. Examples are historical archival material in public archives that preserve our cultural heritage, or digital evidence in the context of law enforcement and civil proceedings. Because of the powerful capabilities of modern editing tools for multimedia such material is vulnerable to doctoring of the content and forgery of its origin with malicious intent. Also inadvertent data modification and mistaken origin can be caused by human error. Hence, the credibility and provenience in terms of an unadulterated and genuine state of such audio content and the confidence about its origin are critical factors. To address this issue, this PhD thesis proposes a mechanism for verifying the integrity and authenticity of digital sound recordings. It is designed and implemented to be insensitive to common post-processing operations of the audio data that influence the subjective acoustic perception only marginally (if at all). Examples of such operations include lossy compression that maintains a high sound quality of the audio media, or lossless format conversions. It is the objective to avoid de facto false alarms that would be expectedly observable in standard crypto-based authentication protocols in the presence of these legitimate post-processing. For achieving this, a feasible combination of the techniques of digital watermarking and audio-specific hashing is investigated. At first, a suitable secret-key dependent audio hashing algorithm is developed. It incorporates and enhances so-called audio fingerprinting technology from the state of the art in contentbased audio identification. The presented algorithm (denoted as ”rMAC” message authentication code) allows ”perception-based” verification of integrity. This means classifying integrity breaches as such not before they become audible. As another objective, this rMAC is embedded and stored silently inside the audio media by means of audio watermarking technology. This approach allows maintaining the authentication code across the above-mentioned admissible post-processing operations and making it available for integrity verification at a later date. For this, an existent secret-key ependent audio watermarking algorithm is used and enhanced in this thesis work. To some extent, the dependency of the rMAC and of the watermarking processing from a secret key also allows authenticating the origin of a protected audio. To elaborate on this security aspect, this work also estimates the brute-force efforts of an adversary attacking this combined rMAC-watermarking approach. The experimental results show that the proposed method provides a good distinction and classification performance of authentic versus doctored audio content. It also allows the temporal localization of audible data modification within a protected audio file. The experimental evaluation finally provides recommendations about technical configuration settings of the combined watermarking-hashing approach. Beyond the main topic of perception-based data integrity and data authenticity for audio, this PhD work provides new general findings in the fields of audio fingerprinting and digital watermarking. The main contributions of this PhD were published and presented mainly at conferences about multimedia security. These publications were cited by a number of other authors and hence had some impact on their works

    Tatouage du flux compressé MPEG-4 AVC

    Get PDF
    La présente thèse aborde le sujet de tatouage du flux MPEG-4 AVC sur ses deux volets théoriques et applicatifs en considérant deux domaines applicatifs à savoir la protection du droit d auteur et la vérification de l'intégrité du contenu. Du point de vue théorique, le principal enjeu est de développer un cadre de tatouage unitaire en mesure de servir les deux applications mentionnées ci-dessus. Du point de vue méthodologique, le défi consiste à instancier ce cadre théorique pour servir les applications visées. La première contribution principale consiste à définir un cadre théorique pour le tatouage multi symboles à base de modulation d index de quantification (m-QIM). La règle d insertion QIM a été généralisée du cas binaire au cas multi-symboles et la règle de détection optimale (minimisant la probabilité d erreur à la détection en condition du bruit blanc, additif et gaussien) a été établie. Il est ainsi démontré que la quantité d information insérée peut être augmentée par un facteur de log2m tout en gardant les mêmes contraintes de robustesse et de transparence. Une quantité d information de 150 bits par minutes, soit environ 20 fois plus grande que la limite imposée par la norme DCI est obtenue. La deuxième contribution consiste à spécifier une opération de prétraitement qui permet d éliminer les impactes du phénomène du drift (propagation de la distorsion) dans le flux compressé MPEG-4 AVC. D abord, le problème a été formalisé algébriquement en se basant sur les expressions analytiques des opérations d encodage. Ensuite, le problème a été résolu sous la contrainte de prévention du drift. Une amélioration de la transparence avec des gains de 2 dB en PSNR est obtenueThe present thesis addresses the MPEG-4 AVC stream watermarking and considers two theoretical and applicative challenges, namely ownership protection and content integrity verification.From the theoretical point of view, the thesis main challenge is to develop a unitary watermarking framework (insertion/detection) able to serve the two above mentioned applications in the compressed domain. From the methodological point of view, the challenge is to instantiate this theoretical framework for serving the targeted applications. The thesis first main contribution consists in building the theoretical framework for the multi symbol watermarking based on quantization index modulation (m-QIM). The insertion rule is analytically designed by extending the binary QIM rule. The detection rule is optimized so as to ensure minimal probability of error under additive white Gaussian noise distributed attacks. It is thus demonstrated that the data payload can be increased by a factor of log2m, for prescribed transparency and additive Gaussian noise power. A data payload of 150 bits per minute, i.e. about 20 times larger than the limit imposed by the DCI standard, is obtained. The thesis second main theoretical contribution consists in specifying a preprocessing MPEG-4 AVC shaping operation which can eliminate the intra-frame drift effect. The drift represents the distortion spread in the compressed stream related to the MPEG encoding paradigm. In this respect, the drift distortion propagation problem in MPEG-4 AVC is algebraically expressed and the corresponding equations system is solved under drift-free constraints. The drift-free shaping results in gain in transparency of 2 dB in PSNREVRY-INT (912282302) / SudocSudocFranceF

    Big Data Security (Volume 3)

    Get PDF
    After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology

    An e-learning instructional design framework for mobile devices in Africa

    Get PDF
    English text, with summaries in English, Afrikaans and ZuluThis study aims to propose an e-learning framework for mobile devices in Africa to help improve enrolment rates and education standards in the FET (Further Education and Training) phase. The study is qualitative in nature and employs document analysis as main research method. An overview of the South African education context with supporting statistical data to motivate why an e-learning alternative is crucial for improving South African and African education is provided. The literature review includes a descriptive analysis of 7 existing e- and m-learning frameworks, with key features highlighted for possible adaptation or incorporation into an e-learning framework for Africa. Behaviourism, Constructivism and Connectivism are discussed as applicable learning theories to pedagogically underpin this proposed e-learning framework. Thereafter, a critical evaluation of current South African education policy documents (White Papers, the Norms and Standards for Educators and the Draft Policy for the Provision and Management of Learning Teaching and Support Materials) is conducted to determine whether these policies support and enable e-learning effectively. Part 2 of Chapter 5 comprises a critical analysis and comparison of education systems and applicable legislation in the USA, Finland and Malawi to establish how education is structured and how e-learning is administered in these countries to make relevant recommendations for South Africa and to inform the design of an e-learning framework for Africa. Research findings are presented as answers to the research questions posed and the proposed e-learning framework with further recommendations are presented to the South African Department of Basic Education, teachers and researchers.Die doel van hierdie studie is om ‘n e-onderrig-en-leer raamwerk vir mobiele toestelle vir Afrika voor te stel, sodat inskrywingsgetalle en onderrig- en leerstandaarde in die Verdere Onderrig en Opleidings (VOO) fase verbeter kan word. Dit is ‘n kwalitatiewe studie en dokumentanalise word as navorsingsmetode toegepas. ‘n Oorsig van die huidige Suid-Afrikaanse onderwysstelsel en konteks met ondersteunende statistiese bevindinge word verduidelik om e-onderrig-en-leer as noodsaaklike alternatief vir Suid-Afrika en Afrika te motiveer. Die literatuuroorsig sluit ‘n beskrywende analise van sewe bestaande e- en m-onderrig-en-leer (mobiele-onderrig-en-leer) raamwerke in. Hoofkenmerke van elke raamwerk word uitgelig vir moontlike aanpassing en inkorporering in ‘n e-onderrig-en-leer raamwerk vir die Afrika-konteks. Leerteorië, nl Behaviourisme, Konstruktivisme en Konnektivisme (Connectivism) word in diepte bespreek as pedagogies fundamenteel om die e-onderrig-en-leer raamwerk te onderbou en te ondersteun. ‘n Kritiese evaluasie van Suid-Afrikaanse onderwysbeleid (d.w.s. Witskrifte, die Norme and Standaarde vir Onderwysers en die konsepdokument oor die Voorsiening en Bestuur van Onderrig-, Leer- en Ondersteuningsmateriaal) is gedoen om vas te stel of die beleid wel e-onderrig-en-leer effektief ondersteun en prakties moontlik maak. ‘n Krities analitiese en vergelykende studie van die VSA (Verenigde State van Amerika), Finland en Malawi se onderwysstelsels- en wetgewing is gedoen in hoofstuk 5 deel 2 om te bepaal hoe dié lande onderwys struktureer en hoe e-onderrig-en–leer geadministreer word, sodat relevante voorstelle vir Suid-Afrika gemaak kan word en om insae te lewer in die ontwerp van ‘n e-onderrig-en-leer raamwerk toepaslik vir die Afrika-kontinent. Navorsingsbevindinge word voorgelê aan die Suid-Afrikaanse Departement van Basiese Onderwys, onderwysers sowel as aan navorsers.Lolu cwaningo luhlose ukuphakamisa uhlaka lwe-e-learning lamadivaysi eselula e-Afrika ukusiza ukuthuthukisa izinga lokubhalisa nezindinganiso zemfundo kwiSigaba se-FET (Further Education and Training). Ucwaningo luyimfanelo enemvelo futhi lusebenzisa ukuhlaziywa kwedokhumenti njengendlela yokucwaninga eyinhloko. Ukuhlolisisa umongo wezemfundo waseNingizimu Afrika ngokusekela imniningwane yezibalo ukugqugquzela ukuthi kungani enye yokufunda email ibalulekile ekuthuthukiseni imfundo yaseNingizimu Afrika ne-Afrika. Ukubuyekezwa kwezincwadi kuhlanganisa ukuhlaziywa okuchazayo kwezinhlaka eziyisikhombisa ezisekhona ze-e- e-m-learning, nezici eziyinhloko eziqokonyiswe ukukhishwa kwe-adaption noma ukufakwa kwisakhiwo se-e-learning se-Afrika. Ukuzikhethela, Ukwakhiwa kwe-Constructivism (Kwe Zokwakha) kanye ne-Connectivism (Kwe Zokuxhumana) kuxoxwa njengezifundo ezifanele zokufunda ukusekela lolu hlelo oluhlongozwayo lwe-e-learning. Ngemuva kwaloko, ukuhlolwa okubalulekile kwemibhalo yamanje yemfundo yaseNingizimu Afrika (Amaphepha Asemhlophe, Imigomo Nemigomo Yabafundisi kanye neNqubomgomo Yohlaka Lokufundiswa Nezifundo Nokusekela) kwenziwa ukuze kutholakale ukuthi lezi zinqubomgomo zisekela futhi zikwazi yini ukufundisa nge-e-ephumelelayo. Ingxenye yesibili yeSahluko sesihlanu iqukethe ukuhlaziywa okubucayi kanye nokuqhathaniswa kwezinhlelo zemfundo kanye nemithetho esebenzayo eMelika, eFinland nase Malawi ukuqinisekisa ukuthi imfundo ihlelwe kanjani nokuthi i-e-learning inikezwa kanjani ukwenza izincomo ezifanele eNingizimu Afrika nokwazisa ukuklama uhlaka lwe-e-learning lwe-Afrika. Imiphumela yokucwaninga inikezwa njengezimpendulo zemibuzo yokucwaninga ephakanyisiwe kanye nohlaka oluhlongozwayo lwe-e-learning kanye nezincomo ezengeziwe ezethulwa eMnyangweni wezemfundo Eyisisekelo, othisha nabacwaningi baseNingizimu Afrika.Curriculum and Instructional StudiesM. Ed. (Curriculum Studies

    Digital Rights Management: Towards a Balance between Copyright Rights and Fair Use Exceptions.

    Get PDF
    There have been several attempts pointing towards DRM schemes that better satisfy Fair Use requirements [1, 2, 3, 4]; this project explores a new approach. Based on the idealistic premise that by mimicking the physical properties that prevented piracy in the pre-MP3 world into a post-MP3 world DRM scheme it should be possible to establish a copyright infringement control paradigm that is acceptable to all; this project establishes a Fair Use friendly DRM Scheme. It has been found that for a DRM scheme to be Fair Use friendly it has to aim to reach the following idealistic characteristics: * The copyright holders should not be able to interfere with usage which a judge would or could rule as fair use. * The Consumers would be able to consume the content easily and spontaneously within interoperable regimes. * The Consumers? privacy rights would be respected, in congruence with the legislation in question. * The Consumers should be able to purchase, replicate and distribute music at a monetary cost. * The Consumers should be able to replicate, distribute and store music at the cost of diminished quality, slow replication and slow distribution. However it has also been found that these characteristics alone are not enough, and therefore the DRM scheme should be implemented within the following conditions: * The DRM scheme should find ways to handle the ambiguity of Fair Use. * The DRM scheme should facilitate ex-post tracking and monitoring rather than ex-ante based decision making. * The DRM scheme should support interoperability and privacy. An example of how these properties can be implemented has been designed

    Privacy Intelligence: A Survey on Image Sharing on Online Social Networks

    Full text link
    Image sharing on online social networks (OSNs) has become an indispensable part of daily social activities, but it has also led to an increased risk of privacy invasion. The recent image leaks from popular OSN services and the abuse of personal photos using advanced algorithms (e.g. DeepFake) have prompted the public to rethink individual privacy needs when sharing images on OSNs. However, OSN image sharing itself is relatively complicated, and systems currently in place to manage privacy in practice are labor-intensive yet fail to provide personalized, accurate and flexible privacy protection. As a result, an more intelligent environment for privacy-friendly OSN image sharing is in demand. To fill the gap, we contribute a systematic survey of 'privacy intelligence' solutions that target modern privacy issues related to OSN image sharing. Specifically, we present a high-level analysis framework based on the entire lifecycle of OSN image sharing to address the various privacy issues and solutions facing this interdisciplinary field. The framework is divided into three main stages: local management, online management and social experience. At each stage, we identify typical sharing-related user behaviors, the privacy issues generated by those behaviors, and review representative intelligent solutions. The resulting analysis describes an intelligent privacy-enhancing chain for closed-loop privacy management. We also discuss the challenges and future directions existing at each stage, as well as in publicly available datasets.Comment: 32 pages, 9 figures. Under revie
    corecore