1,040 research outputs found

    A robust digital image watermarking using repetition codes against common attacks

    Get PDF
    Digital watermarking is hiding the information inside a digital media to protect for such documents against malicious intentions to change such documents or even claim the rights of such documents. Currently the capability of repetition codes on various attacks in not sufficiently studied. In this project, a robust frequency domain watermarking scheme has been implemented using Discrete Cosine Transform (DCT). The idea of this scheme is to embed an encoded watermark using repetition code (3, 1) inside the cover image pixels based on Discrete Cosine Transform (DCT) embedding technique. The proposed methods have undergone several simulation attacks tests in order to check up and compare their robustness against various attacks, like salt and pepper, speckle, compress, Gaussian, image contrast, resizing and cropping attack. The robustness of the watermarking scheme has been calculated using Peak Signal-To-Noise Ratio (PSNR), Mean Squared Error (MSE) and Normalized Correlations (NC). In our experiments, the results show that the robustness of a watermark with repetition codes is much better than without repetition code

    A holistic approach examining RFID design for security and privacy

    Get PDF
    This paper adopts a holistic approach to Radio Frequency Identification (RFID) security that considers security and privacy under resource constraints concurrently. In this context, a practical realisation of a secure passive (battery-less) RFID tag is presented. The tag consists of an off the shelf front end combined with a bespoke 0.18 μm Application Specific Integrated Circuit (ASIC) assembled as a -sized prototype. The ASIC integrates the authors’ ultra low power novel Advanced Encryption Standard (AES) design together with a novel random number generator and a novel protocol, which provides both security and privacy. The analysis presented shows a security of 64-bits against many attack methods. Both modelled and measured power results are presented. The measured average core power consumed during continuous normal operation is 1.36 μW

    A Review on Missing Tags Detection Approaches in RFID System

    Get PDF
    Radio Frequency Identification (RFID) system can provides automatic detection on very large number of tagged objects within short time. With this advantage, it is been using in many areas especially in the supply chain management, manufacturing and many others. It has the ability to track individual object all away from the manufacturing factory until it reach the retailer store. However, due to its nature that depends on radio signal to do the detection, reading on tagged objects can be missing due to the signal lost. The signal lost can be caused by weak signal, interference and unknown source. Missing tag detection in RFID system is truly significant problem, because it makes system reporting becoming useless, due to the misleading information generated from the inaccurate readings. The missing detection also can invoke fake alarm on theft, or object left undetected and unattended for some period. This paper provides review regarding this issue and compares some of the proposed approaches including Window Sub-range Transition Detection (WSTD), Efficient Missing-Tag Detection Protocol (EMD) and Multi-hashing based Missing Tag Identification (MMTI) protocol. Based on the reviews it will give insight on the current challenges and open up for a new solution in solving the problem of missing tag detection

    Indoor positioning technology assessment using analytic hierarchy process for pedestrian navigation services

    Get PDF
    Indoor positioning is one of the biggest challenges of many Location Based Services (LBS), especially if the target users are pedestrians, who spend most of their time in roofed areas such as houses, offices, airports, shopping centres and in general indoors. Providing pedestrians with accurate, reliable, cheap, low power consuming and continuously available positional data inside the buildings (i.e. indoors) where GNSS signals are not usually available is difficult. Several positioning technologies can be applied as stand-alone indoor positioning technologies. They include Wireless Local Area Networks (WLAN), Bluetooth Low Energy (BLE), Ultra-Wideband (UWB), Radio Frequency Identification (RFID), Tactile Floor (TF), Ultra Sound (US) and High Sensitivity GNSS (HSGNSS). This paper evaluates the practicality and fitness-to-the-purpose of pedestrian navigation for these stand-alone positioning technologies to identify the best one for the purpose of indoor pedestrian navigation. In this regard, the most important criteria defining a suitable positioning service for pedestrian navigation are identified and prioritised. They include accuracy, availability, cost, power consumption and privacy. Each technology is evaluated according to each criterion using Analytic Hierarchy Process (AHP) and finally the combination of all weighted criteria and technologies are processed to identify the most suitable solution
    • …
    corecore