3,464 research outputs found
A robust digital image watermarking using repetition codes against common attacks
Digital watermarking is hiding the information inside a digital media to protect for
such documents against malicious intentions to change such documents or even
claim the rights of such documents. Currently the capability of repetition codes on
various attacks in not sufficiently studied. In this project, a robust frequency domain
watermarking scheme has been implemented using Discrete Cosine Transform
(DCT). The idea of this scheme is to embed an encoded watermark using repetition
code (3, 1) inside the cover image pixels based on Discrete Cosine Transform (DCT)
embedding technique. The proposed methods have undergone several simulation
attacks tests in order to check up and compare their robustness against various
attacks, like salt and pepper, speckle, compress, Gaussian, image contrast, resizing
and cropping attack. The robustness of the watermarking scheme has been calculated
using Peak Signal-To-Noise Ratio (PSNR), Mean Squared Error (MSE) and
Normalized Correlations (NC). In our experiments, the results show that the
robustness of a watermark with repetition codes is much better than without
repetition code
Perfect tag identification protocol in RFID networks
Radio Frequency IDentification (RFID) systems are becoming more and more
popular in the field of ubiquitous computing, in particular for objects
identification. An RFID system is composed by one or more readers and a number
of tags. One of the main issues in an RFID network is the fast and reliable
identification of all tags in the reader range. The reader issues some queries,
and tags properly answer. Then, the reader must identify the tags from such
answers. This is crucial for most applications. Since the transmission medium
is shared, the typical problem to be faced is a MAC-like one, i.e. to avoid or
limit the number of tags transmission collisions. We propose a protocol which,
under some assumptions about transmission techniques, always achieves a 100%
perfomance. It is based on a proper recursive splitting of the concurrent tags
sets, until all tags have been identified. The other approaches present in
literature have performances of about 42% in the average at most. The
counterpart is a more sophisticated hardware to be deployed in the manufacture
of low cost tags.Comment: 12 pages, 1 figur
AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services. Hence, significant efforts have been made to design RFID systems that preserve users\u27 privacy. Majority of the privacy preserving protocols for RFID systems require the reader to search all tags in the system in order to identify a single RFID tag which not efficient for large scale systems. In order to achieve high-speed authentication in large-scale RFID systems, researchers propose tree-based approaches, in which any pair of tags share a number of key components. Another technique is to perform group-based authentication that improves the tradeoff between scalability and privacy by dividing the tags into a number of groups. This novel authentication scheme ensures privacy of the tags. However, the level of privacy provided by the scheme decreases as more and more tags are compromised. To address this issue, in this paper, we propose a group based anonymous private authentication protocol (AnonPri) that provides higher level of privacy than the above mentioned group based scheme and achieves better efficiency (in terms of providing privacy) than the approaches that prompt the reader to perform an exhaustive search. Our protocol guarantees that the adversary cannot link the tag responses even if she can learn the identifier of the tags. Our evaluation results demonstrates that the level of privacy provided by AnonPri is higher than that of the group based authentication technique
AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services. Hence, significant efforts have been made to design RFID systems that preserve users\u27 privacy. Majority of the privacy preserving protocols for RFID systems require the reader to search all tags in the system in order to identify a single RFID tag which not efficient for large scale systems. In order to achieve high-speed authentication in large-scale RFID systems, researchers propose tree-based approaches, in which any pair of tags share a number of key components. Another technique is to perform group-based authentication that improves the tradeoff between scalability and privacy by dividing the tags into a number of groups. This novel authentication scheme ensures privacy of the tags. However, the level of privacy provided by the scheme decreases as more and more tags are compromised. To address this issue, in this paper, we propose a group based anonymous private authentication protocol (AnonPri) that provides higher level of privacy than the above mentioned group based scheme and achieves better efficiency (in terms of providing privacy) than the approaches that prompt the reader to perform an exhaustive search. Our protocol guarantees that the adversary cannot link the tag responses even if she can learn the identifier of the tags. Our evaluation results demonstrates that the level of privacy provided by AnonPri is higher than that of the group based authentication technique
Concurrent Backscatter Streaming from Batteryless and Wireless Sensor Tags with Multiple Subcarrier Multiple Access
This paper proposes a novel multiple access method that enables concurrent sensor data streaming from multiple batteryless, wireless sensor tags. The access method is a pseudo-FDMA scheme based on the subcarrier backscatter communication principle, which is widely employed in passive RFID and radar systems. Concurrency is realized by assigning a dedicated subcarrier to each sensor tag and letting all sensor tags backscatter simultaneously. Because of the nature of the subcarrier, which is produced by constant rate switching of antenna impedance without any channel filter in the sensor tag, the tag-to-reader link always exhibits harmonics. Thus, it is important to reject harmonics when concurrent data streaming is required. This paper proposes a harmonics rejecting receiver to allow simultaneous multiple subcarrier usage. This paper particularly focuses on analog sensor data streaming which minimizes the functional requirements on the sensor tag and frequency bandwidth. The harmonics rejection receiver is realized by carefully handling group delay and phase delay of the subcarrier envelope and the carrier signal to accurately produce replica of the harmonics by introducing Hilbert and inverse Hilbert transformations. A numerical simulator with Simulink and a hardware implementation with USRP and LabVIEW have been developed. Simulations and experiments reveal that even if the CIR before harmonics rejection is 0dB, the proposed receiver recovers the original sensor data with over 0.98 cross-correlation
Wireless communication, identification and sensing technologies enabling integrated logistics: a study in the harbor environment
In the last decade, integrated logistics has become an important challenge in
the development of wireless communication, identification and sensing
technology, due to the growing complexity of logistics processes and the
increasing demand for adapting systems to new requirements. The advancement of
wireless technology provides a wide range of options for the maritime container
terminals. Electronic devices employed in container terminals reduce the manual
effort, facilitating timely information flow and enhancing control and quality
of service and decision made. In this paper, we examine the technology that can
be used to support integration in harbor's logistics. In the literature, most
systems have been developed to address specific needs of particular harbors,
but a systematic study is missing. The purpose is to provide an overview to the
reader about which technology of integrated logistics can be implemented and
what remains to be addressed in the future
Goodbye, ALOHA!
©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The vision of the Internet of Things (IoT) to interconnect and Internet-connect everyday people, objects, and machines poses new challenges in the design of wireless communication networks. The design of medium access control (MAC) protocols has been traditionally an intense area of research due to their high impact on the overall performance of wireless communications. The majority of research activities in this field deal with different variations of protocols somehow based on ALOHA, either with or without listen before talk, i.e., carrier sensing multiple access. These protocols operate well under low traffic loads and low number of simultaneous devices. However, they suffer from congestion as the traffic load and the number of devices increase. For this reason, unless revisited, the MAC layer can become a bottleneck for the success of the IoT. In this paper, we provide an overview of the existing MAC solutions for the IoT, describing current limitations and envisioned challenges for the near future. Motivated by those, we identify a family of simple algorithms based on distributed queueing (DQ), which can operate for an infinite number of devices generating any traffic load and pattern. A description of the DQ mechanism is provided and most relevant existing studies of DQ applied in different scenarios are described in this paper. In addition, we provide a novel performance evaluation of DQ when applied for the IoT. Finally, a description of the very first demo of DQ for its use in the IoT is also included in this paper.Peer ReviewedPostprint (author's final draft
Chipless-RFID : a review and recent developments
In this paper, a review of the state-of-the-art chipless radiofrequency identification (RFID) technology is carried out. This recent technology may provide low cost tags as long as these tags are not equipped with application specific integrated circuits (ASICs). Nevertheless, chipless-RFID presents a series of technological challenges that have been addressed by different research groups in the last decade. One of these challenges is to increase the data storage capacity of tags, in order to be competitive with optical barcodes, or even with chip-based RFID tags. Thus, the main aim of this paper is to properly clarify the advantages and disadvantages of chipless-RFID technology. Moreover, since the coding information is an important aspect in such technology, the di_erent coding techniques, as well as the main figures of merit used to compare di_erent chipless-RFID tags, will be analyzed
- …