1,949 research outputs found

    Watermarking-Based Digital Audio Data Authentication

    Get PDF

    State-of-the-art in techniques of text digital watermarking: challenges and limitations

    Get PDF
    Data protection from malicious attacks and misuse has become a crucial issue. Various types of data, including images, videos, audio and text documents, have given cause for the development of different methods for their protection. Cryptography, digital signatures and steganography are the most well known technologies used to protect data. During the last decade, digital watermarking technology has also been utilized as an alternative to prevent media forgery and tampering or falsification to ensure both copyright and authentication. Much work has been done to protect images, videos and audio but only a few algorithms have been considered for text document protection with digital watermarking. However, our survey observed that available text watermarking algorithms are neither robust nor imperceptible and as such remain unsecured methods of protection. Hence, research to improve the performance of text watermarking algorithms is required. This paper reviews current watermarking algorithms for text documents and categorizes text watermarking methods based on the way the text was treated during the watermarking process. It also discusses merits and demerits of available methods as well as recent proposed methods for evaluating text watermarking systems and the need for further research on digital text watermarking

    New security and control protocol for VoIP based on steganography and digital watermarking

    Get PDF
    In this paper new security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application's traffic. Additionally this solution offers authentication and integrity, it is capable of exchanging and verifying QoS and security parameters. It is based on digital watermarking and steganography that is why it does not consume additional bandwidth and the data transmitted is inseparably bound to the voice content.Comment: 8 pages, 4 figures, 1 tabl

    Analisis Watermarking Citra Digital Manggunakan Reversible Contrast Mapping

    Get PDF
    ABSTRAKSI: Watermarking merupakan cabang dari steganography. Watermarking adalah suatu teknik penyembunyian data di dalam data digital (citra, audio, video) namun keberadaannya tidak terlihat oleh indra manusia. Pada kasus content authentication dapat diketahui apakah citra hasil watermarking telah mengalami modifikasi. Apabila hasil ekstraksi citra label watermark berubah maka dapat dipastikan citra terwatermark sempat mengalami modifikasi. Watermarking yang dapat diterapkan pada content authentication yaitu reversible watermarking. Reversible watermarking digunakan pada kasus dimana original host yang digunakan sebagai konten penyisipan sangat berarti dimana degradasi dan distorsi tidak diperkenankan sebagai contoh dalam arsip multimedia, military image processing, dan medical image processing untuk data pasien. Diperlukan adanya pengecekan apakah citra terwatermark telah mengalami perubahan atau tidak. Dengan adanya reversible watermarking sebagai content authentication maka sebuah citra yang terwatermark dapat diketahui apabila sempat di modifikasi oleh pihak tertentu melalui hasil ekstraksi citra label watermark yang telah disisipkan.Dalam tugas akhir ini diimplementasikan dan dianalisis watermarking citra digital menggunakan Reversible Contrast Mapping pada citra digital berformat Bitmap. Reversible contrast mapping merupakan transformasi sederhana pada integer yang di aplikasikan kedalam pair-pair pixel citra digital. Skema ini dilakukan pada domain spatial tanpa menggunakan kompresi pada data yang disisipkan. Dengan memanfaatkan least significant bits (LSBs) untuk penyembunyian data.Kata Kunci : reversible contrast mapping, reversible watermarking, bitmap, least significant bits (LSB), domain spatial.ABSTRACT: Watermarking is a branch of steganography. Watermarking is a technique to inserted data into digital host (image digital, audio, video) however it does not look by the people. In content authentication, host image known modified by extracting the watermark. If the watermark is not decidely, we conclude that the host image has been modified. One example watermarking for content authentication is reversible watermarking. Reversible watermarking is used in case when the original host is very important that does not allow any degradation and distorsion like multimedia archieves, military image processing and medical image processing to patient. So the content authentication is needed to verify the host image. By reversible watermarking implement to content authentication we know if the image has been modified or not by ectracting label watermark.In this final project, it will be implemented and analysed digital image watermarking by reversible contrast mapping based on bitmap digital image. Reversible contrast mapping is a simple integer transform that applies to pairs of pixels. This scheme based on spatial domain without any data compression in inserted data. This scheme using least significant bits (LSB) to do insertion.Keyword: reversible contrast mapping, reversible watermarking, bitmap, least significant bits (LSB), spatial domain

    A Survey of Digital Watermarking Techniques and its Applications

    Full text link
    Digital media is the need of a people now a day as the alternate of paper media.As the technology grown up digital media required protection while transferring through internet or others mediums.Watermarking techniques have been developed to fulfill this requirement.This paper aims to provide a detailed survey of all watermarking techniques specially focuses on image watermarking types and its applications in today world.Comment: 4 Page

    Fast compressed domain watermarking of MPEG multiplexed streams

    Get PDF
    In this paper, a new technique for watermarking of MPEG compressed video streams is proposed. The watermarking scheme operates directly in the domain of MPEG multiplexed streams. Perceptual models are used during the embedding process in order to preserve the quality of the video. The watermark is embedded in the compressed domain and is detected without the use of the original video sequence. Experimental evaluation demonstrates that the proposed scheme is able to withstand a variety of attacks. The resulting watermarking system is very fast and reliable, and is suitable for copyright protection and real-time content authentication applications
    corecore