Filters








153 Hits in 4.4 sec

A Reversible Watermarking Scheme Based on Difference Expansion for Wireless Sensor Networks

Qun Ding, Baowei Wang, Xingming Sun, Jinwei Wang, Jian Shen
2015 International Journal of Grid and Distributed Computing  
In this paper, we propose a novel reversible watermarking authentication scheme RDE for WSNs, which is based on the difference expansion of a generalized integer transform.  ...  Wireless sensor networks are self-organized and data-centric. Sensors are typically operated in uncontrolled and possibly hostile environment.  ...  Introduction Wireless sensor network (WSN) is a self-organized and data-centric multi-hop network composed of base stations and a large number of multifunctional sensor nodes.  ... 
doi:10.14257/ijgdc.2015.8.2.14 fatcat:gz6xfabd6jae3otgkto53fk6yq

Multimedia authenticity protection with ICA watermarking and digital bacteria vaccination

Harold Szu, Steven Noel, Seong-Bin Yim, Jeff Willey, Joe Landa
2003 Neural Networks  
We show how these new approaches contribute to a flexible, robust, and secure system for protecting the authenticity of multimedia products.  ...  For watermark security, a covert independentcomponent watermarking signal can serve as a "vaccination" against a dormant digital "bacteria" protecting the multimedia data.  ...  Section III then applies ICA watermarks within a full framework for protecting multimedia authenticity.  ... 
doi:10.1016/s0893-6080(03)00132-1 pmid:12850050 fatcat:cdtcrq335fbp5fxl45smhdm4vu

Digital Image Forensics: Discovering The History Of Digital Images

Gurinder Singh, Kulbir Singh
2018 Zenodo  
In this paper, a survey is carried out on the forgery detection by considering the most recent and promising digital image forensic techniques.  ...  Multimedia forensics is devoted to analyze these contents by using various digital forensic techniques in order to validate their authenticity.  ...  The authentication methods based on watermarking involve in computing a portion of data or information and hiding it in the image. The authentication is performed by extracting the hidden data.  ... 
doi:10.5281/zenodo.1474989 fatcat:azdbjrvanjhrlfw7iqhks4zum4

A Lightweight Authentication Method in Perception Layer of IoT Through Digital Watermarking

2019 International journal of recent technology and engineering  
authentication based on temporal dynamics of sensing network.  ...  In this paper, a novel lightweight node to node authentication scheme based on watermark is proposed to solve the contradiction between the security and restricted resources of perception layer.  ...  Digital watermarking widely used to protect content integrity and copyright information of digital multimedia (video, audio, and images, etc.) [4] .  ... 
doi:10.35940/ijrte.c4793.098319 fatcat:je4ok7xxv5bipc6c7pvpmb3kia

Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach

Wei Zhang, Yonghe Liu, Sajal K. Das, Pradip De
2008 Pervasive and Mobile Computing  
Summary In this chapter, we propose a watermarking based authentication scheme for wireless sensor networks.  ...  We first propose an end-to-end authentication scheme based on digital watermarking, a proven technique notably in the multimedia domain.  ...  Then, This expresses the gateway's opinion about the cluster head CH 's report X as a It can be seen that along the transitive path, the belief portion in opinion decreases due to the increase in the uncertainty  ... 
doi:10.1016/j.pmcj.2008.05.005 fatcat:tihaicjm3bglzl4qr344dski3u

Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview

Raniyah Wazirali, Rami Ahmad, Ahmed Al-Amayreh, Mohammad Al-Madi, Ala' Khalifeh
2021 Electronics  
Digital watermarking is a trend in security techniques that hides data by using data embedding and data extraction processes.  ...  In addition, the paper highlights the potential to apply the modified watermark algorithms to secure IoT networks.  ...  As a result, reversible watermark systems were created to address this flaw by incorporating technology that can restore both the internal watermark and the original image.  ... 
doi:10.3390/electronics10141744 fatcat:fcyxojd22fe2jfp3acafsqq2wy

2011 Index IEEE Transactions on Information Forensics and Security Vol. 6

2011 IEEE Transactions on Information Forensics and Security  
., +, TIFS March 2011 96-106 Restoring Degraded Face Images: A Case Study in Matching Faxed, Printed, and Scanned Photos.  ...  ., +, TIFS March 2011 96-106 Restoring Degraded Face Images: A Case Study in Matching Faxed, Printed, and Scanned Photos.  ... 
doi:10.1109/tifs.2011.2176153 fatcat:i2wz3suxbnemvbinhkvjwesq2y

A secure digital camera architecture for integrated real-time digital rights management

Saraju P. Mohanty
2009 Journal of systems architecture  
The proposed method securely hides binary images in color image media and securely extracts and authenticates it by using a secret key.  ...  This paper presents a novel concept of a secure digital camera (SDC) with a built-in watermarking and encryption facility.  ...  addition and subtraction based on watermark image gray value together in a unified approach (as discussed in preceding sections).  ... 
doi:10.1016/j.sysarc.2009.09.005 fatcat:kqun2g2vfba7vmflupimq2m5dq

The use of computational intelligence in digital watermarking: Review, challenges, and new trends

Darwish, A. Abraham
2011 Neural Network World  
Karthik and Cedric Bornand, A novel CRT-based watermarking tech- nique for authentication of multimedia contents, Digital Signal Processing, Issue 2, 20, 2010, pp.442-453. [42] Jagdish C.  ...  Security in wireless sensor networks has recently caught the attention of the scientific research community with increasing the applications of sensors in use.  ... 
doi:10.14311/nnw.2011.21.017 fatcat:bygr6l7srzhijduwlh2or4zekm

Improving the Security of the Chien-Jan Protocol for Large Mobile Networks

Chao-Wen Chan, Rong-Yuan Wang
2007 Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)  
in visual sensor network H.  ...  Cheng, and Chi-Kwong Chan IIHMSP-2007-IS06-003 A Novel Semi-Fragile Image Watermarking, Authentication and Self-restoration Technique Using the Slant Transform X. Zhao, A.T.S. Ho, H. Treharne, V.  ... 
doi:10.1109/iihmsp.2007.4457537 dblp:conf/iih-msp/ChanW07 fatcat:jjurabaaqvem7eqbe5ewkzacfy

Detection and Localization of Image and Video Tampering

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
So, maintaining the authenticity and integrity of these digital contents is a major concern. For the past few years, researches were going on to find out tampering in the digital contents.  ...  Digital images and videos are widely used in various fields like courtrooms ,military ,medicine ,research, social media etc.  ...  In [15] , they focus for medical applications, using fragile watermarking-based schemes for image authentication and self-recovery.  ... 
doi:10.35940/ijitee.d1158.029420 fatcat:n7c7x22bofet5lizb2qurlxw4y

Guest Editorial: Recent Advances on Security and Privacy of Multimedia Big Data in the Critical Infrastructure

B. B. Gupta, Shingo Yamaguchi, Zhiyong Zhang, Konstantinos E. Psannis
2018 Multimedia tools and applications  
Specially, security and privacy of multimedia big data in the critical infrastructure (a nation's strategic national assets, i.e. banking and finance, communications, emergency services, energy, food chain  ...  Therefore, the papers of this special issue address variety of security and privacy challenges and developments in multimedia big data in critical infrastructure from the perspective of providing security  ...  of multimedia big data in sensor networks & Big data-enabling social networks on Clouds & Resource management for multimedia big data on Clouds & Cryptography, authentication and authorisation for big  ... 
doi:10.1007/s11042-018-6426-2 fatcat:jfuzcmb62fh3vajha3vdttj4km

A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT

Guoyin Zhang, Liang Kou, Liguo Zhang, Chao Liu, Qingan Da, Jianguo Sun
2017 Security and Communication Networks  
In this paper, a novel lightweight data integrity protection scheme based on fragile watermark is proposed to solve the contradiction between the security and restricted resource of perception layer.  ...  The perception layer is a self-organizing network system consisting of various resource-constrained sensor nodes through wireless communication.  ...  Digital watermarking technology is widely used to protect copyright information and content integrity of multimedia digital works (images, audio and video, etc.) [10] .  ... 
doi:10.1155/2017/3126010 fatcat:znongblafbdbnfdwrfr2uhfq34

Front Matter: Volume 7723

Proceedings of SPIE, Peter Schelkens, Touradj Ebrahimi, Gabriel Cristóbal, Frédéric Truchetet, Pasi Saarikko
2010 Optics, Photonics, and Digital Technologies for Multimedia Applications  
The last two digits indicate publication order within the volume using a Base 36 numbering system employing both numerals and letters.  ...  SPIE uses a six-digit CID article numbering system in which: The first four digits correspond to the SPIE volume number.  ...  (Taiwan) STEGANOGRAPHY AND WATERMARKING FOR MULTIMEDIA CONTENT AND SERVICES I 7723 0I Ensuring integrity and authenticity for images in digital long-term preservation (Invited Paper) [7723-17] M  ... 
doi:10.1117/12.867884 fatcat:vyrzkh5jazhyvdgclkz347auqe

Blockchain-watermarking for Compressive Sensed Images

Ming Li, Leilei Zeng, Le Zhao, Renlin Yang, Dezhi An, Haiju Fan
2021 IEEE Access  
Although watermarking technology can guarantee the integrity and availability of the host image, it cannot realize the privacy protection of multimedia data in the open network environment.  ...  In addition, a two-dimensional projection image algorithm is proposed to reconstruct the image. In [5] , a secure image coding scheme based on compressed sensing is proposed.  ... 
doi:10.1109/access.2021.3072196 fatcat:vin3zooj6rd5zgwk2rudyxhsjy
« Previous Showing results 1 — 15 out of 153 results