Filters








87 Hits in 4.8 sec

A Comparative Study of Different Encryption Methods Applied to CDMA to Enhance Security

Allamprabhu V. Kolaki, Dr.G.A. Bidkar
2016 Bonfring International Journal of Research in Communication Engineering  
The advantages and limitations of the different techniques are discussed.  ...  The paper presents a comparison of different encryption methods applied to Code Division Multiple Access to enhance security, in terms of performance, applications and implementation.  ...  In Frequency Division Duplexing, two frequencies are used-one for forward channel &another for reverse channel. At the time of call, other user cannot share the same frequency band.  ... 
doi:10.9756/bijrce.8205 fatcat:f3ydly72fbanfkivgh6r3a2gii

Multimedia authenticity with ICA watermarks

Steven E. Noel, Harold H. Szu, Harold H. Szu, Martin Vetterli, William J. Campbell, James R. Buss
2000 Wavelet Applications VII  
We give an overview of the current state of multimedia authenticity protection, including the requirements of various multimedia applications, current approaches to the problem, and the robustness of the  ...  We show how these new approaches contribute to a flexible, robust, and relative secure system for protecting the authenticity of multimedia products.  ...  Unauthorized removal of the watermark degrades quality of the product being pirated.  ... 
doi:10.1117/12.381712 fatcat:ubi6tewzdnfaxkcq2mgpagsj2u

Physical Layer Watermarking of Direct Sequence Spread Spectrum Signals

Xiang Li, Chansu Yu, Murad Hizlan, Won-Tae Kim, Seungmin Park
2013 MILCOM 2013 - 2013 IEEE Military Communications Conference  
USRP A popular set of RF hardware that can be used with GNU Radio is the Univer- are the frequency specific front-ends in the range of 0 Hz to 6 GHz.  ...  The authors introduced two properties to evaluate their authentication signal, namely the ratio of the authentication symbol rate to the primary signal rate (ASR) and the ratio of the authentication signal  ... 
doi:10.1109/milcom.2013.88 dblp:conf/milcom/LiYHKP13 fatcat:meo5cwb3ybgg5ft3l6r55m5ulq

Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview

Raniyah Wazirali, Rami Ahmad, Ahmed Al-Amayreh, Mohammad Al-Madi, Ala' Khalifeh
2021 Electronics  
Digital watermarking is a trend in security techniques that hides data by using data embedding and data extraction processes.  ...  Finally, the paper provides the motivations, objectives and applications of the recent secure watermarking techniques in IoT and summarises them into one table.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics10141744 fatcat:fcyxojd22fe2jfp3acafsqq2wy

An Investigation on Image Secret Sharing

Saman Salehi, Mohammad Ali Balafar
2015 International Journal of Security and Its Applications  
These goals were used in this paper to compare current methods of image secret sharing and present their properties and limitations.  ...  In Section 4, secret sharing is considered in frequency domain. Section 5 is devoted to the analysis and recommendations.  ...  At last, the watermark is recovered and can be used to analyze the copyright. Secret sharing in frequency domain can be useful in copyright protection and watermarking.  ... 
doi:10.14257/ijsia.2015.9.3.16 fatcat:hteex5xgtbf7boxes3jjvdeeva

Review on attacks, problems, and weaknesses of digital watermarking and the pixel reallocation attack

K. F. Tsang, Oscar C. L. Au, Ping W. Wong, Edward J. Delp III
2001 Security and Watermarking of Multimedia Contents III  
SDMI), which requires highest robustness and is subjected to all kind of attacks in various conditions.  ...  In Section 2, we describe the said digital watermarking model. Different types of attacks are classified in Section 3.  ...  frequency part of the original signal.  ... 
doi:10.1117/12.435422 dblp:conf/sswmc/TsangA01a fatcat:jhgclqraa5aknbth4iixvvxxnu

Reversible Digital Image Watermarking Scheme Using Bit Replacement and Majority Algorithm Technique

Koushik Pal, Goutam Ghosh, Mahua Bhattacharya
2012 Journal of Intelligent Learning Systems and Applications  
The current paper presents a new digital watermarking method through bit replacement technology, which stores multiple copies of the same data that is to be hidden in a scrambled form in the cover image  ...  The most straight-forward method of watermark embedding would be to embed the watermark into the least-*  ...  In the present paper the work implements both authentication and confidentiality in a reversible [10] manner without affecting the image in any way.  ... 
doi:10.4236/jilsa.2012.43020 fatcat:lyigsxqopncnfkkurqrzf7n74y

Chaotic Reversible Watermarking Method Based on IWT with Tamper Detection for Transferring Electronic Health Record

Mahboubeh Nazari, Arash Maneshi, Azeem Irshad
2021 Security and Communication Networks  
In this paper, a secure, lightweight, reversible, and high capacity watermarking algorithm with tamper detection capability is proposed for IoT based healthcare systems.  ...  Investigations on experimental results and criterions such as Peak Signal to Noise Ratio (PSNR) and Bit Error Ratio (BER) above 45.41 dB and 0.04, respectively, for payload of 432,538 bits indicate that  ...  Acknowledgments Special thanks are due to Iman Dorostkar Ahmadi who helped us by implementing this work.  ... 
doi:10.1155/2021/5514944 fatcat:ysor2orvqrdnhpcvob7tds6t5a

COiN-Video: A Model for the Dissemination of Copyrighted Video Streams over Open Networks [chapter]

Dimitris Thanos
2001 Lecture Notes in Computer Science  
Models for the commercialization of video streams that preserve copyrights and scale well to a large number of users would allow deployment of new services.  ...  Traditional models for video stream commercialization suffer from copyright infringement as digital technologies allow for easy and low cost reproduction of digital content.  ...  This reversible operation transforms each video block (8x8 pixels) from the amplitude domain to the frequency domain.  ... 
doi:10.1007/3-540-45496-9_13 fatcat:7mgqwvhnzzggvnhhncneulzzom

Intelligent Video Data Security: A Survey and Open Challenges

Jin-Yong Yu, Yujun Kim, Young-Gab Kim
2021 IEEE Access  
This is because face models turn into chaotic signals after scrambling.  ...  [P1] proposed access control based on video surveillance combined with a face recognition system through machine learning and radio frequency identification (RFID).  ... 
doi:10.1109/access.2021.3057605 fatcat:ysfjqskz2rgwtfgcjmjx4nqiky

Audio Watermarking for Security and Non-Security Applications

Maha Charfeddine, Eya Mezghani, Salma Masmoudi, Chokri Ben Amar, Hesham Alhumyani
2022 IEEE Access  
The watermarking can be used in reality in several types of applications that target two different contexts; the first for security applications and the second for non-security ones.  ...  In this scheme, extracted watermark will advise about the audio class: music or speech, the speaker gender and emotion.  ...  and to the use of the Arnold transformation [32] scrambling the watermark and ameliorating then the security level.  ... 
doi:10.1109/access.2022.3145950 fatcat:kkawupgcjrdotpag3uwhycgxou

Real Time Implementation of Digital Watermarking Algorithm for Image and Video Application [chapter]

Amit Joshi, Vivekanand Mishra, R. M.
2012 Watermarking - Volume 2  
Encryption can be used to prevent unauthorized access of the watermarked data. c.  ...  Cryptography: It scrambles a message into a code to obscure its meaning. Scrambling of message is done with help of secret key.  ...  The down sampling is a lossy process and thus down sampling of chroma signals (Cb and Cr) are lost that can not be retrieved by reverse process of up sampling at receving end.  ... 
doi:10.5772/37182 fatcat:zwq2tjyxxvdzlhsrf6j54rvgfq

Digital Watermarking of video streams: Review of the State-Of-The-Art [article]

Romain Artru, Alexandre Gouaillard, Touradj Ebrahimi
2019 arXiv   pre-print
The equilibrium point is to be found using the needed properties of the watermark and by studying the threat model that the scheme will have to face.  ...  In particular, a lot of research has been made about video watermarking and it can make it quite difficult to put into perspective the various schemes possible in order to implement a watermarking process  ...  and authentication.  ... 
arXiv:1908.02039v2 fatcat:oq3gtlfsvnbtvf5nwisnm3pzey

Multimedia watermarking techniques

F. Hartung, M. Kutter
1999 Proceedings of the IEEE  
The basic concepts of watermarking systems are outlined and illustrated with proposed watermarking methods for images, video, audio, text documents, and other media.  ...  Robustness and security aspects are discussed in detail. Finally, a few remarks are made about the state of the art and possible future developments in watermarking technology.  ...  , quality, and strength and were also used to date and authenticate paper.  ... 
doi:10.1109/5.771066 fatcat:e3hxw7y2s5hrdmvjrzjabognpi

Overview of securing multimedia content using efficient encryption methods and modes

K. John Singh, Kunal Gagneja
2017 International Journal of Advanced and Applied Sciences  
Multimedia comprises of audio, text, image and video. Use of multimedia is increasing because of improvements in hardware, algorithms and networking.  ...  In this paper, possibilities of securing multimedia data using various encryption methods and modes are analyzed and compared on the basis of their execution speed, hardware implementation and various  ...  Authentication, watermarking, digital signature, access control and stenography are some of the methods of attaining security.  ... 
doi:10.21833/ijaas.2017.010.013 fatcat:kiebkobk5remfjnn7uwrw7q3hu
« Previous Showing results 1 — 15 out of 87 results