oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Improved Digital Watermarking Techniques and Data Embedding In Multimedia
Ajay Goel,Rupesh Gupta,O.P.Sahu,Sheifali Gupta
International Journal on Computer Science and Engineering , 2010,
Abstract: Digital watermarking is a technology being developed to ensure security and protection of multimedia data. The purpose of digital watermarking is not to restrict use of multimedia resources, but rather to facilitate data authentication and copyright protection. In this paper, we discuss the general requirements on data hiding and digital watermarking. It includes topics in spatial watermarking;spread spectrum watermarking, spectral watermarking, and a brief survey of currently available commercial and public domain software are provided. The Improved technique is robust to image/video compression, and one can recover the hidden data without requiring the availability of the host signal. The new scheme enables signature images to be as much as 25% of the host image data, and hence could be used both in digital watermarking as well as in image data embedding.
Data Embedding In Multimedia and Improved Digital Watermarking Techniques  [PDF]
Kishore Nerella,Ch GVN Prasad,Kishore Kumar Kalluri,Nagendra Chary Kotthoju
International Journal of Computer Technology and Applications , 2011,
Abstract: Digital watermarking is a technology being developed to ensure security and protection of multimedia data. The purpose of digital watermarking is not to restrict use of multimedia resources, but rather to facilitate data authentication and copyright protection. In this paper, we discuss the general requirements on data hiding and digital watermarking. It includes topics in spatial watermarking; spread spectrum watermarking, spectral watermarking, and a brief survey of currently available commercial and public domain software are provided. The Improved technique is robust to image/video compression, and one can recover the hidden data without requiring the availability of the host signal. The new scheme enables signature images to be as much as 25% of the host image data, and hence could be used both in digital watermarking as well as in image data embedding.
An improved axiomatic definition of information granulation  [PDF]
Ping Zhu
Computer Science , 2009,
Abstract: To capture the uncertainty of information or knowledge in information systems, various information granulations, also known as knowledge granulations, have been proposed. Recently, several axiomatic definitions of information granulation have been introduced. In this paper, we try to improve these axiomatic definitions and give a universal construction of information granulation by relating information granulations with a class of functions of multiple variables. We show that the improved axiomatic definition has some concrete information granulations in the literature as instances.
Improvements in a Puzzle Authentication Method  [PDF]
Yutaka Hirakawa, Ayaka Shimoda, Isao Sasano, Kazuo Ohzeki
Journal of Computer and Communications (JCC) , 2018, DOI: 10.4236/jcc.2018.61002
Abstract:
This article discusses improvements in a puzzle authentication method that adopts the interface of the Puzzle and Dragons game [1] and is tolerant against video-recording attacks. A problem that the conventional puzzle authentication methods face is that they are time consuming and have low success rate in authentication. We evaluated improvements of the interface to verify the usability of the improved system. The results suggested that the usability in terms of operation time and authentication success rate attained a level that was comparable with other leading methods in the field.
Analysis and Improvement of a User Authentication Improved Protocol  [cached]
Zuowen Tan
Journal of Networks , 2010, DOI: 10.4304/jnw.5.5.622-630
Abstract: Remote user authentication always adopts the method of password to login the server within insecure network environments. Recently, Peyravin and Jeffries proposed a practical authentication scheme based on one-way collision-resistant hash functions. However, Shim and Munilla independently showed that the scheme is vulnerable to off-line guessing attacks. In order to remove the weakness, H lbl, Welzer and Brumenn presented an improved secure password-based protocols for remote user authentication, password change and session key establishment. Unfortunately, the remedies of their improved scheme cannot work. The improved scheme still suffers from the off-line attacks. And the password change protocol is insecure against Denial-of-Service attack. A proposed scheme is presented which overcomes these weaknesses. Detailed cryanalysis show that the proposed password-based protocols for remote user authentication, password change and session key establishment are immune against man-in-the-middle attacks, replay attacks, password guessing attacks, outsider attacks, denial-of-Service attacks and impersonation attacks.
A robust speech authentication algorithm based on perceptual characteristics
一种基于感知特性的鲁棒性语音认证算法

GU Jin,GUO Li,ZHENG Dong-Fei,
古今
,郭立,郑东飞

中国科学院研究生院学报 , 2009,
Abstract: At present, there is a growing need for multimedia information authentication, but studies on speech authentication are rare. Based on perceptual characteristics, a robust speech authentication algorithm is proposed to combine the psychoacoustic properties with signature algorithm. It meets the requirements of entity authentication and content authentication, and resists the channel noise as well. Analyzing the perceptual properties, such as masking effect and non-linear effect, speech redundancy in both temporal field and frequency field is eliminated, and perceptual parameters are extracted. Then an improved Rainbow algorithm is used to sign the extracted data. Experiment results demonstrate good robustness and uniqueness of the algorithm when applied to the robust authentication of audio communication.
Secure Digital Watermarking-Based Authentication Techniques for Real Time Multimedia Communication  [PDF]
K. Hari Babu Yadav1 , G.J. Prakash Babu2 , M. Ramesh Babu3 , D. Ravi Tej
International Journal of Engineering Trends and Technology , 2011,
Abstract: Digital watermarking for multimedia authentication needs for authenticating digital media in this information era and the two main categories of authentication techniques employed to meet these needs, namely labeling -based techniques and watermarking-based techniques. Data integrity and source origin authentication are essential topics for real-time multimedia systems. But the traditional methods are not very applicable to overcome the distortion introduced in multimedia data transportation. In this paper some security mechanics are proposed, which rely on authentication rather than on encryption methods.The highly asymmetric architectures found in ubiquitous computing applications are exploited to provide a protection of the transmitted multimedia data by means of well knowndigital watermarking techniques are introduced to meet this need, a content-based image authentication scheme that issuitable for an insecure network and robust to transmission errors. In proposed scheme, The Communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. Discovery of such routes is a major task, both from efficiency and security points of view.
A Multimedia Authentication System Combining Digital Signature and Digital Watermarking
结合数字签名和数字水印的多媒体认证系统

HU Jun-Quan,HUANG Ji-Wu,ZHANG Long-Jun,HUANG Da-Ren,
胡军全
,黄继武,张龙军,黄达人

软件学报 , 2003,
Abstract: In this paper, the issues of entity authentication and content authentication mechanism of the digital signature based on multimedia system are addressed. Based on the analysis of the security gap in the authentication mechanism using digital signature, a novel authentication protocol combining digital signature and fragile watermarking are proposed. Double entity authentication based on digital signature and content authentication base on fragile watermarking is achieved. Illegal access to system, edition, and forgery of multimedia document is proven to be impossible. According to the analysis, the security, creditability, and authenticity are achieved.
Computational costs of data definition at the quantum - classical interface  [PDF]
Chris Fields
Physics , 2010,
Abstract: Model-independent semantic requirements for user specification and interpretation of data before and after quantum computations are characterized. Classical computational costs of assigning classical data values to quantum registers and to run-time parameters passed across a classical-to-quantum application programming interface are derived. It is shown that the classical computational costs of data definition equal or exceed the classical computational cost of solving the problem of interest for all applications of quantum computing except computations defined over the integers and the simulation of linear systems with linear boundary conditions.
An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards  [PDF]
Al-Sakib Khan Pathan,Choong Seon Hong
Computer Science , 2007, DOI: 10.1093/ietisy/e90-d.11.1885
Abstract: With the recent proliferation of distributed systems and networking, remote authentication has become a crucial task in many networking applications. Various schemes have been proposed so far for the two-party remote authentication; however, some of them have been proved to be insecure. In this paper, we propose an efficient timestamp-based password authentication scheme using smart cards. We show various types of forgery attacks against a previously proposed timestamp-based password authentication scheme and improve that scheme to ensure robust security for the remote authentication process, keeping all the advantages that were present in that scheme. Our scheme successfully defends the attacks that could be launched against other related previous schemes. We present a detailed cryptanalysis of previously proposed Shen et. al scheme and an analysis of the improved scheme to show its improvements and efficiency.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.