Information Hiding by Stochastic Diffusion and its Application to Printed Document Authentication
|
|
|
- Beverly Berry
- 10 years ago
- Views:
Transcription
1 ISSC 2009, UCD, June 10-11th Information Hiding by Stochastic Diffusion and its Application to Printed Document Authentication SFI Stokes Professor of DSP Faculty of Engineering Dublin Institute of Technology Jonathan Blackledge and Eugene Coyle School of Electrical Engineering Systems Faculty of Engineering Dublin Institute of Technology Abstract The use of image based information exchange has grown rapidly over the years in terms of both e-to-e image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking, information hiding and covert encryption methods which can be applied to both electronic and printed images (and documents) for the purposes of authentication, prevent unauthorized copying and, in the case of printed documents, withstand abuse and degradation before and during scanning. In this paper we consider the background to a new method to hiding image based information by diffusing it with a stochastic field (uniformly distributed noise). This diffusion only approach is used specifically to design a system for authenticating printed information that is robust to a low resolution print-scan cycle. Keywords Information Hiding, Stochastic Diffusion, Print Authentication. I Introduction In this paper, an approach to image information hiding is presented and some possible applications considered. It is based on computing a scrambled image by diffusing an input image with a stochastic field (a cipher). For e-to-e applications, a cover image (covertext) can be applied subject to a user defined diffusion-to-covertext ratio. The information is subsequently recovered by removing the covertext and then correlating the output with the original (key dependent) cipher. This approach provides the user with a method of hiding imagebased information in a host image before transmission of the data. In this sense, the method provides a steganographic approach to transmitting encrypted information that is not apparent during an intercept [1]. Decryption is based on knowledge of the key(s) and access to the host image. With regard to digital image analysis and e-to-e communications, the method provides a way of embedding information in an image that can be used for authentication from an identifiable source, a method that is relatively insensitive to lossy compression, making it well suited to digital image transmission. However, with regard to document authentication, use of a covertext is not robust. The reason for this is that the registration of pixels associated with a covertext can not be assured when the composite image is printed and scanned. We therefore consider a diffusion only approach to document authentication. This is because the process of diffusion (i.e. the convolution of information with a cipher) is compatible with the physical principles of an imaging systems and thus, with image capture devices (digital cameras and scanners, for example) that, by default, conform to the physics of optical image formation [2]. The diffusion of plaintext (in this case, an image) with a stochastic field (the cipher) has a synergy with the encryption of plaintext using a cipher and an XOR operation (when both the plaintext and cipher are represented as binary streams) [3], [4]. However, decryption of a convolved im-
2 age (deconvolution) is not as simple as XORing the ciphertext with the appropriate cipher. Here, we consider an approach which is based on preconditioning the original cipher in such a way that decryption (de-diffusion) can be undertaken by correlating the ciphertext with the cipher. The output ciphertexts generated for printed document authentication are textures of a type that are determined by the spectral characteristics of the plaintext which can be applied using low resolution Commercial-Off-The-Shelf (COTS) printers and scanners. In this sense, the approach is based on a form of texture coding. II Stochastic Diffusion and Confusion In terms of plaintexts, diffusion is concerned with the issue that, at least on a statistical basis, similar plaintexts should result in completely different ciphertexts even when encrypted with the same key. This requires that any element of the input block influences every element of the output block in an irregular fashion. In terms of a key, diffusion ensures that similar keys result in completely different ciphertexts even when used for encrypting the same block of plaintext. This requires that any element of the input should influence every element of the output in an irregular way. This property must also be valid for the decryption process because otherwise an intruder may be able to recover parts of the input from an observed output by a partly correct guess of the key used for encryption. The diffusion process is a function of the sensitivity to initial conditions, conditions that all cryptographic systems should have. Further, all cryptographic systems should exhibit an inherent topological transitivity causing the plaintext to be mixed through the action of the encryption process. The process of confusion ensures that the (statistical) properties of plaintext blocks are not reflected in the corresponding ciphertext blocks. Every ciphertext must have a random appearance to any observer and be quantifiable through appropriate statistical tests. Diffusion and confusion are processes that are of fundamental importance in the design and analysis of cryptological systems, not only for the encryption of plaintexts but for data transformation in general. Consider the fundamental imaging equation given by [6] u(x, y) = p(x, y) 2 u 0 (x, y) + n(x, y) where u 0 is the input (information associated with the object plane ) u is the output (information associated with the image plane ), p is the Point Spread Function (PSF), n is the noise function (where Pr[n(x, y)] is, ideally, known a priori 1 ) 1 Pr denotes the Probability Density Function. and 2 denotes the two-dimensional convolution integral. In optics, both the operator 2 and the functional form of p are derived from solving a physical problem (using a Green s function solution) compounded in a particular Partial Differential Equation (e.g. the wave equation or the diffusion equation) [5]. For example, if u is taken to be due to the diffusion of light through an optical diffuser and thereby a solution to the diffusion equation (with initial condition u 0 ), then at a time T ( x 2 + y 2 ) p(x, y) = exp 4DT where D is the Diffusivity of the diffuser. This is an example of Gaussian diffusion since the characteristic Point Spread Function is a Gaussian function. However, in general, a variety of PSFs are possible with regard to the fundamental imaging equation and the imaging systems to which it applies as a basic model. The PSF of an imaging system is fundamental to its characterisation and may be derived theoretically and/or experimentally. However, in Cryptology, we are free to choose any PSF. Stochastic diffusion involves interchanging the roles of p and n, i.e. replacing p(x, y) - a deterministic PSF - with n(x, y) - a stochastic function. Thus, stochastic or noise diffusion is compounded in the result u(x, y) = n(x, y) 2 u 0 (x, y) + p(x, y) where p can now be any function including a stochastic function, i.e. u(x, y) = n 1 (x, y) 2 u 0 (x, y) + n 2 (x, y) where both n 1 and n 2 are stochastic functions which may be of the same type (i.e. have the same PDFs) or of different types (with different PDFs). The simplest form of stochastic diffusion is based on the equation u(x, y) = n(x, y) 2 u 0 (x, y). There are two approaches to solving the inverse problem: Given u and n, obtain u 0. We can deconvolve by using the convolution theorem giving [ u 0 (x, y) = F2 1 U(kx, k y )N ] (k x, k y ) N(k x, k y ) 2 where N is the Fourier transform of n, U is the Fourier transform of u, F2 1 denotes the (twodimensional) inverse Fourier transform and k x and k y are the spatial frequencies in the Fourier plane. However, this approach requires regularization in order to eliminate any singularities when N 2 0 through application of a constrained deconvolution filter such as the Wiener filter [7]. Alternatively, if n is the result of some random number generating algorithm, we can construct the
3 stochastic field m(x, y) = F 1 2 [ N ] (k x, k y ) N(k x, k y ) 2 where N(k x, k y ) 2 > 0, the diffused field now being given by u(x, y) = m(x, y) 2 u 0 (x, y). The inverse problem is then solved by correlating (denoted by 2 ) u with n, since 2 and n(x, y) 2 u(x, y) N (k x, k y )U(k x, k y ) N (k x, k y )U(k x, k y ) = N (k x, k y )M(k x, k y )U 0 (k x, k y ) = N (k x, k y ) N (k x, k y ) N(k x, k y ) 2 U 0(k x, k y ) = U 0 (k x, k y ) so that u 0 (x, y) = n(x, y) 2 u(x, y). The condition that N(k x, k y ) 2 > 0 is simply achieved by implementing the following process: k x, k y, if N(k x, k y ) 2 = 0, then N(k x, k y ) 2 = 1. This result can be used to hide an image in another image as discussed in the following section. III Digital Image Watermarking Consider the case when we have two independent images i 1 (x, y) 0 x, y and i 2 (x, y) 0 x, y and we consider the case of embedding i 1 with i 2. We construct a stochastic field m(x, y) 0 x, y a priori and consider the equation where u(x, y) = rm(x, y) 2 i 1 (x, y) + i 2 (x, y) (1) m(x, y) 2 i 1 (x, y) = 1 and i 2 (x, y) = 1. By normalising the terms in this way, the coefficient 0 r 1 can be used to adjust the relative magnitudes of the terms such that the diffused image i 1 is a perturbation of the host image (covertext) i 2. This provides us with a way of digital watermarking [8] one image with another, r being referred to as the watermarking ratio 3. For applications in image watermarking, stochastic diffusion has two principal advantages: (i) a stochastic field provides more uniform diffusion than a deterministic function does; (ii) stochastic fields can be generated using random number generators that 2 Where denotes the transformation from image to Fourier space. 3 Equivalent, in this application, to the standard term Signal-to-Noise or SNR ratio as used in signal and image analysis. Fig. 1: Example of watermarking one image with another using stochastic diffusion. The host image i 2 (top-left ) is watermarked with the watermark image i 1 (top-centre) using the diffuser (top-right) which is uniformly distributed random noise n whose pixel-by-pixel values depend upon the seed used (the private key). The result of computing m 2 i 1 (bottom-left) is added to the host image for r = 0.1 in equation (1) to generate the watermarked image u (bottom-centre). Recovery of the watermark image i 1 (bottom-right) is accomplished by subtracting the host image from the watermarked image and correlating the result with n. depend on a single initial value or seed (i.e. a private key). An example of this approach is shown in Figure 1. Here, an image i 2 (the host image ) is watermarked with another image i 1 using stochastic diffusion. Because r = 0.1, the output u is only slightly perturbed by the stochastic field m(x, y) 2 i 1 (x, y) and hence u i 2 (at least from a visual perspective). a) Stochastic Field Generation The stochastic field n used to compute m, can be generated using a range of (uniformly distributed) pseudo random number generators based on conventional (substitution) encryption algorithms coupled with existing key exchange protocols. The output array n is normalized so that n = 1 and used to generate n(x, y) on a rowby-row or column-by-column basis. Recovery of the watermark image requires knowledge of two keys: (i) the key used to generate n; (ii) the host image i 2. b) Statistical Analysis The expected statistical distribution associated with stochastic diffusion is Gaussian. This can be shown if we consider i 1 to be a strictly deterministic function described by a sum of N delta functions. Thus if then i 1 (x, y) = N i=1 j=1 N δ(x x i )δ(y y j ) u(x, y) = m(x, y) 2 i(x, y)
4 N N = m(x x i, y y j ). i=1 j=1 Each function m(x x i, y y j ) is just m(x, y) shifted by x i, y j and will thus be identically distributed. Hence, from the Central Limit Theorem N N Pr[u(x, y)] = Pr m(x x i, y y j ) = i=1 j=1 N Pr[m(x, y)] Pr[m(x, y)] 2 Pr[m(x, y)] 2... i=1 and we can expect Pr[u(x, y)] to be normally distributed for large N. IV Print Authentication The approach discussed in Section III can be used generally for e-to-e type communications where there is no loss of information. Steganography and watermarking techniques for hardcopy data (print) authentication have to be robust to the significant distortions generated by the printing and scanning processes as well as general soiling incurred through day-to-day use. If a watermarked image is printed and scanned back into electronic form, then the print/scan process will yield an array of pixels that will be different from the original electronic image even though it might look similar. These differences can include the size of the image, its orientation, brightness, contrast and so on. a) Diffusion Based Method With respect to equation (1), of all the processes involved in the recovery of the watermark, the subtraction of the host image from the watermarked image is critical. If this process is not accurate on a pixel-by-pixel basis and deregistered for any of many reasons, then recovery of the watermark by correlation will not be effective. However, if we make use of the diffusion process alone, then the watermark can be recovered via a print/scan because of the compatibility of the optical processes involved (i.e. convolution of an object function with the PSF). Depending on the printing process applied, a number of distortions will occur which diffuse the information being printed. Thus, in general, we can consider the printing process to introduce an effect that can be represented by the convolution equation u print = p print 2 u. where u is the original electronic form of a diffused image (i.e. u = m 2 i where i is the input image) and p print is the PSF of the printer. An incoherent image of the data, obtained using a flat bed scanner, for example (or any other incoherent optical imaging system), will also have a characteristic PSF p scan. Thus, we can consider a scanned image to be given by u scan = p scan 2 u print where u scan is taken to be the digital image obtained from the scan. Now, because convolution is commutative, we can write where u scan = p scan/print 2 m 2 i = m 2 p scan/print 2 i p scan/print = p scan 2 p print which is the print/scan point spread function associated with the processing cycle of printing the image and then scanning it. Thus, the process u(x, y) = m(x, y) 2 i(x, y) used to generate the data u and the process i(x, y) = n(x, y) 2 u(x, y) used to recover the image i produces a reconstruction for i whose fidelity is determined by the scan/print PSF. The principal requirement to do this in practice, is to re-size the scanned image back to the size of the original digital image i. This is due to the scaling relationship (for a function f with Fourier transform F ) f(αx, βy) 1 ( αβ F kx α, k ) y. β The size of an image captured by a scanner or other device will depend on the resolution used. The size of the image obtained will inevitably be different from the original because of the resolution and window size used to print the diffused image u and the resolution used to scan the image. Since scaling in the spatial domain causes inverse scaling in the Fourier domain, the scaling effect must be inverted before the watermark can be recovered by correlation since correlation is not a scale invariant process. Re-sizing the image (using an appropriate interpolation scheme such as the bi-cubic method, for example) requires a set of two numbers N 1 and N 2 (i.e. the N 1 N 2 array used to generate n and m) that, along with the key required to regenerate n, provides the private keys needed to recover the data from the diffused image. An example of this approach is given in Figure 2 which shows the result of reconstructing four different images (a photograph, finger-print, signature and text) used in the design of an impersonalized bank card. The use of diffusion only watermarking for print security can be undertaken in colour by applying exactly the same diffusion/reconstruction methods to the red, green and blue components independently (as illustrated in Figure 2). Because this method is based on convolution alone, the reconstruction is not negated
5 Fig. 2: Example of the application of diffusion only watermarking. In this example, four images of a face, fingerprint, signature and text have been diffused using the same stochastic field m and printed on the front (top-left) and back (bottom-left) of an impersonalized identity card using a 600 dpi printer. The reconstructions (top-right and bottom-right, respectively) are obtained using a conventional flat-bed scanner operating at 300 dpi. by any distortion of the PSF associated with the print/scan process, just limited or otherwise by its characteristics. Thus, if an image is obtained of the printed data field which is out of focus due to the characteristics of pscan/print, then the reconstruction of will be out of focus to the same degree. Decryption of images with this characteristic is only possible using an encryption scheme that is based on a diffusion only approach. The tolerance of this method to printing and scanning is excellent (details of which lie beyond the scope and extent of this paper) provided the output is cropped accurately (to within a few pixels) and oriented correctly. Figure 3 shows another example of the technique applied to a composite image scanned from a passport, an application which is cheap and simple to implement with regard to authenticating a passport holders personal information. The degradation associated with the reconstruction is due to the low resolution of the printing and scanning rather than the information hiding method. Unless the correct stochastic field is used (as determined by the keys), it is not possible to reconstruct the image making counterfeiting or forgery improbable. b) Covert Information Hiding Digital watermarking is usually considered to be a method in which the watermark is embedded into a host image in an unobtrusive or near-unobtrusive way. In the context of the approach considered here, this can be achieved if we diffuse the host image with another image to generate a stochastic field. Consider two images i1 and i2. Suppose we con- Fig. 3: Example of the stochastic diffusion method applied to passport authentication: Original image scanned from a passport at 400dpi (above), printed image after applying stochastic diffusion (centre) and reconstruction after scanning the printed stochastic field at 300dpi (below).
6 struct the following function n = F 1 2 ( I1 I 1 2 I 2 where I 1 = F 2 [i 1 ] and I 2 = F 2 [i 2 ]. If we now correlate n with i 1, then from the correlation theorem ) i 1 2 n I 1 I 1 I 1 2 I 2 i 2. In other words, we can recover i 2 from i 1 with knowledge of n. Because this process is based on convolution and correlation alone, it is compatible and robust to printing and scanning, i.e. incoherent optical imaging as discussed in Section IV(a). An example of this is given in Figure 4. In this scheme, the host image can be considered to be a public key and the stochastic field n the private key required to reconstruct the hidden image. Clearly, in the context of this public/private key paradigm, the private key needs to be encrypted in order to ensure the security of any system that is based on this approach. V Application to Covert Encryption One of the principal components associated with the development of methods and algorithms to break ciphertext is the analysis of the output generated by an attempted decrypt and its evaluation in terms of an expected type. The output type is normally assumed to be plaintext, i.e. to be in the form of characters, words and phrases associated with a natural language. For e-to-e applications, if a plaintext document is converted into an image file, then the method described in Section IV(b) on Covert Information Hiding can be used to diffuse the plaintext image i 2 using any other image i 1 to produce the field n. If both i 1 and n are then encrypted, any attack on these data will not be able to make use of an analysis cycle which is based on the assumption that the decrypted output is plaintext. This approach provides the user with a relatively simple method of confusing the cryptanalyst and invalidates attack strategies that have been designed and developed on the assumption that the encrypted data have been derived from plaintext alone. VI Conclusions The approach discussed in this paper is robust to a wide variety of attacks including geometric attacks, drawing, crumpling and print/scan attacks, details of which lie beyond the scope of the paper. The method is relatively insensitive to lossy compression, filtering, amplitude adjustments, additive noise and thresholding (for a binary input). The principal weakness of the system is its sensitivity to rotation and cropping. This can be minimized by orienting the document correctly and Fig. 4: Example of a covert watermarking scheme. i 1 (top-left) is processed with i 2 (top-middle) to produce the stochastic field n (top-right). i 2 is printed at 600 dpi, scanned at 300 dpi and then re-sampled back to its original size (bottom-left). Correlating this image with n generates the reconstruction (bottom-centre). The reconstruction depends on just the host image and n. If the n and/or the host image are different or corrupted, then a reconstruction is not achieved, as in the example given (bottom-right). accurately before scanning and using automatic cropping software which is available with selected scanners (e.g. Cannon scanners). The visibility of the ciphertext generated through the process of stochastic diffusion (e.g. Figures 2 and 3) and the compatibility of this approach with the physical principles of an imaging system (convolution of an object function with the PSF), increase the robustness associated with the retrieval of the hidden information after scanning at low resolution. References [1] N. Ferguson and B. Schneier B, Practical Cryptography, Wiley, [2] M. Born and E. Wolf, Principles of Optics (6th Edition), Pergamon Press, Oxford, [3] J. Buchmann, Introduction to Cryptography, Springer, [4] O. Goldreich, Foundations of Cryptography, Cambridge University Press, [5] E. G. Steward, Fourier Optics: An Introduction, Horwood Scientific Publishing, [6] J. M. Blackledge, Digital Image Processing, Horwood Publishing, [7] M. Bertero and B. Boccacci, Introduction to Inverse Problems in Imaging, Institute of Physics Publishing, [8] I. J. Cox, M. L. Miller and J. A. Bloom, Digital Watermarking, Morgan Kaufmann, 2002.
A Covert Encryption Method for Applications in Electronic Data Interchange
A Covert Encryption Method for Applications in Electronic Data Interchange Jonathan M Blackledge, Fellow, IET, Fellow, BCS and Dmitry A Dubovitskiy, Member IET Abstract A principal weakness of all encryption
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
Network Security: Cryptography CS/SS G513 S.K. Sahay
Network Security: Cryptography CS/SS G513 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
Advanced Signal Processing and Digital Noise Reduction
Advanced Signal Processing and Digital Noise Reduction Saeed V. Vaseghi Queen's University of Belfast UK WILEY HTEUBNER A Partnership between John Wiley & Sons and B. G. Teubner Publishers Chichester New
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Euler Vector: A Combinatorial Signature for Gray-Tone Images
Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, [email protected] Indian Statistical Institute,
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images
Encryption Quality Analysis and Security Evaluation CAST-128 Algorithm and its Modified Version using Digital s Krishnamurthy G N, Dr. V Ramaswamy Abstract this paper demonstrates analysis well known block
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies [email protected] Dr. Mohammad Alaa Al-
Symmetric Key cryptosystem
SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR
Lecture 14. Point Spread Function (PSF)
Lecture 14 Point Spread Function (PSF), Modulation Transfer Function (MTF), Signal-to-noise Ratio (SNR), Contrast-to-noise Ratio (CNR), and Receiver Operating Curves (ROC) Point Spread Function (PSF) Recollect
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
CHAPTER 3: DIGITAL IMAGING IN DIAGNOSTIC RADIOLOGY. 3.1 Basic Concepts of Digital Imaging
Physics of Medical X-Ray Imaging (1) Chapter 3 CHAPTER 3: DIGITAL IMAGING IN DIAGNOSTIC RADIOLOGY 3.1 Basic Concepts of Digital Imaging Unlike conventional radiography that generates images on film through
SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS. Nitin Khanna and Edward J. Delp
SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS Nitin Khanna and Edward J. Delp Video and Image Processing Laboratory School of Electrical and Computer Engineering Purdue University West Lafayette,
CHAPTER 7 CONCLUSION AND FUTURE WORK
158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section
Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads
CS 7880 Graduate Cryptography October 15, 2015 Lecture 10: CPA Encryption, MACs, Hash Functions Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Chosen plaintext attack model of security MACs
Aliasing, Image Sampling and Reconstruction
Aliasing, Image Sampling and Reconstruction Recall: a pixel is a point It is NOT a box, disc or teeny wee light It has no dimension It occupies no area It can have a coordinate More than a point, it is
Cryptography & Network Security
Cryptography & Network Security Lecture 1: Introduction & Overview 2002. 3. 27 [email protected] Common Terms(1) Cryptography: The study of mathematical techniques related to aspects of information security
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Scanners and How to Use Them
Written by Jonathan Sachs Copyright 1996-1999 Digital Light & Color Introduction A scanner is a device that converts images to a digital file you can use with your computer. There are many different types
Function Guide for the Fourier Transformation Package SPIRE-UOL-DOC-002496
Function Guide for the Fourier Transformation Package SPIRE-UOL-DOC-002496 Prepared by: Peter Davis (University of Lethbridge) [email protected] Andres Rebolledo (University of Lethbridge) [email protected]
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2 Research Student, Bharti Vidyapeeth, Pune, India [email protected] Modern College of Engineering,
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Numerical Methods For Image Restoration
Numerical Methods For Image Restoration CIRAM Alessandro Lanza University of Bologna, Italy Faculty of Engineering CIRAM Outline 1. Image Restoration as an inverse problem 2. Image degradation models:
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Lecture No. #06 Cryptanalysis of Classical Ciphers (Refer
Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.
Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
An Application of Visual Cryptography To Financial Documents
An Application of Visual Cryptography To Financial Documents L. W. Hawkes, A. Yasinsac, C. Cline Security and Assurance in Information Technology Laboratory Computer Science Department Florida State University
Security Based Data Transfer and Privacy Storage through Watermark Detection
Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
PERFORMANCE ANALYSIS OF HIGH RESOLUTION IMAGES USING INTERPOLATION TECHNIQUES IN MULTIMEDIA COMMUNICATION SYSTEM
PERFORMANCE ANALYSIS OF HIGH RESOLUTION IMAGES USING INTERPOLATION TECHNIQUES IN MULTIMEDIA COMMUNICATION SYSTEM Apurva Sinha 1, Mukesh kumar 2, A.K. Jaiswal 3, Rohini Saxena 4 Department of Electronics
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
WHITE PAPER. Are More Pixels Better? www.basler-ipcam.com. Resolution Does it Really Matter?
WHITE PAPER www.basler-ipcam.com Are More Pixels Better? The most frequently asked question when buying a new digital security camera is, What resolution does the camera provide? The resolution is indeed
NRZ Bandwidth - HF Cutoff vs. SNR
Application Note: HFAN-09.0. Rev.2; 04/08 NRZ Bandwidth - HF Cutoff vs. SNR Functional Diagrams Pin Configurations appear at end of data sheet. Functional Diagrams continued at end of data sheet. UCSP
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and
Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Authentication
Paper-based Document Authentication using Digital Signature and QR Code
2012 4T International Conference on Computer Engineering and Technology (ICCET 2012) Paper-based Document Authentication using Digital Signature and QR Code Maykin Warasart and Pramote Kuacharoen Department
IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM
IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM BARJINDER SINGH 1, BALPREET KAUR 2, RANJOT KAUR 3 1 Research Scholar at BBSBEC, Fatehgarh sahib 2 Lecturer at BBSBEC Fatehgarh
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE Manoj S. Rewatkar 1 and Shital A. Raut 2 1,2 Department of Computer Science and Engineering, Visvesvaraya National Institute of Technology, Nagpur,
Introduction to acoustic imaging
Introduction to acoustic imaging Contents 1 Propagation of acoustic waves 3 1.1 Wave types.......................................... 3 1.2 Mathematical formulation.................................. 4 1.3
How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3
Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is
{(i,j) 1 < i,j < n} pairs, X and X i, such that X and X i differ. exclusive-or sums. ( ) ( i ) V = f x f x
ON THE DESIGN OF S-BOXES A. F. Webster and S. E. Tavares Department of Electrical Engineering Queen's University Kingston, Ont. Canada The ideas of completeness and the avalanche effect were first introduced
DIGITAL IMAGE PROCESSING AND ANALYSIS
DIGITAL IMAGE PROCESSING AND ANALYSIS Human and Computer Vision Applications with CVIPtools SECOND EDITION SCOTT E UMBAUGH Uffi\ CRC Press Taylor &. Francis Group Boca Raton London New York CRC Press is
Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of
SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2010 APPROVED:
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Basic Algorithms In Computer Algebra
Basic Algorithms In Computer Algebra Kaiserslautern SS 2011 Prof. Dr. Wolfram Decker 2. Mai 2011 References Cohen, H.: A Course in Computational Algebraic Number Theory. Springer, 1993. Cox, D.; Little,
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: [email protected] Every day, millions of people
Sampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically.
Sampling Theorem We will show that a band limited signal can be reconstructed exactly from its discrete time samples. Recall: That a time sampled signal is like taking a snap shot or picture of signal
Medical Image Processing on the GPU. Past, Present and Future. Anders Eklund, PhD Virginia Tech Carilion Research Institute [email protected].
Medical Image Processing on the GPU Past, Present and Future Anders Eklund, PhD Virginia Tech Carilion Research Institute [email protected] Outline Motivation why do we need GPUs? Past - how was GPU programming
One Time Pad Encryption The unbreakable encryption method
One Time Pad Encryption The unbreakable encryption method One Time Pad The unbreakable encryption method One Time Pad encryption is a very simple, yet completely unbreakable cipher method. It has been
High Quality Image Deblurring Panchromatic Pixels
High Quality Image Deblurring Panchromatic Pixels ACM Transaction on Graphics vol. 31, No. 5, 2012 Sen Wang, Tingbo Hou, John Border, Hong Qin, and Rodney Miller Presented by Bong-Seok Choi School of Electrical
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it
Personal Identity Verification (PIV) IMAGE QUALITY SPECIFICATIONS FOR SINGLE FINGER CAPTURE DEVICES
Personal Identity Verification (PIV) IMAGE QUALITY SPECIFICATIONS FOR SINGLE FINGER CAPTURE DEVICES 1.0 SCOPE AND PURPOSE These specifications apply to fingerprint capture devices which scan and capture
Optimizing IP3 and ACPR Measurements
Optimizing IP3 and ACPR Measurements Table of Contents 1. Overview... 2 2. Theory of Intermodulation Distortion... 2 3. Optimizing IP3 Measurements... 4 4. Theory of Adjacent Channel Power Ratio... 9 5.
Cyber Security Workshop Encryption Reference Manual
Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics
MAC. SKE in Practice. Lecture 5
MAC. SKE in Practice. Lecture 5 Active Adversary Active Adversary An active adversary can inject messages into the channel Active Adversary An active adversary can inject messages into the channel Eve
Multi-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
A Study of New Trends in Blowfish Algorithm
A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia [email protected]
On the Operational Quality of Fingerprint Scanners
BioLab - Biometric System Lab University of Bologna - ITALY http://biolab.csr.unibo.it On the Operational Quality of Fingerprint Scanners Davide Maltoni and Matteo Ferrara November 7, 2007 Outline The
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Split Based Encryption in Secure File Transfer
Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical
ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING
Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Message Authentication Code
Message Authentication Code Ali El Kaafarani Mathematical Institute Oxford University 1 of 44 Outline 1 CBC-MAC 2 Authenticated Encryption 3 Padding Oracle Attacks 4 Information Theoretic MACs 2 of 44
SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK
SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION September 2010 (reviewed September 2014) ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK NETWORK SECURITY
WATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
Low-resolution Character Recognition by Video-based Super-resolution
2009 10th International Conference on Document Analysis and Recognition Low-resolution Character Recognition by Video-based Super-resolution Ataru Ohkura 1, Daisuke Deguchi 1, Tomokazu Takahashi 2, Ichiro
Evaluation of the RC4 Algorithm for Data Encryption
Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know
