Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?
|
|
|
- Kristopher Randall
- 9 years ago
- Views:
Transcription
1 ENEE408G Lecture-9 Last Lecture Digital Watermarking and Fingerprinting for Digital Rights Protection of Multimedia URL: Slides included here are based on Spring 2012 offering in the order of introduction, image, video, speech, and audio. Copyrighted ENEE408G course was ECE Department, University of Maryland, College Park. Inquiries can be addressed to Profs. Ray Liu ([email protected]) and Min Wu ([email protected]). Audio synthesis: MIDI Digital Audio Coding/Compression Psychoacoustics properties used in perceptual audio coding MPEG-1 Audio coding Today: Digital Rights Management of Multimedia via Watermarking ENEE408G Capstone -- Multimedia Signal Processing ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [2] Demands on Info. Security and Protection Digital Watermarking/Data Hiding in Multimedia Intellectual property management for digital media Promising electronic marketplace for digital music and movies Advantages of digital: perfect reproduction, easy transmission, Napster controversy Conventional encryption alone still leaves many problems unsolved Protection from encryption vanishes once data is decrypted Still want establish ownership and restrict illegal re-distributions How to distinguish changes introduced by compression vs. malicious tampering? Bit-by-bit accuracy is not always desired authenticity criterion for MM What is Digital Watermarking? Examples: Picture in picture, words in words Silent message, invisible images Secondary information in perceptual digital media data The need of watermarking: robust vs. fragile Copyright protection: prove the ownership Fingerprinting: trace the source Copy protection: prevent illegal copying Data authentication: check authenticity of data Fragile or semi-fragile watermarking ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [3] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [4]
2 Example on Invisible and Robust Watermark Fragile Watermark Example: Document Authentication (a) (c) alter (b) (d) (e) (f) after alteration Copyright Embed pre-determined d pattern or content features beforehand Verify hidden data s integrity to decide on authenticity (g) ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [5] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [6] General Framework of Data Hiding Basic Requirements for (Robust) Watermarking Hello, World Hello, World host media data to be hidden extracted data embed Player; or Forensic Analyzer play/ record/ extract marked media (w/ hidden data) compress process / attack test media ENEE408G Sl lides (created by R. Liu & M.W Wu 2002) Imperceptibility (perceptual transparency) Payload the amount of information that can be stored in a watermark Robustness Security Kerckhoff Principle The method used to encrypt the data is known to an unauthorized party and that the security must lie in the choice of a key. Blind and non-blind detection (aka Oblivious vs Non-oblivious) Blind detection ~ does not use the original unmarked copy ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [7] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [8]
3 search Talks 98-04) based on Res ated by M.Wu Data Embedding by Replacing LSBs search Talks 98-04) based on Res ated by M.Wu Data Embedding by Replacing LSBs (cont d) 31 Slides (crea ENEE63 Replace LSB with Pentagon s MSB 31 Slides (crea ENEE63 Replace 6 LSBs with Pentagon s 6 MSBs ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [10] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [11] by R. Liu & M.W Wu 2002) lides (created b ENEE408G Sl => See Lab Project 4 for details A Simple Audio Watermark in Time Domain Put message in the Least-Significant-Bits (LSBs) Encode a message into bits e.g., represent a character string into bits using ASCII code Embedder puts in LSBs of audio samples Repeat embedding the same bit in a few samples if needed Detector retrieves embedded bits from LSBs Perform majority voting if repeated embedding is used Repack bits into message Tradeoff between perceptual quality and robustness Compare the embedding in 1 st LSBs, 2 nd LSBs, Security Can they see/hear your message? Can other people make imperceptible change to alter your message? ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [12] by M.Wu & R. ENEE408G Slides (created => See Design Project 4 for details A More Robust Watermark in Transform Domain Embedder: use HAS & embed in perceptually significant freq. Audio File Key/Seed Segmentation (frame size L) Noise-like seq. Watermark DCT W(j) added in midfrequency region V (j) = V(j) + a(j) W(j) e.g., a(j) = 0.05 V(j) Detector: determine the existence of a specific wmk Subtract host signal, measure similarity (via correlation), & threshold it Audio File in question DCT V + _ V(j) Extract t mid-frequency coefficients V (j) watermark detector idct Detection result Watermarked audio file V W Original A specific Similarity il it measures: DCT audio file watermark <V V, W>, or < (V V)./ a, W >, or ENEE408G Capstone -- Multimedia Signal Processing correlation MM Digital coeff. Rights [13]
4 Discussions Digital Fingerprinting and Tracing Traitors by M.Wu & R. L lides (created b ENEE408G Sl Why use noise-like sequence as watermark? Imperceptibility p Confidentiality of the embedded data Robustness against jamming Imperceptibility Frequency domain embedding: can take advantage of known perceptual properties such as masking Can apply sophisticated HAS models to improve perceptual quality Robustness and security Use attacks to find weaknesses and improve designs Case study: SDMI public challenge (Fall 00) ted by M.Wu 2005) Leak of information poses serious threats to government operations and commercial markets e.g., pirated content or classified document studio The Lord of the Ring Promising countermeasure: robustly embed digital it fingerprintsi w1 w2 w3 Alice Bob Insert ID or fingerprint (often through robust watermarking) to identify each user Purpose: deter information leakage; digital rights management provide post-delivery protection complementary to encryption Carl Sell Challenge: imperceptibility, robustness, tracing capability ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [14] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [15] Fingerprinting Curves Embedded Fingerprinting for Multimedia 2005) 8G Slides (created by M.Wu Original Curve (captured by TabletPC) Fingerprinted Curve (100 control points) Detection Statistics Typical threshold is 3~6 for fl false alarm of f10-3 ~ 10-9 ted by M.Wu 2005) Embedded Fingerprinting Multi-user Attacks Traitor Tracing Customer s Multimedia ID: Alice Document Fingerprinted Copy Digital Distribute embed Fingerprint to Alice Alice Bob Fingerprinted doc for different users Unauthorized re-distribution Collusion Attack Colluded Copy (to remove fingerprints) Extract Identify Alice, Fingerprints Traitors Bob, Suspicious Copy Codebook ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [16] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [17]
5 Collusion-Resistant Fingerprinting of Maps Example of Anti-Collusion Fingerprint Code: Embed 16-bit Code for Detecting ti 3C Colluders Out of f ) ted by M.Wu 8G Slides (crea MCP ENEE408 UM 5-User Averaging Attack 2-User Interleaving Attack... Also survive combination attacks of collusion + print + scan ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [18] 2005) 8G Slides (created by M.Wu User-1 ( -1,-1, -1, -1, 1, 1, 1, 1,, 1 ) Embed fingerprint via HVS-based spread spectrum embedding in block-dct domain Collude by Averaging ( -1, 1, 1, 1, 1, 1,, -1, 1, 1, 1 ) User-4 Extracted fingerprint code ( -1, 0, 0, 0, 1,, 0, 0, 0, 1, 1, 1 ) Uniquely Identify User 1 & 4 ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [19] ted by M.Wu 2005) 8G Slides (crea Case Study: Tracing Movie Screening Copies Potential civilian use for digital rights management (DRM) Copyright industry $500+ Billion business ~ 5% U.S. GDP Alleged Movie Pirate Arrested (23 January 2004) A real case of a successful deployment of 'traitor-tracing' mechanism in the digital realm Use invisible fingerprints to protect screener copies of pre-release movies Last Samurai w1 Carmine Caridi Russell friends Internet Hollywood studio traced pirated version Summary Multimedia watermarking for rights management Reading Assignment F. Hartung and M. Kutter: Multimedia Watermarking Techniques, Proc. of the IEEE,,pp pp , July M. Wu and B. Liu, Multimedia Data Hiding, Chapter 10 on SDMI audio watermark challenge, preprint, 2002 (electronic handout). M. Wu, W. Trappe, Z. Wang, and K.J.R. Liu: "Collusion Resistant Fingerprinting for Multimedia", IEEE Signal Processing Magazine, Special Issue on Digital Rights Management, pp.15-27, March p _paper/jnl/0403fpcollusionp _ IEEEfinal_ SPM.pdf This week s Lab session: Continue on audio project ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [20] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [21]
6 To Explore Further: Type-I Additive Embedding Slides (created b P ENEE408G S For Further Explorations: General Formulation of Two Types of Watermarking Add secondary signal in host media Representative: spread spectrum embedding Add a noise-like signal and detection via correlation Good tradeoff between imperceptibility p and robustness Limited capacity: host signal often appears as major interferer data to be hidden modulation < X + noise, >= < + (X + noise), > X = X + marked copy X original source < X + noise - X, > = < + noise, > ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [23] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [24] Type-II Relationship Enforcement Embedding Type-II Relationship Enforcement (cont d) 8G Slides (crea Deterministically enforcing relationship Secondary information carried solely in watermarked signal feature value 2kQ (2k+1)Q (2k+2)Q (2k+3)Q odd-even mapping lookup table mapping Representative: odd-even embedding No need to know host signal (no host interference) High capacity but limited robustness Robustness achieved by quantization or tolerance zone even 0 odd 1 E.g. enforcing black pixel# per block to odd/even to hide data in binary image General approach: Partition host signal space into sub-regions each region is labeled with 0 or 1 marked sig. is from a region close to orig. & labeled w/ the bit to hide Secondary info. carried solely in X difference (X -X) doesn t necessarily reflect the embedded data { b} data to 1 or 0 be hidden Advanced embedding: mapping X host sig. X = f( b ) marked copy Combining the two types with techniques suggested by info. theory ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [25] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [26]
WATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com
DIGITAL WATERMARKING: FOSTERING AND ENHANCING LEGITIMATE PEER-TO-PEER (P2P) ECOSYSTEMS DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com Copyright 2006 1 TABLE OF CONTENTS
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
Multimedia Data Hiding
Multimedia Data Hiding Introduction! Digital Watermarking / Multimedia Data Hiding Hide secondary data in digital image/video/audio/3d! Uses of hidden data: ownership verification, alteration detection
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA [email protected] K.
Experimental DRM Architecture Using Watermarking and PKI
Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
CHAPTER 7 CONCLUSION AND FUTURE WORK
158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section
Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12.
Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents
Group Testing a tool of protecting Network Security
Group Testing a tool of protecting Network Security Hung-Lin Fu 傅 恆 霖 Department of Applied Mathematics, National Chiao Tung University, Hsin Chu, Taiwan Group testing (General Model) Consider a set N
Content Control: Digital
White Paper Content Control: Digital Watermarking and Fingerprinting by Dominic Milano Content producers and publishers are continually seeking more reliable ways to control access to their valuable media
Technical aspects of Digital Rights Management
Technical aspects of Digital Rights Management Emilija Arsenova MI, RWTH-Aachen Table of content 1 Introduction... 3 2 Digital Rights Management (DRM)... 3 2.1 DRM Architecture...4 2.2 DRM Techniques...5
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
A Digital Audio Watermark Embedding Algorithm
Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China [email protected],
Security Based Data Transfer and Privacy Storage through Watermark Detection
Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument
Journal of Information Hiding and Multimedia Signal Processing 21 ISSN 273-4212 Ubiquitous International Volume 1, Number 2, April 21 Real-Time Audio Watermarking Based on Characteristics of PCM in Digital
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
encoding compression encryption
encoding compression encryption ASCII utf-8 utf-16 zip mpeg jpeg AES RSA diffie-hellman Expressing characters... ASCII and Unicode, conventions of how characters are expressed in bits. ASCII (7 bits) -
Digital Rights Management for the Online Music Business
Digital Rights Management for the Online Business Sai Ho Kwok Digital rights management has become a pressing concern for the online music business. Existing digital rights management systems are backed
Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel
MovieLabs Specification for Enhanced Content Protection Version 1.0
MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
A Robust Multimedia Contents Distribution over IP based Mobile Networks
, pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering
ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
Combating Anti-forensics of Jpeg Compression
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng
SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of
SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2010 APPROVED:
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
Multi-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
A Secure Data Transmission By Integrating Cryptography And Video Steganography
A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India [email protected] Abstract Advances
Information Leakage in Encrypted Network Traffic
Information Leakage in Encrypted Network Traffic Attacks and Countermeasures Scott Coull RedJack Joint work with: Charles Wright (MIT LL) Lucas Ballard (Google) Fabian Monrose (UNC) Gerald Masson (JHU)
Reversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.
Digital Audio and Video Data
Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each
Robust Blind Watermarking Mechanism For Point Sampled Geometry
Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Digital Rights Management. Introduction
Digital Rights Management 12/1/2010 Digital Rights Management 1 Introduction Digital Rights Management (DRM) is a term used for systems that restrict the use of digital media DRM defends against the illegal
A Concept of Digital Picture Envelope for Internet Communication
A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,
MULTIMEDIA CONTENT PROTECTION VIA BIOMETRICS-BASED ENCRYPTION. Umut Uludag and Anil K. Jain
Copyright 22 IEEE. Published in the 23 International Conference on Multimedia and Expo (ICME 23), scheduled for July 6-9, 23 in Baltimore, Maryland, SA. Personal use of this material is permitted. However,
INTELLECTUAL PROPERTY PROTECTION FOR ELECTRONIC COMMERCE APPLICATIONS
INTELLECTUAL PROPERTY PROTECTION FOR ELECTRONIC COMMERCE APPLICATIONS S.H. Kwok Department of Information and Systems Management The Hong Kong University of Science and Technology [email protected] C.C. Yang
Review of Medical Image Watermarking Requirements of Teleradiology
Chapter 2 Review of Medical Image Watermarking Requirements of Teleradiology 2.1 Introduction The technological advances in communication and digital system reflected radical change in facilitating medical
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
WHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION
www.digitalwatermarkingalliance.org WHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION Consider where you encounter digital
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
Data Masking: A New Approach for Steganography?
Journal of VLSI Signal Processing 41, 293 303, 2005 c 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. DOI: 10.1007/s11265-005-4153-1 Data Masking: A New Approach for Steganography?
What is Software Watermarking? Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks
hat is Software atermarking? Software atermarking Through Register Allocation: Implementation, Analysis, and Attacks Ginger Myles Christian Collberg {mylesg,collberg}@cs.arizona.edu University of Arizona
Steganography Detection for Digital Forensics
Sage LaTorra Digital Forensics Steganography Detection for Digital Forensics Steganography is the pursuit of cryptography that doesn't appear to be cryptography. In essence, steganography is hiding a message
Secret Communication through Web Pages Using Special Space Codes in HTML Files
International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a
Video-Conferencing System
Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video
5 Digital Rights Management
5 Digital Rights Management 5.1 Media Rights 5.2 Rights Models 5.3 Principles of Encryption-Based DRM Systems 5.4 Watermarking 5.5 DRM Standards and Selected Commercial Solutions Literature: Bill Rosenblatt,
Steganography and Visual Cryptography in Computer Forensics
2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering Steganography and Visual Cryptography in Computer Forensics George Abboud Department of Computer Engineering and
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
AN OVERVIEW OF IMAGE STEGANOGRAPHY
AN OVERVIEW OF IMAGE STEGANOGRAPHY T. Morkel 1, J.H.P. Eloff 2, M.S. Olivier 3 Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science University of Pretoria,
CSC574 - Computer and Network Security Module: Intrusion Detection
CSC574 - Computer and Network Security Module: Intrusion Detection Prof. William Enck Spring 2013 1 Intrusion An authorized action... that exploits a vulnerability... that causes a compromise... and thus
Real-Time DMB Video Encryption in Recording on PMP
Real-Time DMB Video Encryption in Recording on PMP Seong-Yeon Lee and Jong-Nam Kim Dept. of Electronic Computer Telecommunication Engineering, PuKyong Nat'l Univ. [email protected], [email protected]
Triple Security of Information Using Stegnography and Cryptography
Triple Security of Information Using Stegnography and Cryptography Abstract In this growing age information sharing and transfer has increased exponentially so, security is a primary requirement for all
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
A Look at Emerging Standards in Video Security Systems. Chris Adesanya Panasonic Network Systems Company [email protected].
A Look at Emerging Standards in Video Security Systems Chris Adesanya Panasonic Network Systems Company [email protected] Standards Standards are published documents that establish specifications
Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware
Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware Cumhur Doruk Bozagac Bilkent University, Computer Science and Engineering Department, 06532 Ankara, Turkey
Data Storage 3.1. Foundations of Computer Science Cengage Learning
3 Data Storage 3.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: List five different data types used in a computer. Describe how
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY. Implementation of Multi-Factor Authentication Scheme
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY Implementation of Multi-Factor Authentication Scheme Vasundhara Bhele Prof. Nilesh Chaubey Prof. Shyam Dubey Computer Science &
Digital Audio Compression: Why, What, and How
Digital Audio Compression: Why, What, and How An Absurdly Short Course Jeff Bier Berkeley Design Technology, Inc. 2000 BDTI 1 Outline Why Compress? What is Audio Compression? How Does it Work? Conclusions
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant
Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Authentication
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Comparison of Enterprise Digital Rights Management systems
Comparison of Enterprise Digital Rights Management systems M.H. van Beek Master Thesis Computer Science MT Advice report Aia Software Thesis number 565 June 22, 2007 Radboud University Nijmegen Computer
Classes of multimedia Applications
Classes of multimedia Applications Streaming Stored Audio and Video Streaming Live Audio and Video Real-Time Interactive Audio and Video Others Class: Streaming Stored Audio and Video The multimedia content
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Privacy-Aware Peer-to-Peer Content Distribution Using Automatically Recombined Fingerprints
Noname manuscript No. (will be inserted by the editor) Privacy-Aware Peer-to-Peer Content Distribution Using Automatically Recombined Fingerprints David Megías Josep Domingo-Ferrer Received: date / Accepted:
