Security and protection of digital images by using watermarking methods

Size: px
Start display at page:

Download "Security and protection of digital images by using watermarking methods"

Transcription

1 Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014.

2 Digital watermarking in telemedicine: applications and security Bilateral project with the University of Ljubljana, Slovenia

3 I. Introduction Digital watermarking - process of hiding a watermark in multimedia Robust watermarking Should not be possible to be removed Copyright information Secret information Multimedia communication Telemedicine health care when distance separates

4 I. Introduction Recent advances in telemedicine Need for multimedia communication Security - one of the most significant problems in multimedia Confidently (unauthorized information revealing), Integrity (unauthorized withholding of information or resources), Availability (unauthorized withholding of information or resources

5 I. Introduction European Information Technology Security Evaluation Criteria Careful analysis of security requirements Multimedia - related security problems Protect multimedia systems against incoming attacks How much a multimedia file differs from its original

6 II. Watermarking techniques Mark is inserted into an original digital content Data payload, key size, transparency, robustness, false positive rate, complexity, capacity, verification procedure, and invertibility General key requirements Cryptography

7 II. Watermarking techniques Transparency - human sensory factors Attacks are transforms designed by malicious users Active attacks - the hacker tries to remove the watermark Passive attacks - to determine whether a mark is present or not Collusion attacks Forgery attacks

8 II. Watermarking techniques Complexity is the effort and the time we need to embed and retrieve a watermark Capacity - how many information bits we can embed Verification procedure Invertibility is the possibility of producing the original data Spread Spectrum and the Informed Embedding methods

9 MESSAGE PROCESSING MODULA- TION CHANNEL #1 CHANNEL #2 DETECTION KEY MARK MARKED IMAGE PROCESSED AND ATTACKED IMAGE MESSAGE ORIGINAL IMAGE ATTACKS KEY Figure 1. Watermarking method as a noisy channel

10 III. Security Security requirements Confidentiality, data integrity, data origin authenticity, entity authenticity, and nonrefudiation Cipher systems - private-key and some public-key cryptosystems In medical applications, we can change media data with compression and scaling without content manipulation

11 III. Security Message authentication codes (MACs), digital structures, fragile digital watermarks, and robust digital watermarks MAC is a one-way hash function that is parameterized by a secret key private key cryptosystems Authentication protocols Digital signatures - public key cryptosystems

12 IV. Applications Integrate multiple media Multimedia communication technology Patient history, demographics, billing, scheduling, laboratory reports Teleconsultation and telediagnosis Telediagnosis primary diagnosis at the location of patient Telediagnosis at remote location

13 IV. Applications The entire range of telemedicine applications, including the transfer of large medical images Bursty nature of transferring medical images Teleconsultation and remote monitoring guaranteed QoS Transfer of the medical image Statistical multiplexing - video, audio, image and patient data, transport cost can be reduced

14 IV. Applications Interactive sharing of medical images and patient through a telemedicine system Synchronous telediagnosis - high communication bandwidth Asynchronous telediagnosis - lower communication bandwidth Emergency medicine

15 IV. Applications Examples of clinical applications Teleradiology X-ray, computer tomography (CT), magnetic resonance imaging (MRI), ultrasound (US), positron emission tomography (PET), singlephoton emission-computed tomography (SPECT) Relevant patient information

16 V. Concluding remarks Medical imaging modalities 3D image processing and visualization techniques Telemedicine applications from the multimedia communication perspective Telemedicine systems are able to offer many health care services that could only be dreamed just a few years ago Teleconsultation, teleradiology and teleelectroneuromiography

17 V. Concluding remarks Watermarking a viable solution Medical data security Medicals data structure and complexity Security mechanisms Enhanced multimedia communication capability

18 Digital Image Watermarking by Spread Spectrum method

19 I Spread Spectrum Techniques Watermark should not be placed in perceptually insignificant regions of an image Problem how to insert a watermark Frequency domain communication channel Spread spectrum communications Narrowband signal is transmitted over much larger bandwidth Similarly, watermark is spread over many frequency coefficients Energy in one coefficient is undetectable

20 I Spread Spectrum Techniques Direct Sequence Spread Spectrum (DS-SS) Frequency Hopping Spread Spectrum (FH-SS) DS-SS low level wideband signal can be hidden within the same spectrum as high power signal Core component Pseudo Random Noise Sequence (PRNS) Original bit stream is multiplied by PRNS At the receiver, low level wideband signal will be accompained by the noise Suitable detector signal can be squezzed back

21 I Spread Spectrum Techniques FH-SS algorithm periodic change of transmission frequency Hopset set of possible carrier frequencies Each channel spectral region with central frequency in the hopset Bandwidth includes most of the power in a narrow band modulation burst Data is sent by hopping the transmitter carrier On each channel, small bursts of data are sent using narrowband modulation

22 II Watermarking Embedding DS-SS is used in the watermarking generating FH-SS determines embedding positions Sequence of information bits is spread by multiplying with large factor, called chip-rate Size of the sequence is equal to the value of chip-rate multiplied by number of information bits Spread sequence is modulated with binary pseudo-noise sequence Amplified with a locally adjustable amplitude factor

23 INFORMATION BITS {-1,1} A SECRET KEY B SPREADING WITH C R GENERATING RANDOM POSITIONS AMPLITUDE WATERMARKED IMAGE PSEUDO RANDOM NOISE SEQUENCE ORIGINAL IMAGE Fig.2 Block diagram of the watermarking scheme, with blocks A) watermarking generating, B) determining of locations

24 II Watermarking Embedding Watermark process is illustrated in the block A Each bit of the watermark signal will be embedded into some assigned locations Randomly determined by a key-based FH-SS within the image frame Each watermark bit will be dispersed over its corresponding locations Location determining process is shown in the block B 256 x 256 pixels available pixels are considered as hopset

25 II Watermarking Embedding If 10 % of image frame is required to embed the watermark, 6544 locations will be pseudo-randomly determined Selected locations are used to perform watermark embedding Each watermark bit is embedded by additive operation Some of the selected pixels will carry the watermark signal Correlation is performed by demodulation

26 III Some Results 8-bit standard images (Airplane, Barbara, Boat) PSNR is used to evaluate the quality of the watermarked images Embedding the watermarking signal into parts of the Barbara at different levels Image area is decreased, reduced the amount of information rate Reducing the block size is used to carry the watermark signal Some selected bits are used to carry the watermark signal

27 50 PSNR (db) Fig.3. PSNR value at various level of embedding area within the image Barbara Embedding area (%) PSNR (db) Fig.4. PSNR values at different block sizes (the highest curve corresponds to 3, in the middle to 4, while the lowest corresponds to 5 block size) Embedding area (%)

28 Table 1. The smallest value of chip-rate required at various block sizes ORIGINAL IMAGE BLOCK SIZE 3 BLOCK SIZE 4 BLOCK SIZE 5 AIRPLANE BOAT BARBARA

29 III Some Results Since a smaller chip-rate is used, amount of information bits would be increased Table shows the smallest value of chip-rate required to correctly recover the embedded bits Fig.4 block size used to carry the watermark signal was changed The quality of watermark signal is improved when watermark is embedded into some parts Security level is the same as in the whole image frame

30 III Some Results Advantage of FH-SS: embedded signal is robust to some potentional attacks Watermark could be extracted without using the original in spread spectrum The input image is highpass filtered to remove major components Filtered image is then demodulated with the pseudo-noise signal

31 IV Conclusion Watermarking based on spread spectrum FH-SS to locate watermark embedding DS-SS to generate the watermark signal Improved the quality of watermarked image The same level of security Decreasing of the embedding area could be compensated by adding the watermark signal into some selected bits within a pixel

CHAPTER 7 CONCLUSION AND FUTURE WORK

CHAPTER 7 CONCLUSION AND FUTURE WORK 158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section

More information

Image Authentication Scheme using Digital Signature and Digital Watermarking

Image Authentication Scheme using Digital Signature and Digital Watermarking www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for

More information

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and

More information

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz

AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz AN1200.04 Application Note: FCC Regulations for ISM Band Devices: Copyright Semtech 2006 1 of 15 www.semtech.com 1 Table of Contents 1 Table of Contents...2 1.1 Index of Figures...2 1.2 Index of Tables...2

More information

Safer data transmission using Steganography

Safer data transmission using Steganography Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: arul.bharathi@yahoo.com,

More information

Multimedia Document Authentication using On-line Signatures as Watermarks

Multimedia Document Authentication using On-line Signatures as Watermarks Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and

More information

CDMA TECHNOLOGY. Brief Working of CDMA

CDMA TECHNOLOGY. Brief Working of CDMA CDMA TECHNOLOGY History of CDMA The Cellular Challenge The world's first cellular networks were introduced in the early 1980s, using analog radio transmission technologies such as AMPS (Advanced Mobile

More information

Pradipta Biswas Roll No. 04IT6007 M. Tech. (IT) School of Information Technology Indian Institute of Technology, Kharagpur

Pradipta Biswas Roll No. 04IT6007 M. Tech. (IT) School of Information Technology Indian Institute of Technology, Kharagpur Pradipta Biswas Roll No. 04IT6007 M. Tech. (IT) School of Information Technology Indian Institute of Technology, Kharagpur ABSTRACT W-CDMA (Wideband Code-Division Multiple Access), an ITU standard derived

More information

Workshop: Defining the Medical Imaging Requirements for a Health Center. Teleradiology and Networking

Workshop: Defining the Medical Imaging Requirements for a Health Center. Teleradiology and Networking Workshop: Defining the Medical Imaging Requirements for a Health Center April 17 2011 E-health and Telemedicine ehealth is the use, in the health sector, of digital data - transmitted, stored and retrieved

More information

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know

More information

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Side Channel Analysis and Embedded Systems Impact and Countermeasures Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side

More information

How To Understand The Theory Of Time Division Duplexing

How To Understand The Theory Of Time Division Duplexing Multiple Access Techniques Dr. Francis LAU Dr. Francis CM Lau, Associate Professor, EIE, PolyU Content Introduction Frequency Division Multiple Access Time Division Multiple Access Code Division Multiple

More information

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note Bandwidth utilization is the wise use of

More information

Mobile Communications Chapter 2: Wireless Transmission

Mobile Communications Chapter 2: Wireless Transmission Mobile Communications Chapter 2: Wireless Transmission Frequencies Signals Antennas Signal propagation Multiplexing Spread spectrum Modulation Cellular systems Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

More information

Review of Medical Image Watermarking Requirements of Teleradiology

Review of Medical Image Watermarking Requirements of Teleradiology Chapter 2 Review of Medical Image Watermarking Requirements of Teleradiology 2.1 Introduction The technological advances in communication and digital system reflected radical change in facilitating medical

More information

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2010 APPROVED:

More information

Wireless Medical Telemetry Laboratory

Wireless Medical Telemetry Laboratory Wireless Medical Telemetry Laboratory 0 Introduction The development of wireless medical telemetry has become an increasingly popular application in recent years. As the elderly population continues to

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

Revision of Lecture Eighteen

Revision of Lecture Eighteen Revision of Lecture Eighteen Previous lecture has discussed equalisation using Viterbi algorithm: Note similarity with channel decoding using maximum likelihood sequence estimation principle It also discusses

More information

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.

More information

Security Based Data Transfer and Privacy Storage through Watermark Detection

Security Based Data Transfer and Privacy Storage through Watermark Detection Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant

More information

SECURE AND EFFICIENT TRANSMISSION OF MEDICAL IMAGES OVER WIRELESS NETWORK

SECURE AND EFFICIENT TRANSMISSION OF MEDICAL IMAGES OVER WIRELESS NETWORK SECURE AND EFFICIENT TRANSMISSION OF MEDICAL IMAGES OVER WIRELESS NETWORK Deepika.K 1, Varshini Karthik 2 1 Post Graduate Student, Department of BME, SRM University, Tamilnadu, India 2 Assistant Professor,

More information

New security and control protocol for VoIP based on steganography and digital watermarking

New security and control protocol for VoIP based on steganography and digital watermarking New security and control protocol for VoIP based on steganography and digital watermarking Wojciech Mazurczyk1 and Zbigniew Kotulski1,2 1 Warsaw University of Technology, Faculty of Electronics and Information

More information

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010 Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication

More information

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM BARJINDER SINGH 1, BALPREET KAUR 2, RANJOT KAUR 3 1 Research Scholar at BBSBEC, Fatehgarh sahib 2 Lecturer at BBSBEC Fatehgarh

More information

WATERMARKING FOR IMAGE AUTHENTICATION

WATERMARKING FOR IMAGE AUTHENTICATION WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data

More information

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997

More information

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity

More information

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero

More information

Design and Implementation of FHSS and DSSS for Secure Data Transmission

Design and Implementation of FHSS and DSSS for Secure Data Transmission International Journal of Signal Processing Systems Vol. 4, No. 2, April 2016 Design and Implementation of FHSS and DSSS for Secure Data Transmission M. Hasan, J. M. Thakur, and P. Podder Khulna University

More information

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Multi-factor Authentication in Banking Sector

Multi-factor Authentication in Banking Sector Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Lecture 1. Introduction to Wireless Communications 1

Lecture 1. Introduction to Wireless Communications 1 896960 Introduction to Algorithmic Wireless Communications Lecture 1. Introduction to Wireless Communications 1 David Amzallag 2 May 25, 2008 Introduction to cellular telephone systems. How a cellular

More information

Smart LNB. White Paper. May 2014

Smart LNB. White Paper. May 2014 Smart LNB White Paper May 2014 This document contains information proprietary to Ayecka Communication Systems Ltd. and may not be reproduced in whole or in part without the express written consent of Ayecka

More information

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,

More information

RF Communication System. EE 172 Systems Group Presentation

RF Communication System. EE 172 Systems Group Presentation RF Communication System EE 172 Systems Group Presentation RF System Outline Transmitter Components Receiver Components Noise Figure Link Budget Test Equipment System Success Design Remedy Transmitter Components

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

A Digital Audio Watermark Embedding Algorithm

A Digital Audio Watermark Embedding Algorithm Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China tangxh@hziee.edu.cn,

More information

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii TABLE OF CONTENTS Dedication Table of Contents Preface v vii xvii Chapter 1 Overview of Wireless Networks 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Signal Coverage Propagation Mechanisms 1.2.1 Multipath 1.2.2 Delay

More information

Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics:

Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics: Voice Transmission --Basic Concepts-- Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics: Amplitude Frequency Phase Voice Digitization in the POTS Traditional

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION )454 6 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU $!4! #/--5.)#!4)/. /6%2 4(% 4%,%0(/.%.%47/2+ ")43 0%2 3%#/.$ $50,%8 -/$%- 34!.$!2$):%$ &/2 53% ). 4(% '%.%2!,

More information

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public

More information

An Incomplete Cryptography based Digital Rights Management with DCFF

An Incomplete Cryptography based Digital Rights Management with DCFF An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp

More information

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR

More information

A versatile telemetric system based on mixed Internet and wireless transmission

A versatile telemetric system based on mixed Internet and wireless transmission A versatile telemetric system based on mixed Internet and wireless transmission V. TSIRIGGAKIS 1, K. EFTHIMIATOS 1, G. KOULOURAS 3, I. STAVRAKAS 1, P. KAPIRIS 1, K. NINOS 1, G. KATSIMAGLIS 1, K.VOUDOURIS

More information

Experimental DRM Architecture Using Watermarking and PKI

Experimental DRM Architecture Using Watermarking and PKI Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,

More information

Alternative security architecture for IP Telephony based on digital watermarking

Alternative security architecture for IP Telephony based on digital watermarking Alternative security architecture for IP Telephony based on digital watermarking Wojciech Mazurczyk 1, Zbigniew Kotulski 1,2 1 Warsaw University of Technology, Faculty of Electronics and Information Technology,

More information

How To Understand The Differences Between A Fax And A Fax On A G3 Network

How To Understand The Differences Between A Fax And A Fax On A G3 Network The Fax on IP Networks White Paper February 2011 2 The Fax on IP Networks Contents Overview... 3 Group 3 Fax Technology... 4 G.711 Fax Pass-Through... 5 T.38 IP Fax Relay... 6 Network Design Considerations...

More information

MSB MODULATION DOUBLES CABLE TV CAPACITY Harold R. Walker and Bohdan Stryzak Pegasus Data Systems ( 5/12/06) pegasusdat@aol.com

MSB MODULATION DOUBLES CABLE TV CAPACITY Harold R. Walker and Bohdan Stryzak Pegasus Data Systems ( 5/12/06) pegasusdat@aol.com MSB MODULATION DOUBLES CABLE TV CAPACITY Harold R. Walker and Bohdan Stryzak Pegasus Data Systems ( 5/12/06) pegasusdat@aol.com Abstract: Ultra Narrow Band Modulation ( Minimum Sideband Modulation ) makes

More information

INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6

INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6 Technology Overview CONTENTS INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 FULL TWO-WAY SYNCHRONIZED TDMA COMMUNICATION... 5 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6 UNMATCHED

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Overview Steganography is the process of hiding secret data inside other, normally transmitted data. In other words, as defined by [40] steganography means hiding of a secret

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

Sampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically.

Sampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically. Sampling Theorem We will show that a band limited signal can be reconstructed exactly from its discrete time samples. Recall: That a time sampled signal is like taking a snap shot or picture of signal

More information

Software Defined Radio

Software Defined Radio Software Defined Radio GNU Radio and the USRP Overview What is Software Defined Radio? Advantages of Software Defined Radio Traditional versus SDR Receivers SDR and the USRP Using GNU Radio Introduction

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION )454 6 TER TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU $!4! #/--5.)#!4)/. /6%2 4(% 4%,%0(/.%.%47/2+ ")43 0%2 3%#/.$ $50,%8 -/$%- 53).' 4(% %#(/ #!.#%,,!4)/. 4%#(.)15%

More information

Implementation of Digital Signal Processing: Some Background on GFSK Modulation

Implementation of Digital Signal Processing: Some Background on GFSK Modulation Implementation of Digital Signal Processing: Some Background on GFSK Modulation Sabih H. Gerez University of Twente, Department of Electrical Engineering s.h.gerez@utwente.nl Version 4 (February 7, 2013)

More information

A WEB BASED TRAINING MODULE FOR TEACHING DIGITAL COMMUNICATIONS

A WEB BASED TRAINING MODULE FOR TEACHING DIGITAL COMMUNICATIONS A WEB BASED TRAINING MODULE FOR TEACHING DIGITAL COMMUNICATIONS Ali Kara 1, Cihangir Erdem 1, Mehmet Efe Ozbek 1, Nergiz Cagiltay 2, Elif Aydin 1 (1) Department of Electrical and Electronics Engineering,

More information

Multiple Access Techniques

Multiple Access Techniques Chapter 8 Multiple Access Techniques Multiple access techniques are used to allow a large number of mobile users to share the allocated spectrum in the most efficient manner. As the spectrum is limited,

More information

Physical Layer, Part 2 Digital Transmissions and Multiplexing

Physical Layer, Part 2 Digital Transmissions and Multiplexing Physical Layer, Part 2 Digital Transmissions and Multiplexing These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

Voice Encryption over GSM:

Voice Encryption over GSM: End-to to-end Voice Encryption over GSM: A Different Approach Wesley Tanner Nick Lane-Smith www. Keith Lareau About Us: Wesley Tanner - Systems Engineer for a Software-Defined Radio (SDRF) company - B.S.

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE

More information

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA COMM.ENG INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA 9/6/2014 LECTURES 1 Objectives To give a background on Communication system components and channels (media) A distinction between analogue

More information

For Your Eyes Only: Protecting Data-in-Motion with Dispersive Virtualized Networks

For Your Eyes Only: Protecting Data-in-Motion with Dispersive Virtualized Networks For Your Eyes Only: Protecting Data-in-Motion with Dispersive Virtualized Networks Dispersive Technologies software and cloud-based virtualized networks deliver mission-critical communications over the

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

PCM Encoding and Decoding:

PCM Encoding and Decoding: PCM Encoding and Decoding: Aim: Introduction to PCM encoding and decoding. Introduction: PCM Encoding: The input to the PCM ENCODER module is an analog message. This must be constrained to a defined bandwidth

More information

RECOMMENDATION ITU-R SM.1792. Measuring sideband emissions of T-DAB and DVB-T transmitters for monitoring purposes

RECOMMENDATION ITU-R SM.1792. Measuring sideband emissions of T-DAB and DVB-T transmitters for monitoring purposes Rec. ITU-R SM.1792 1 RECOMMENDATION ITU-R SM.1792 Measuring sideband emissions of T-DAB and DVB-T transmitters for monitoring purposes (2007) Scope This Recommendation provides guidance to measurement

More information

Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System

Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System Digital Modulation David Tipper Associate Professor Department of Information Science and Telecommunications University of Pittsburgh http://www.tele.pitt.edu/tipper.html Typical Communication System Source

More information

GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving

GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving 1 Space Division Multiple Access of the signals from the MSs A BTS with n directed antennae covers mobile stations

More information

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Authentication

More information

Wireless Local Area Networking For Device Monitoring

Wireless Local Area Networking For Device Monitoring Wireless Local Area Networking For Device Monitoring by Colin Goldsmith Supervised By Professor Wendi Heinzelman A thesis submitted in partial fulfillment of the Requirements for the Degree of Masters

More information

International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012)

International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012) Authentication of Medical Images using Integer Transforms A.Kannammal 1, Dr.S.Subha Rani 2 1 Assistant professor, 2 Professor and Head, ECE Department, PSG College of Technology, Peelamedu, Coimbatore

More information

Secured Lossless Medical Image Compression Based On Adaptive Binary Optimization

Secured Lossless Medical Image Compression Based On Adaptive Binary Optimization IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IV (Mar-Apr. 2014), PP 43-47 Secured Lossless Medical Image Compression Based On Adaptive Binary

More information

VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan

VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s

More information

Experiment # (4) AM Demodulator

Experiment # (4) AM Demodulator Islamic University of Gaza Faculty of Engineering Electrical Department Experiment # (4) AM Demodulator Communications Engineering I (Lab.) Prepared by: Eng. Omar A. Qarmout Eng. Mohammed K. Abu Foul Experiment

More information

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications The Master Degree in Electrical Engineering/Wireless Communications, is awarded by the Faculty of Graduate Studies

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012 Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation

More information

ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS

ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS J Sravanthi #1, Dr. MHM Krishna Prasad *2 # Dept. of Computer Science, UCEV Vizianagaram, Andhra Pradesh, India * Associate

More information

Basic principles of Voice over IP

Basic principles of Voice over IP Basic principles of Voice over IP Dr. Peter Počta {pocta@fel.uniza.sk} Department of Telecommunications and Multimedia Faculty of Electrical Engineering University of Žilina, Slovakia Outline VoIP Transmission

More information

Digital Subscriber Line (DSL) Transmission Methods

Digital Subscriber Line (DSL) Transmission Methods Digital Subscriber Line (DSL) Transmission Methods 1. Overview... 1 2. SHDSL Transmission Methods... 1 SHDSL Transmission System Versions... 1 SHDSL Transmission Subsystem Structure... 1 SHDSL Modulation

More information

Multiple Embedding Using Robust Watermarks for Wireless Medical Images

Multiple Embedding Using Robust Watermarks for Wireless Medical Images Multiple Embedding Using Robust Watermarks for Wireless Medical Images Dominic Osborne and Derek Abbott Centre for Biomedical Engineering (CBME) The University of Adelaide, SA 5005, Australia Matthew Sorell

More information

Image Area. View Point. Medical Imaging. Advanced Imaging Solutions for Diagnosis, Localization, Treatment Planning and Monitoring. www.infosys.

Image Area. View Point. Medical Imaging. Advanced Imaging Solutions for Diagnosis, Localization, Treatment Planning and Monitoring. www.infosys. Image Area View Point Medical Imaging Advanced Imaging Solutions for Diagnosis, Localization, Treatment Planning and Monitoring www.infosys.com Over the years, medical imaging has become vital in the early

More information

Lecture 1: Introduction

Lecture 1: Introduction Mobile Data Networks Lecturer: Victor O.K. Li EEE Department Room: CYC601D Tel.: 857 845 Email: vli@eee.hku.hk Course home page: http://www.eee.hku.hk/courses.msc/ 1 Lecture 1: Introduction Mobile data

More information

E-Option Multi-taps Conditioning at the Tap

E-Option Multi-taps Conditioning at the Tap E-Option Multi-taps Conditioning at the Tap (actual size) Introduction Traditional Cable Television Systems had long been associated with one-way downstream signal transmissions that provide video services

More information

Data Transmission via Modem. The Last Mile Problem. Modulation of Digital Signals. Modem Standards (CCITT)

Data Transmission via Modem. The Last Mile Problem. Modulation of Digital Signals. Modem Standards (CCITT) The Last Mile Problem LN, MN, WN how to connect private users at home to such networks? Problem of the last mile: somehow connect private homes to the public Internet without laying many new cables By

More information

Reversible Data Hiding for Security Applications

Reversible Data Hiding for Security Applications Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.

More information

Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight

Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight TEC Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight HP 4/15/2013 A powerful software upgrade leverages quaternary modulation and MIMO techniques to improve network efficiency

More information

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen

More information

Security in Near Field Communication (NFC)

Security in Near Field Communication (NFC) Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria ernst.haselsteiner@philips.com klemens.breitfuss@philips.com

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,

More information

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security

More information

Effective Management of Medical Information through ROI-Lossless Fragile Image Watermarking Technique

Effective Management of Medical Information through ROI-Lossless Fragile Image Watermarking Technique Computer Methods and Programs in Biomedicine XXX (2013) XXX XXX 1 Effective Management of Medical Information through ROI-Lossless Fragile Image Watermarking Technique Sudeb Das 1, Malay Kumar Kundu Machine

More information

Multiplexing on Wireline Telephone Systems

Multiplexing on Wireline Telephone Systems Multiplexing on Wireline Telephone Systems Isha Batra, Divya Raheja Information Technology, Dronacharya College of Engineering Farrukh Nagar, Gurgaon, India ABSTRACT- This Paper Outlines a research multiplexing

More information