View stunning SlideShares in full-screen with the new iOS app!Introducing SlideShare for AndroidExplore all your favorite topics in the SlideShare appGet the SlideShare app to Save for Later — even offline
View stunning SlideShares in full-screen with the new Android app!View stunning SlideShares in full-screen with the new iOS app!
http://isrc.ulster.ac.uk9Integrity—How do weknow if the supportingdocuments have beenaltered?Client logs into ABC Insurance portal and fillsin a claim application and submits along withsupporting documents.Approved or rejectedapplication sent back to ClientScenario 2:If we don’t secure information…
http://isrc.ulster.ac.uk10Scenario 3:If we don’t secure information…
http://isrc.ulster.ac.ukHidInImage HidInImage enables the encryption and hidingof secret information (text or images) insideimages using Steganography techniques. Secret information is hidden imperceptibly inthat it cannot be detected by the human eye. Our innovative Steganograpy-basedhiding solution plays a vital role in securingdigital media content.
http://isrc.ulster.ac.ukWhy HidInImage is Unique? Revolutionary software algorithm forencryption Novel technique for embedding of data inimages using Steganography techniquePatented Encryption SoftwarePatented Embedding Software
http://isrc.ulster.ac.uk15Cover ImageProtected ImageWhat does HidInImage do?+ Key =>Secret Data
http://isrc.ulster.ac.uk 17Embedding EPRs data in innocuous looking image: (a) shows a CT scan image of a patient with herinformation details, (b) encrypted secret data (payload) of (a), a clean image showing nature in whichthe encrypted data will be embedded to and finally (d) shows the stego-image carrying the encryptedpatient dataSecret Communication
http://isrc.ulster.ac.uk18Secret Data Cover Image Stego ObjectDocument authentication
http://isrc.ulster.ac.uk19How to detect alterationsAltered Document Recovered DocumentGrayscale image ofAltered DocumentFinal Result
http://isrc.ulster.ac.ukReceived Document Extracted original contentfrom received DocumentDocument authentication
http://isrc.ulster.ac.ukAnti-Counterfeit & Track and TraceSolution
http://isrc.ulster.ac.ukSolutions for Digital Imagesimages used by creative individuals, enterprises,governments and law enforcement• Copyright Communication– Identifies content owner and rights• Copy Protection– Controls copying of content• Classification– Classifies content so it is used appropriately;• Authentication– Verifies that content is genuine, from an authorizedsource and has not been altered