A variety of imperceptible watermarking schemes have been proposed over the last few years. In general, publications on the subject tend to focus on the technical details of the specific scheme (increase of robustness, improvement of imperceptibility, etc.), paying little attention on the application scenarios where the proposed method could fit in. Most of the methods are said to be suitable for either copyright protection or authentication, i.e. for a single specific application with no investigation is done on the possibility of applying the same scheme to other applications as well. The main reason for this is that no attempt for a detailed and systematic listing and categorization of the existing application scenarios took place so far. A hybrid algorithm for printed image watermarking with enhanced security employing cryptographic techniques & robust detection with graceful degradation is developed & investigated. Robust detection is achieved by graceful degradation of the recovered image. Various types of attacks on watermark method image have been simulated & their resultant has been observed. Experimental results prove the security & robustness of the proposed algorithm.
2018 ieee java project titles | 2019 java final year project titlesJAYAPRAKASH JPINFOTECH
2018 ieee java project titles | 2019 java final year project titles
To buy this project in ONLINE, Contact:
Email: jpinfotechprojects@gmail.com,
Website: https://www.jpinfotech.org
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET Journal
This document summarizes and compares various reversible watermarking techniques for image security. It discusses how reversible watermarking allows a watermark to be fully extracted from an image while also restoring the original cover image. The document reviews early techniques that used modulo addition and later techniques that improved imperceptibility by compressing image bits. It categorizes reversible techniques into data compression, difference expansion, and histogram shifting methods. Comparisons of techniques are presented to improve understanding of advances in reversible watermarking for image security.
IRJET- A Study on Image Authentication MethodsIRJET Journal
This document discusses and compares different methods for authenticating digital images, including cryptographic authentication, robust image hashing authentication, and watermarking authentication. Cryptographic authentication uses encryption and decryption but has limitations in localization. Robust image hashing is based on rotation-invariant moments but struggles with large area cropping. Watermarking authentication allows for embedding watermarks for identification and tamper detection but cannot precisely locate tampered regions. Overall, the document concludes that watermarking schemes constructed using chaotic maps provide better security compared to other methods due to chaotic maps' sensitivity to initial conditions.
IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...IRJET Journal
This document discusses a blind watermarking technique using redundant wavelet transform for copyright protection. It proposes combining redundant discrete wavelet transform with singular value decomposition to embed a watermark while balancing invisibility and robustness. Watermark insertion locations are determined using a modified entropy of the host image. The watermark is embedded in the symmetrical grid obtained from the RDWT-SVD hybrid transform. Arnold's cat map is also used to further encrypt the watermark image before insertion. Test results show the proposed technique provides better robustness and less distortion than other methods against attacks like JPEG2000 compression, editing, scaling and noise.
This paper presents a spatial domain digital image watermarking technique. The technique embeds a binary watermark image into the cover image by inserting watermark pixels into homogeneous blocks with low variance. The watermark is first dispersed using a chaotic system before insertion. A secret multilevel image is used to extract the watermark. Experimental results show the watermark is resilient against various attacks like mean filtering, Gaussian filtering, median filtering, image rescaling, and JPEG compression. The watermark can be extracted with high correlation even after these attacks.
This document summarizes a proposed virtual watermarking technique for color images. The technique embeds a secret sub-image into a cover image by generating an index array through comparing bits between the images, rather than directly altering the cover image. The index array is encrypted and sent to the receiver along with an encryption key. The receiver decrypts the index array and applies reverse virtual watermarking using the common cover image to extract the original sub-image, without the cover image needing to be transmitted. This avoids potential attacks on the cover image during transmission.
Towards Optimal Copyright Protection Using Neural Networks Based Digital Imag...rahulmonikasharma
In the field of digital watermarking, digital image watermarking for copyright protection has attracted a lot of attention in the research community. Digital watermarking contains varies techniques for protecting the digital content. Among all those techniques,Discrete Wavelet Transform (DWT) provides higher image imperceptibility and robustness. Over the years, researchers have been designing watermarking techniques with robustness in mind, in order for the watermark to be resistant against any image processing techniques. Furthermore, the requirements of a good watermarking technique includes a tradeoff between robustness, image quality (imperceptibility) and capacity. In this paper, we have done an extensive literature review for the existing DWT techniques and those combined with other techniques such as Neural Networks. In addition to that, we have discuss the contribution of Neural Networks in copyright protection. Finally we reached our goal in which we identified the research gaps existed in the current watermarking schemes. So that, it will be easily to obtain an optimal techniques to make the watermark object robust to attacks while maintaining the imperceptibility to enhance the copyright protection.
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
Gowtham.T ,Pradeep Kumar.G " Security Based Data Transfer and Privacy Storage through Watermark Detection ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Digital watermarking has been proposed as a technology to ensure copyright protection by embedding an imperceptible, yet detectable signal in visual multimedia content such as images or video. In every field key aspect is the security Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service. Several attempts has been made for increasing the security related works and avoidance of data loss. Existing system had attain its solution up to its level where it can be further able to attain the parameter refinement. In this paper improvising factor been made on the successive compressive sensing reconstruction part and Peak Signal-to-Noise Ratio (PSNR).Another consideration factor is to increase (CS) rate through de-emphasize the effect of predictive variables that become uncorrelated with the measurement data which eliminates the need of (CS) reconstruction.
2018 ieee java project titles | 2019 java final year project titlesJAYAPRAKASH JPINFOTECH
2018 ieee java project titles | 2019 java final year project titles
To buy this project in ONLINE, Contact:
Email: jpinfotechprojects@gmail.com,
Website: https://www.jpinfotech.org
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET Journal
This document summarizes and compares various reversible watermarking techniques for image security. It discusses how reversible watermarking allows a watermark to be fully extracted from an image while also restoring the original cover image. The document reviews early techniques that used modulo addition and later techniques that improved imperceptibility by compressing image bits. It categorizes reversible techniques into data compression, difference expansion, and histogram shifting methods. Comparisons of techniques are presented to improve understanding of advances in reversible watermarking for image security.
IRJET- A Study on Image Authentication MethodsIRJET Journal
This document discusses and compares different methods for authenticating digital images, including cryptographic authentication, robust image hashing authentication, and watermarking authentication. Cryptographic authentication uses encryption and decryption but has limitations in localization. Robust image hashing is based on rotation-invariant moments but struggles with large area cropping. Watermarking authentication allows for embedding watermarks for identification and tamper detection but cannot precisely locate tampered regions. Overall, the document concludes that watermarking schemes constructed using chaotic maps provide better security compared to other methods due to chaotic maps' sensitivity to initial conditions.
IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...IRJET Journal
This document discusses a blind watermarking technique using redundant wavelet transform for copyright protection. It proposes combining redundant discrete wavelet transform with singular value decomposition to embed a watermark while balancing invisibility and robustness. Watermark insertion locations are determined using a modified entropy of the host image. The watermark is embedded in the symmetrical grid obtained from the RDWT-SVD hybrid transform. Arnold's cat map is also used to further encrypt the watermark image before insertion. Test results show the proposed technique provides better robustness and less distortion than other methods against attacks like JPEG2000 compression, editing, scaling and noise.
This paper presents a spatial domain digital image watermarking technique. The technique embeds a binary watermark image into the cover image by inserting watermark pixels into homogeneous blocks with low variance. The watermark is first dispersed using a chaotic system before insertion. A secret multilevel image is used to extract the watermark. Experimental results show the watermark is resilient against various attacks like mean filtering, Gaussian filtering, median filtering, image rescaling, and JPEG compression. The watermark can be extracted with high correlation even after these attacks.
This document summarizes a proposed virtual watermarking technique for color images. The technique embeds a secret sub-image into a cover image by generating an index array through comparing bits between the images, rather than directly altering the cover image. The index array is encrypted and sent to the receiver along with an encryption key. The receiver decrypts the index array and applies reverse virtual watermarking using the common cover image to extract the original sub-image, without the cover image needing to be transmitted. This avoids potential attacks on the cover image during transmission.
Towards Optimal Copyright Protection Using Neural Networks Based Digital Imag...rahulmonikasharma
In the field of digital watermarking, digital image watermarking for copyright protection has attracted a lot of attention in the research community. Digital watermarking contains varies techniques for protecting the digital content. Among all those techniques,Discrete Wavelet Transform (DWT) provides higher image imperceptibility and robustness. Over the years, researchers have been designing watermarking techniques with robustness in mind, in order for the watermark to be resistant against any image processing techniques. Furthermore, the requirements of a good watermarking technique includes a tradeoff between robustness, image quality (imperceptibility) and capacity. In this paper, we have done an extensive literature review for the existing DWT techniques and those combined with other techniques such as Neural Networks. In addition to that, we have discuss the contribution of Neural Networks in copyright protection. Finally we reached our goal in which we identified the research gaps existed in the current watermarking schemes. So that, it will be easily to obtain an optimal techniques to make the watermark object robust to attacks while maintaining the imperceptibility to enhance the copyright protection.
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
Gowtham.T ,Pradeep Kumar.G " Security Based Data Transfer and Privacy Storage through Watermark Detection ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Digital watermarking has been proposed as a technology to ensure copyright protection by embedding an imperceptible, yet detectable signal in visual multimedia content such as images or video. In every field key aspect is the security Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service. Several attempts has been made for increasing the security related works and avoidance of data loss. Existing system had attain its solution up to its level where it can be further able to attain the parameter refinement. In this paper improvising factor been made on the successive compressive sensing reconstruction part and Peak Signal-to-Noise Ratio (PSNR).Another consideration factor is to increase (CS) rate through de-emphasize the effect of predictive variables that become uncorrelated with the measurement data which eliminates the need of (CS) reconstruction.
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
This document summarizes several digital watermarking techniques and applications. It discusses a proposed hybrid watermarking technique that combines redundant discrete wavelet transform with singular value decomposition. It also mentions using Arnold chaotic maps to scramble watermarks for added security. Several other watermarking methods are reviewed, including techniques in the pixel domain and using discrete cosine transform with singular value decomposition. Applications discussed include mobile experiences, biometric authentication, image processing, and cryptography.
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
Copyright protection has become a need in today’s world. To achieve a secure copyright protection we embedded some information in images and videos and that image or video is called copyright protected. The embedded information can’t be detected by human eye but some attacks and operations can tamper that information to breach protection. So in order to find a secure technique of copyright protection, we have analyzed image processing techniques i.e. Spatial Domain (Least Significant Bit (LSB)), Transform Domain (Discrete Cosine Transform (DCT)), Discrete Wavelet Transform (DWT) and there are numerous algorithm for watermarking using them. After having a good understanding of the same we have proposed a novel algorithm named as Stage Staffing Algorithm that generates results with high effectiveness, additionally we can use self extracted-watermark technique to increase the security and automate the process of watermark image. The proposed algorithm provides protection in three stages. We have implemented the algorithm and results of the simulations are shown. The various factors affecting spatial domain watermarking are also discussed.
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET Journal
This document proposes a reversible database watermarking technique called Genetic Fingerprinting Algorithm using Histogram shifting (GFAHS). The technique encrypts the original database along with the owner's fingerprint and watermarks them together. This protects the original content from illegal ownership violations while allowing recovery of the original data. The technique uses a genetic algorithm to randomly partition and distribute the database among team members for collaborative work. When work is complete, updates are sent to team leaders and combined and forwarded to managers, who use biometric authentication to view the results. The aim is to provide a secure and robust system for group sharing of data on databases in the cloud.
Report on Digital Watermarking Technology vijay rastogi
Digital watermarking is the process of embedding information into digital multimedia content such that the information (which we call the watermark) can later be extracted or detected for a variety of purposes including copy prevention and control.
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET Journal
This document proposes a new authentication system to resist shoulder surfing attacks when users input passwords. The existing system has users select grid areas from split images as passwords. The proposed system provides two authentication options: the existing image-based system and a new system. The new system blocks accounts if an incorrect password is entered frequently and notifies the user via email and SMS with the device's location. It also includes a password recovery system that asks security questions on the user's device to recover forgotten passwords. The goal is to provide more secure and user-friendly authentication while banking online or on mobile apps.
IRJET- A Shoulder-Surfing Resistant Graphical Password System IRJET Journal
This document presents a shoulder-surfing resistant graphical password system. It begins with an abstract that outlines developing a system to resist shoulder-surfing attacks using a falsification method. It then reviews graphical passwords, existing systems, proposed improvements, and security measures. The proposed system aims to add an extra layer of security during authentication by inserting a false image between correct images to confuse observers and make the actual password harder to determine through shoulder surfing.
Abstract: A number of research papers has been produced about reversible watermarking. Reversible
watermarking is one of the important scheme of the watermarking schemes. Some security measures must be
there to protect the records from unauthorized user and destruction of information. Basic idea of digital
watermarking is to embed the data into the cover media to provide the security to data. The watermarking
techniques satisfying these requirements called as Reversible watermarking. Ownership of the original media
remains same but the best thing is original media is recovered from the watermarked media. This is the best and
main feature of reversible watermarking to extract the original image as it is without any distortion. This
feature is applicable in various areas such as medical as well as military images. If there is effect on the cover
then it would changes the meaning of this data. The aim of this paper is to represent the purpose of reversible
watermarking, some of the techniques related to reversible watermarking.
Keywords: Reversible watermarking, Security, copyright protection
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET Journal
This document proposes a new authentication system called PassMatrix to resist shoulder surfing attacks in graphical password authentication. PassMatrix uses multiple images to define the password. During login, users scroll through images and select their password by pointing to areas without directly touching the screen, making it difficult for observers to see the exact inputs. The system was implemented as an Android app and evaluated for accuracy and usability. Test results found it provided stronger security against shoulder surfing compared to text or single-image password schemes.
A Review of Digital Watermarking Technique for the Copyright Protection of Di...IRJET Journal
This document reviews digital watermarking techniques for copyright protection of digital data using transform functions. It discusses how transform-based watermarking systems like discrete wavelet transform and discrete cosine transform are robust against many attacks but are vulnerable to geometric attacks like rotation and noise attacks. The document provides an overview of different watermarking types and reviews several related works on digital watermarking techniques. It also discusses various types of attacks on watermarks like subtractive attacks aimed at detecting and extracting the watermark and distortive attacks that apply transformations to degrade the watermark.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
Implementation of Steganographic Techniques and its Detection.IRJET Journal
This document presents a literature review and proposed system for implementing steganographic techniques to conceal and retrieve secret information hidden in digital files like images. The proposed system would allow users to hide messages in images, videos and documents using an interface. It would also include a classifier trained to detect common steganography techniques to identify if hidden information is present in images. The system aims to provide a secure communication method and could be used for applications like digital watermarking, covert communication and detecting media piracy. It would use techniques like LSB substitution and AES encryption to hide data in bit planes of images selected by the user. An activity log and user profiles with private keys are also proposed to manage operations and provide additional security.
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueIRJET Journal
This document discusses a robust and secure digital watermarking approach based on SVD and DWT techniques. It aims to enhance image authentication and copyright protection. The key objectives are to develop a watermarking method that is imperceptible, robust against attacks, and provides high security. The proposed method embeds watermarks in the frequency domain using the Singular Value Decomposition and Discrete Wavelet Transform. Simulation results using MATLAB indicate the technique effectively balances image quality, watermark resilience, and authentication capabilities.
Information security by biometric waterkingeSAT Journals
Abstract In the recent digital world information security, person identification and authentication, and network security are the prime implications and off course requirements. To fulfill the above requirement watermarking is used widely with biometric information i.e. face image, iris, fingerprint, signature, hand geometry, voice and key stroke pattern. We propose a method for securing and protecting the biometric information of any person with the help of watermarking. The security can also be improved with the help of secrete key. Now a day’s multimodal biometric watermarking is the most advanced technology for information security where more than one biometric information’s are combined for enhancing security and privacy of information and system. In this paper we used face image as the biometric information to be secured, iris image with specific size with key is used for security improvement. Index Terms: Watermarking, Biometric, Biometric watermarking
This document discusses using biometric watermarking for information security. It proposes a method of securing biometric information like face images with watermarking and a secret key. The biometric information is watermarked with an iris image and secret key. This allows secure transmission of information that can only be recovered by the receiver if they know the secret key and watermarked image. It concludes biometric-based identification combined with watermarking and steganography improves security against unauthorized access. Future work could use multiple biometrics and codes together to further enhance security.
IRJET- Criminal Recognization in CCTV Surveillance VideoIRJET Journal
This document presents research on criminal recognition in CCTV surveillance videos using deep learning. It proposes a method where a user can upload faces of known criminals. When CCTV footage is recorded, the application will monitor for these faces. If a face is recognized, the CCTV camera will track the identified person through multiple cameras by alerting other cameras. The system segments video into images, acquires images, recognizes human faces, constructs motion flows between cameras to track individuals. Experimental results on a dataset show the system's ability to extract patterns from faces and cluster images of different angled faces. The system aims to identify criminals across surveillance camera networks.
This document summarizes a research paper that proposes using digital watermarking to hide patient information in medical images. The paper aims to improve reliability in medical information systems by embedding patient records directly in test reports. It uses discrete wavelet transform (DWT) and an adaptive thresholding approach to identify background regions in medical images to hide data, so as not to alter important foreground areas. The watermark is then embedded in the background using DWT. The paper evaluates the results using measures like mean squared error and peak signal to noise ratio, and tests the watermarked images under various attacks.
A Generalized Image Authentication Based On Statistical Moments of Color Hist...idescitation
Designing low cost and high speed authentication
solution for digital images is always an attractive area of
research in image processing. In past few years because of
widespread use of internet and network technology, concept
of information distribution has been become habit rather than
exception in daily life. In same aspects challenges involved
with distribution of authenticate information has been
increased manifolds. In this paper a generalize image
authentication method has proposed by hybridization of color
histogram and associated first four statistical moments to
achieve the objectives of low cost and high speed. Proposed
method can apply for both gray and color images having any
size and any format. Solution generates a very small
authentication code with an ease means which is use to analyze
the characteristics of received image from tampering
perspective.
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
This document presents a novel authentication system called PassMatrix that aims to overcome shoulder surfing attacks in graphical password authentication. PassMatrix uses a sequence of images where the user selects one "pass-square" per image as their password. During login, random horizontal and vertical slider bars covering the images hide the original password locations. If the user's selected coordinates under the sliders match their stored password, they are authenticated. The document outlines the design, implementation, and evaluation of the PassMatrix system, finding that it achieves better resistance to shoulder surfing compared to traditional text passwords while maintaining usability.
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...IJERA Editor
Text fusion in images is an important technology for image processing. We have lots of important information related to the patient’s reports and need lots of space to store and the proper position and name which relates that image with that data. In our work we are going to find out the ROI (region of interest) for the particular image and will fuse the related document in the NROI (non-region of interest) of the image, till yet we have many techniques to fuse text data in the medical images one of form them is to fuse data at the boarders of the images and build the particular and pre-defined boarder space. We have propose an algorithm in which we first find out the area of interest and after that we find noisy pixels of the image to embed data in that noisy portions of the image. We use wavelets for smoothing images and segmentation process for extracting region of interest. Coordinates of the noisy pixels have been located and data has been embedded in those pixels .The used embedding technique embed data in least significant bits, hence does not degrade the quality of the image to unacceptable limits. Results show that it gives good PSNR and MSE values which are used for measuring quality effected performance.
Data Mining is a significant field in today’s data-driven world. Understanding and implementing its concepts can lead to discovery of useful insights. This paper discusses the main concepts of data mining, focusing on two main concepts namely Association Rule Mining and Time Series Analysis
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
We are describes the technique for real time human face detection and counting the number of passengers in vehicle and also gender of the passengers.The Image processing technology is very popular,now at present all are going to use it for various purpose. It can be applied to various applications for detecting and processing the digital images. Face detection is a part of image processing. It is used for finding the face of human in a given area. Face detection is used in many applications such as face recognition, people tracking, or photography. In this paper,The webcam is installed in public vehicle and connected with Raspberry Pi model. We use face detection technique for detecting and counting the number of passengers in public vehicle via webcam with the help of image processing and Raspberry Pi.
More Related Content
Similar to Hybrid Algorithm for Enhanced Watermark Security with Robust Detection
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
This document summarizes several digital watermarking techniques and applications. It discusses a proposed hybrid watermarking technique that combines redundant discrete wavelet transform with singular value decomposition. It also mentions using Arnold chaotic maps to scramble watermarks for added security. Several other watermarking methods are reviewed, including techniques in the pixel domain and using discrete cosine transform with singular value decomposition. Applications discussed include mobile experiences, biometric authentication, image processing, and cryptography.
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
Copyright protection has become a need in today’s world. To achieve a secure copyright protection we embedded some information in images and videos and that image or video is called copyright protected. The embedded information can’t be detected by human eye but some attacks and operations can tamper that information to breach protection. So in order to find a secure technique of copyright protection, we have analyzed image processing techniques i.e. Spatial Domain (Least Significant Bit (LSB)), Transform Domain (Discrete Cosine Transform (DCT)), Discrete Wavelet Transform (DWT) and there are numerous algorithm for watermarking using them. After having a good understanding of the same we have proposed a novel algorithm named as Stage Staffing Algorithm that generates results with high effectiveness, additionally we can use self extracted-watermark technique to increase the security and automate the process of watermark image. The proposed algorithm provides protection in three stages. We have implemented the algorithm and results of the simulations are shown. The various factors affecting spatial domain watermarking are also discussed.
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET Journal
This document proposes a reversible database watermarking technique called Genetic Fingerprinting Algorithm using Histogram shifting (GFAHS). The technique encrypts the original database along with the owner's fingerprint and watermarks them together. This protects the original content from illegal ownership violations while allowing recovery of the original data. The technique uses a genetic algorithm to randomly partition and distribute the database among team members for collaborative work. When work is complete, updates are sent to team leaders and combined and forwarded to managers, who use biometric authentication to view the results. The aim is to provide a secure and robust system for group sharing of data on databases in the cloud.
Report on Digital Watermarking Technology vijay rastogi
Digital watermarking is the process of embedding information into digital multimedia content such that the information (which we call the watermark) can later be extracted or detected for a variety of purposes including copy prevention and control.
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET Journal
This document proposes a new authentication system to resist shoulder surfing attacks when users input passwords. The existing system has users select grid areas from split images as passwords. The proposed system provides two authentication options: the existing image-based system and a new system. The new system blocks accounts if an incorrect password is entered frequently and notifies the user via email and SMS with the device's location. It also includes a password recovery system that asks security questions on the user's device to recover forgotten passwords. The goal is to provide more secure and user-friendly authentication while banking online or on mobile apps.
IRJET- A Shoulder-Surfing Resistant Graphical Password System IRJET Journal
This document presents a shoulder-surfing resistant graphical password system. It begins with an abstract that outlines developing a system to resist shoulder-surfing attacks using a falsification method. It then reviews graphical passwords, existing systems, proposed improvements, and security measures. The proposed system aims to add an extra layer of security during authentication by inserting a false image between correct images to confuse observers and make the actual password harder to determine through shoulder surfing.
Abstract: A number of research papers has been produced about reversible watermarking. Reversible
watermarking is one of the important scheme of the watermarking schemes. Some security measures must be
there to protect the records from unauthorized user and destruction of information. Basic idea of digital
watermarking is to embed the data into the cover media to provide the security to data. The watermarking
techniques satisfying these requirements called as Reversible watermarking. Ownership of the original media
remains same but the best thing is original media is recovered from the watermarked media. This is the best and
main feature of reversible watermarking to extract the original image as it is without any distortion. This
feature is applicable in various areas such as medical as well as military images. If there is effect on the cover
then it would changes the meaning of this data. The aim of this paper is to represent the purpose of reversible
watermarking, some of the techniques related to reversible watermarking.
Keywords: Reversible watermarking, Security, copyright protection
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET Journal
This document proposes a new authentication system called PassMatrix to resist shoulder surfing attacks in graphical password authentication. PassMatrix uses multiple images to define the password. During login, users scroll through images and select their password by pointing to areas without directly touching the screen, making it difficult for observers to see the exact inputs. The system was implemented as an Android app and evaluated for accuracy and usability. Test results found it provided stronger security against shoulder surfing compared to text or single-image password schemes.
A Review of Digital Watermarking Technique for the Copyright Protection of Di...IRJET Journal
This document reviews digital watermarking techniques for copyright protection of digital data using transform functions. It discusses how transform-based watermarking systems like discrete wavelet transform and discrete cosine transform are robust against many attacks but are vulnerable to geometric attacks like rotation and noise attacks. The document provides an overview of different watermarking types and reviews several related works on digital watermarking techniques. It also discusses various types of attacks on watermarks like subtractive attacks aimed at detecting and extracting the watermark and distortive attacks that apply transformations to degrade the watermark.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
Implementation of Steganographic Techniques and its Detection.IRJET Journal
This document presents a literature review and proposed system for implementing steganographic techniques to conceal and retrieve secret information hidden in digital files like images. The proposed system would allow users to hide messages in images, videos and documents using an interface. It would also include a classifier trained to detect common steganography techniques to identify if hidden information is present in images. The system aims to provide a secure communication method and could be used for applications like digital watermarking, covert communication and detecting media piracy. It would use techniques like LSB substitution and AES encryption to hide data in bit planes of images selected by the user. An activity log and user profiles with private keys are also proposed to manage operations and provide additional security.
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueIRJET Journal
This document discusses a robust and secure digital watermarking approach based on SVD and DWT techniques. It aims to enhance image authentication and copyright protection. The key objectives are to develop a watermarking method that is imperceptible, robust against attacks, and provides high security. The proposed method embeds watermarks in the frequency domain using the Singular Value Decomposition and Discrete Wavelet Transform. Simulation results using MATLAB indicate the technique effectively balances image quality, watermark resilience, and authentication capabilities.
Information security by biometric waterkingeSAT Journals
Abstract In the recent digital world information security, person identification and authentication, and network security are the prime implications and off course requirements. To fulfill the above requirement watermarking is used widely with biometric information i.e. face image, iris, fingerprint, signature, hand geometry, voice and key stroke pattern. We propose a method for securing and protecting the biometric information of any person with the help of watermarking. The security can also be improved with the help of secrete key. Now a day’s multimodal biometric watermarking is the most advanced technology for information security where more than one biometric information’s are combined for enhancing security and privacy of information and system. In this paper we used face image as the biometric information to be secured, iris image with specific size with key is used for security improvement. Index Terms: Watermarking, Biometric, Biometric watermarking
This document discusses using biometric watermarking for information security. It proposes a method of securing biometric information like face images with watermarking and a secret key. The biometric information is watermarked with an iris image and secret key. This allows secure transmission of information that can only be recovered by the receiver if they know the secret key and watermarked image. It concludes biometric-based identification combined with watermarking and steganography improves security against unauthorized access. Future work could use multiple biometrics and codes together to further enhance security.
IRJET- Criminal Recognization in CCTV Surveillance VideoIRJET Journal
This document presents research on criminal recognition in CCTV surveillance videos using deep learning. It proposes a method where a user can upload faces of known criminals. When CCTV footage is recorded, the application will monitor for these faces. If a face is recognized, the CCTV camera will track the identified person through multiple cameras by alerting other cameras. The system segments video into images, acquires images, recognizes human faces, constructs motion flows between cameras to track individuals. Experimental results on a dataset show the system's ability to extract patterns from faces and cluster images of different angled faces. The system aims to identify criminals across surveillance camera networks.
This document summarizes a research paper that proposes using digital watermarking to hide patient information in medical images. The paper aims to improve reliability in medical information systems by embedding patient records directly in test reports. It uses discrete wavelet transform (DWT) and an adaptive thresholding approach to identify background regions in medical images to hide data, so as not to alter important foreground areas. The watermark is then embedded in the background using DWT. The paper evaluates the results using measures like mean squared error and peak signal to noise ratio, and tests the watermarked images under various attacks.
A Generalized Image Authentication Based On Statistical Moments of Color Hist...idescitation
Designing low cost and high speed authentication
solution for digital images is always an attractive area of
research in image processing. In past few years because of
widespread use of internet and network technology, concept
of information distribution has been become habit rather than
exception in daily life. In same aspects challenges involved
with distribution of authenticate information has been
increased manifolds. In this paper a generalize image
authentication method has proposed by hybridization of color
histogram and associated first four statistical moments to
achieve the objectives of low cost and high speed. Proposed
method can apply for both gray and color images having any
size and any format. Solution generates a very small
authentication code with an ease means which is use to analyze
the characteristics of received image from tampering
perspective.
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
This document presents a novel authentication system called PassMatrix that aims to overcome shoulder surfing attacks in graphical password authentication. PassMatrix uses a sequence of images where the user selects one "pass-square" per image as their password. During login, random horizontal and vertical slider bars covering the images hide the original password locations. If the user's selected coordinates under the sliders match their stored password, they are authenticated. The document outlines the design, implementation, and evaluation of the PassMatrix system, finding that it achieves better resistance to shoulder surfing compared to traditional text passwords while maintaining usability.
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...IJERA Editor
Text fusion in images is an important technology for image processing. We have lots of important information related to the patient’s reports and need lots of space to store and the proper position and name which relates that image with that data. In our work we are going to find out the ROI (region of interest) for the particular image and will fuse the related document in the NROI (non-region of interest) of the image, till yet we have many techniques to fuse text data in the medical images one of form them is to fuse data at the boarders of the images and build the particular and pre-defined boarder space. We have propose an algorithm in which we first find out the area of interest and after that we find noisy pixels of the image to embed data in that noisy portions of the image. We use wavelets for smoothing images and segmentation process for extracting region of interest. Coordinates of the noisy pixels have been located and data has been embedded in those pixels .The used embedding technique embed data in least significant bits, hence does not degrade the quality of the image to unacceptable limits. Results show that it gives good PSNR and MSE values which are used for measuring quality effected performance.
Similar to Hybrid Algorithm for Enhanced Watermark Security with Robust Detection (20)
Data Mining is a significant field in today’s data-driven world. Understanding and implementing its concepts can lead to discovery of useful insights. This paper discusses the main concepts of data mining, focusing on two main concepts namely Association Rule Mining and Time Series Analysis
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
We are describes the technique for real time human face detection and counting the number of passengers in vehicle and also gender of the passengers.The Image processing technology is very popular,now at present all are going to use it for various purpose. It can be applied to various applications for detecting and processing the digital images. Face detection is a part of image processing. It is used for finding the face of human in a given area. Face detection is used in many applications such as face recognition, people tracking, or photography. In this paper,The webcam is installed in public vehicle and connected with Raspberry Pi model. We use face detection technique for detecting and counting the number of passengers in public vehicle via webcam with the help of image processing and Raspberry Pi.
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
Sentiment analysis is a type of natural language processing for tracking the mood of the public about a particular product or a topic and is useful in several ways. Polarity shift is the most classical task which aims at classifying the reviews either positive or negative. But in many cases, in addition to the positive and negative reviews, there still many neutral reviews exist. However, the performance sometimes limited due to the fundamental deficiencies in handling the polarity shift problem. We propose an Improvised Dual Sentiment Analysis (IDSA) model to address this problem for sentiment classification. We first propose a novel data expansion technique by creating sentiment-reversed review for each training and test review. We develop a corpus based method to construct a pseudo-antonym dictionary. It removes DSA’s dependency on an external antonym dictionary for review reversion. We conduct a range of experiments and the results demonstrates the effectiveness of DSA in addressing the polarity shift in sentiment classification. .
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
The requirements of fifth generation new radio (5G- NR) access networks are very high capacity and ultra-reliability. In this paper, we proposed a V-BLAST2 × N_r MIMO system that is analyzed, improved, and expected to achieve both very high throughput and ultra- reliability simultaneously.A new detection technique called parallel detection algorithm is proposed. The performance of the proposed algorithm compared with existing linear detection algorithms. It was seen that the proposed technique increases the speed of signal transmission and prevents error propagation which may be present in serial decoding techniques. The new algorithm reduces the bit error probability and increases the capacity simultaneouslywithout using a standard STC technique. However, it was seen that the BER of systems using the proposed algorithm is slightly higher than a similar system using only STC technique. Simulation results show the advantages of using the proposed technique.
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
A wireless network enables people to communicate and access applications and information without wires. This provides freedom of movement and the ability to extend applications to different parts of a building, city, or nearly anywhere in the world. Wireless networks allow people to interact with e-mail or browse the Internet from a location that they prefer. Adhoc Networks are self-organizing wireless networks, absent any fixed infrastructure. broadcasting of data through proper channel is essential. Various protocols are designed to avoid the loss of data. In this paper an overview of different broadcast protocols are discussed.
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node Illegitimately claims multiple identities.Mobility cause a main problem when we talk about security in Mobile Ad-hoc networks. It doesn’t depend on fixed architecture, the nodes are continuously moving in a random fashion. In this article we will focus on identifying the Sybil attack in MANET. It uses air medium for communication so it is more prone to the attack. Sybil attack is one in which single node present multiple fake identities to other nodes, which cause destruction.
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
In 1900, less than 20 percent of the world populace lived in cities, in 2007, fair more than 50 percent of the world populace lived in cities. In 2050, it has been anticipated that more than 70 percent of the worldwide population (about 6.4 billion individuals) will be city tenants. There's more weight being set on cities through this increment in population [1]. With approach of keen cities, data and communication technology is progressively transforming the way city regions and city inhabitants organize and work in reaction to urban development. In this paper, we create a nonspecific plot for navigating a route throughout city A asked route is given by utilizing combination of A* Algorithm and Haversine equation. Haversine Equation gives least distance between any two focuses on spherical body by utilizing latitude and longitude. This least distance is at that point given to A* calculation to calculate minimum distance. The method for identifying the shortest path is specify in this paper.
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
This document discusses techniques for processing queries over encrypted data in Internet of Things (IoT) systems. It describes CryptDB and MONOMI, which are database systems that can execute SQL queries over encrypted data. CryptDB uses a database proxy to encrypt/decrypt data and rewrite queries to execute on encrypted data. MONOMI builds on CryptDB and introduces a split client/server approach to query execution to improve efficiency of analytical queries over encrypted data. The document also outlines various encryption schemes that can be used for encrypted query processing, including deterministic encryption, order-preserving encryption, homomorphic encryption, and others.
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
This document describes a system for determining the quality and grading tomatoes using image processing techniques on a Raspberry Pi. The system uses a USB camera to capture images of tomatoes and then performs preprocessing, masking, contour detection, image enhancement and color detection algorithms to analyze features like shape, size, color and texture. It can grade tomatoes into four categories: red, orange, green, and turning green. The system was able to accurately determine tomato quality and estimate expiry dates with 90% accuracy and had low computational time of 0.52 seconds compared to other machine learning methods.
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
Network management and Routing is supportively done by performing with the nodes, due to infrastructure-less nature of the network in Ad hoc networks or MANET. The nodes are maintained itself from the functioning of the network, for that reason the MANET security challenges several defects. Routing process and Scheduling is a significant idea to enhance the security in MANET. Other than, scheduling has been recognized to be a key issue for implementing throughput/capacity optimization in Ad hoc networks. Designed underneath conventional (LT) light tailed assumptions, traffic fundamentally faces Heavy-tailed (HT) assumption of the validity of scheduling algorithms. Scheduling policies are utilized for communication networks such as Max-Weight, backpressure and ACO, which are provably throughput optimality and the Pareto frontier of the feasible throughput region under maximal throughput vector. In wireless ad-hoc network, the issue of routing and optimal scheduling performs with time varying channel reliability and multiple traffic streams. Depending upon the security issues within MANETs in this paper presents a comparative analysis of existing scheduling policies based on their performance to progress the delay performance in most scenarios. The security issues of MANETs considered from this paper presents a relative analysis of existing scheduling policies depend on their performance to progress the delay performance in most developments.
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
The dc conductivity of consolidated nanoparticle of CdS has been studied over the temperature range from 303 K to 523 K and the conductivity has been found to be much larger than that of single crystals.
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
OFDM (Orthogonal Frequency Division Multiplexing) is generally preferred for high data rate transmission in digital communication. The Long-Term Evolution (LTE) standards for the fourth generation (4G) wireless communication systems. Orthogonal Frequency Division Multiple Access (OFDMA) and Single Carrier Frequency Division Multiple Access (SC-FDMA) are the two multiple access techniques which are generally used in LTE.OFDM system has a major shortcoming of high peak to average power ratio (PAPR) value. This paper explains different PAPR reduction techniques and presents a comparison of the various techniques based on theoretical results. It also presents a survey of the various PAPR reduction techniques and the state of the art in this area.
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
Home automation has been a dream of sciences for so many years. It could wind up conceivable in twentieth century simply after power all family units and web administrations were begun being utilized on across the board level. The point of home robotization is to give enhanced accommodation, comfort, vitality effectiveness and security. Vitality checking and protection holds prime significance in this day and age in view of the irregularity between control age and request observing frameworks accessible in the market. Ordinarily, customers are disappointed with the power charge as it doesn't demonstrate the power devoured at the gadget level. This paper shows the outline and execution of a vitality meter utilizing Arduino microcontroller which can be utilized to gauge the power devoured by any individual electrical apparatus. The primary expectation of the proposed vitality meter is to screen the power utilization at the gadget level, transfer it to the server and build up remote control of any apparatus. So we can screen the power utilization remotely and close down gadgets if vital. The car segment is additionally one of the application spaces where vehicle can be made keen by utilizing "IOT". So a vehicle following framework is additionally executed to screen development of vehicles remotely.
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
An anticipated outcome that is intended chapter is to investigate effects of magnetic field on an oscillatory flow of a viscoelastic fluid with thermal radiation, viscous dissipation with Ohmic heating which bounded by a vertical plane surface, have been studied. Analytical solutions for the quasi – linear hyperbolic partial differential equations are obtained by perturbation technique. Solutions for velocity and temperature distributions are discussed for various values of physical parameters involving in the problem. The effects of cooling and heating of a viscoelastic fluid compared to the Newtonian fluid have been discussed.
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
In fast growing database repository system, image as data is one of the important concern despite text or numeric. Still we can’t replace test on any cost but for advancement, information may be managed with images. Therefore image processing is a wide area for the researcher. Many stages of processing of image provide researchers with new ideas to keep information safe with better way. Feature extraction, segmentation, recognition are the key areas of the image processing which helps to enhance the quality of working with images. Paper presents the comparison between image formats like .jpg, .png, .bmp, .gif. This paper is focused on the feature extraction and segmentation stages with background removal process. There are two filters, one is integer filter and second one is floating point Filter, which is used for the key feature extraction from image. These filters applied on the different images of different formats and visually compare the results.
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
This document summarizes research on using Alamouti space-time block coding (STBC) for channel estimation in MIMO-OFDM wireless communication systems. The proposed system uses 16-PSK modulation with up to 4 transmit and 32 receive antennas. Simulation results show that the proposed approach reduces bit error rate and mean square error at higher signal-to-noise ratios, compared to existing MISO systems. Alamouti-STBC channel estimation improves performance for MIMO-OFDM by achieving full diversity gain from multiple transmit antennas.
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
A vibration investigation is about the specialty of searching for changes in the vibration example, and after that relating those progressions back to the machines mechanical outline. The level of vibration and the example of the vibration reveal to us something about the interior state of the turning segment. The vibration example can let us know whether the machine is out of adjust or twisted. Al-so blames with the moving components and coupling issues can be distinguished. This paper shows an approach for equip blame investigation utilizing signal handling plans. The information has been taken from college of ohio, joined states. The investigation has done utilizing MATLAB software.
1) The document discusses using the ARIMA technique for short term load forecasting of electricity demand in West Bengal, India.
2) It analyzed historical hourly load data from 2017 to build an ARIMA model and forecast demand for July 31, 2017, achieving a Mean Absolute Percentage Error of 2.1778%.
3) ARIMA is identified as an appropriate univariate time series method for short term load forecasting that provides more accurate results than other techniques.
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
The coupled line coupler is a type of directional coupler which finds practical utility. It is mainly used for sampling the microwave power. In this paper, 3 couplers A,B & C are designed with different values of coupling coefficient 6dB,10dB & 18dB respectively at a frequency of 2.5GHz using ADS tool. The return loss, isolation loss & transmission loss are determined. The design & simulation is done using microstrip line technology.
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
The ignition of flammable gases, vapours or dust in presence of oxygen contained in the surrounding atmosphere may lead to explosion. Flameproof three phase induction motors are the most common and frequently used in the process industries such as oil refineries, oil rigs, petrochemicals, fertilizers, etc. The design of flameproof motor is such that it allows and sustain explosion within the enclosure caused by ignition of hazardous gases without transmitting it to the external flammable atmosphere. The enclosure is mechanically strong enough to withstand the explosion pressure developed inside it. To prevent an explosion due to hot spot on the surface of the motor, flameproof induction motors are subjected to heat run test to determine the maximum surface temperature and temperature class with respect to the ignition temperature of the surrounding flammable gas atmosphere. This paper highlights the design features of flameproof motors and their surface temperature classification for different sizes.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Hybrid Algorithm for Enhanced Watermark Security with Robust Detection
1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 245 - 249
______________________________________________________________________________________
245
IJRITCC | June 2018, Available @ http://www.ijritcc.org
______________________________________________________________________________________
Hybrid Algorithm for Enhanced Watermark Security with Robust Detection
Bhawna
M. Tech.Scholar
Dept.of CSE
Arya college of Engg. & I.T.
Bhwna.kumari@gmail.com
Prof. Vishal Shrivastava
M.Tech co-ordinator
Dept.of CSE
Arya college of Engg. & I.T.
vishalshrivastava.cs@aryacollege.in
Dr. Akhil Pandey
HOD
Dept.of CSE
Arya college of Engg. & I.T.
Abstract— A variety of imperceptible watermarking schemes have been proposed over the last few years. In general, publications on the subject
tend to focus on the technical details of the specific scheme (increase of robustness, improvement of imperceptibility, etc.), paying little
attention on the application scenarios where the proposed method could fit in. Most of the methods are said to be suitable for either copyright
protection or authentication, i.e. for a single specific application with no investigation is done on the possibility of applying the same scheme to
other applications as well. The main reason for this is that no attempt for a detailed and systematic listing and categorization of the existing
application scenarios took place so far.
A hybrid algorithm for printed image watermarking with enhanced security employing cryptographic techniques & robust detection with
graceful degradation is developed & investigated. Robust detection is achieved by graceful degradation of the recovered image. Various types of
attacks on watermark method image have been simulated & their resultant has been observed. Experimental results prove the security &
robustness of the proposed algorithm.
Keywords- Watermarking, Hybrid Algorithm, Cryptography, Graceful Degradation.
__________________________________________________*****_________________________________________________
I. INTRODUCTION
Watermarking is a sort of marker secretively installed in a
commotion tolerant flag, for example, sound, and video or
picture information. It is normally used to recognize
responsibility for copyright of such flag. "Watermarking" is
the way toward stowing away advanced data in a bearer flag;
the shrouded data should, yet does not have to, contain a
connection to the transporter flag. Computerized watermarks
might be utilized to confirm the legitimacy or uprightness of
the transporter flag or to demonstrate the personality of its
proprietors. It is noticeably utilized for following copyright
encroachments and for banknote validation.
Like conventional physical watermarks, advanced watermarks
are regularly just recognizable under specific conditions, i.e. in
the wake of utilizing some calculation. In the event that a
computerized watermark mutilates the bearer motion in a way
that it turns out to be effortlessly detectable, it might be
viewed as less viable relying upon its motivation. Customary
watermarks might be connected to noticeable media (like
pictures or video), though in computerized watermarking, the
flag might be sound, pictures, video, writings or 3D models. A
flag may convey a few unique watermarks in the meantime.
Not at all like metadata that is added to the bearer flag, does a
computerized watermark not change the measure of the
transporter flag. The required properties of an advanced
watermark rely upon the utilization case in which it is
connected. For stamping media documents with copyright data,
an advanced watermark must be somewhat powerful against
changes that can be connected to the bearer flag. Rather, if
trustworthiness must be guaranteed, a delicate watermark
would be connected. Both Stegnography and advanced
watermarking utilize steganographic systems to implant
information secretly in boisterous signs. While Stegnography
goes for intangibility to human detects, computerized
watermarking tries to control the heartiness as best need. Since
an advanced duplicate of information is the same as the first,
computerized watermarking is a latent security instrument. It
just checks information, however does not debase it or control
access to the information. One use of computerized
watermarking is source following. A watermark is installed
into a computerized motion at each purpose of appropriation.
In the event that a duplicate of the work is discovered later, at
that point the watermark might be recovered from the
duplicate and the wellspring of the dispersion is known. This
system apparently has been utilized to identify the wellspring
of illicitly duplicated films.
2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 245 - 249
______________________________________________________________________________________
246
IJRITCC | June 2018, Available @ http://www.ijritcc.org
______________________________________________________________________________________
II. LITERATURE REVIEW
Jeng-Shyang Pan, Hao Lu, And Zhe-Ming Lu Described That
Nowadays, halftone pictures show up routinely in books,
magazines, printer yields, and fax reports. It is attractive to
implant information in halftone pictures for copyright security
and substance validation. Creators propose a novel
watermarking plan for halftone picture verification, misusing
picture hash as a delicate watermark. After pixel blocking and
requesting, a query table is built by squares' recurrence of
event. Watermark implanting is to dislodge the first pieces
with the comparing comparative squares in the query table,
and in the turn around process watermark is separated. Some
additional squares are haphazardly chosen with a mystery key
for the query table implanting, and the first information of
these pieces are likewise embedded into the picture. In picture
confirmation, the query table is remade first with the mystery
key, and afterward a basic table-look-into system is utilized to
remove the watermark hash, at last we just need to contrast the
watermark hash and the hash of recuperated picture: in the
event that they are equivalent, the first picture endures no
adjustment; else it is changed. As a lossless strategy, the first
picture can be superbly recuperated by playing out the switch
procedure of the watermark inserting if the watermarked
picture is in place. It is important to keep the substance of
unique host picture unaltered in some particular applications,
where content exactness of the host picture must be ensured,
e.g. military maps, restorative pictures, awesome gems, and so
forth. As a delicate watermarking, even one pixel flipping can
be distinguished. As a result of the little amount of watermark,
low quality twisting is acquainted with the halftone picture.
Examination comes about show the viability of the plan.
Creators exhibit a lossless watermarking plan for halftone
picture validation. The hash succession of the picture is
inserted as a versatile delicate watermark. To judge whether
the first picture is changed or not, we just need to analyze the
separated watermark and the hash arrangement of the
reestablished picture. On the off chance that they are precisely
the same, the picture endures no modification; else it is
changed. For whatever length of time that the watermarked
picture isn't unapproved changed, the first picture can be
culminated recuperated. Furthermore, no data should be
spared aside from a mystery key. [1]
III. METHODOLOGY
System Block Diagram
First take input logo image and convert it in logo gray scale
and then encrypt the logo through variable logo mixed gray
scale then cover the logo image with cover images gray scale
conversion through watermarking logo using LBP.
When we give input logo watermarked image then attack on a
watermarked image first image gap attack and noise addition
we can add a logo image and we can change the contrast
change image and compression attack and temperament attack
could be safe as and we can modified water marked logo
image with these methods.
After the input modified of watermarking image we can
recover the water mark and decrypt watermark and computer
display image parameter.
IV. RESULT
Process Flow.
3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 245 - 249
______________________________________________________________________________________
247
IJRITCC | June 2018, Available @ http://www.ijritcc.org
______________________________________________________________________________________
First step: In the process we have take images for enhanced for
watermarking security with robust detection and encrypt the
logo which we have taken for example in put cover image.
Second step: Convert the image into gray scale conversion
Third step: Gary scale conversion image convert into the
watermark logo.
Forth step: we will apply the different kind of attack on
original images. The various attacks are 1. Image crop attack
2. Noise addition attack
3. Contrast change attack
4. Comparison attack
5. Temperament attack
Fifth step: Recover water mark image
Sixth step: Decrypt them.
Seventh step: and of the last we have write down the reading
of original images SNR and MSE and recovered images SNR
and MSE.
For example:
In process flow, we encrypted the below images with given
cover images. In this process, we have original images (Nexus
and Bass) to encrypt with each cover images. First we took
Nexus to encrypt with cover images (blue hills and sunset).
After that the image generate in VC share1 and VC share 2,
these images, they encrypted in Encrypt VC1 and Encrypt VC
and then they embedded with each cover images. And found
Embedded VC1 and Embedded VC2. And to recover this
image, we took both cover image Read Cover Image 1 and
Read Cover Image2. Then recovered in Recover VC1 and
Recover VC2 After the decryption of these, (Decrypt 1 and 2)
we found superimpose VC’s.
And then, we took array to encrypt with cover images (nexus
and bass). After that the image generate in VC share1 and VC
share 2 these images, they encrypted in Encrypt VC1 and
Encrypt VC2. And embedded with each cover images and
found Embedded VC1 and Embedded VC2 and to recover this
image, we took both cover image Read Cover Image 1 and
Read Cover Image2.Than recovered in Recover VC1 and
Recover VC2. After the decryption of these, (Decrypt 1 and 2)
we found superimpose VC’s In This Table We Found Space
Occupancy In Cover Image.
Table 1 Encrypted SNR Space Occupancy In Cover Images
Logo Images 1
We take the process logo images for experimental results and
cover image and attack on them and read out them recovered
SNR and recovered MSE.
Table 2 Experimental Result of Various Types of Attacks on
Logo1 Sunset Water Marking
Graph1.1. Graph of Recovered SNR and Recovered MSE in
Logo 1
(Recovered MSE Scaled By Factor of 10)
Average Recovered SNR: 6.1404
Average Recovered MSE: 0.4931
Logo Images 2
4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 245 - 249
______________________________________________________________________________________
248
IJRITCC | June 2018, Available @ http://www.ijritcc.org
______________________________________________________________________________________
Table 3 Experimental Result of Various Types of Attacks on
Logo2 Blue Hills Water Marking
Graph1.2. Graph of Recovered SNR and Recovered MSE in
Logo 2
(Recovered MSE Scaled By Factor of 10)
Average Recovered SNR: 6.5717
Average Recovered MSE: 0.4699
Logo Images 3
Table 3 Experimental Result of Various Types of Attacks on
Logo3 Pano Water Marking
Graph1.3 Graph of Recovered SNR and Recovered MSE in
Logo 3
(Recovered MSE Scaled By Factor of 10)
Average Recovered SNR: 9.2389
Average Recovered MSE: 0.3545
V. CONCLUSION
In this work, a novel hybrid scheme for enhancing the security
& detection robustness of printed watermarks is presented.
LBP (local binary pattern) watermarking is combined with
VLMKG (variable length mixed key generation) algorithm to
achieve high level security for watermarking data & spatial
distribution of watermarking data in cover image to facilitate
our robust detection to recover watermark image as much as
possible in case of temperament cropping or other type of
cover image degradation. Excellent performance of the aspect
of security & robustness are observed in the results, with non
recognizable output without pre shared private full partial logo
recovery in various types of image attacks. Also average SNR
of 7.31 & MSE of 0.4931 are observed which clearly
demonstrate the superiority of the proposed technique.
VI. FUTURE SCOPE
The proposed system, as demonstrated, has sought tremendous
improvement in reliability & security of printed image
watermarking technique, however, as the technology is in a
nascent stage, a plashes of innovation & improvements are
sought in the near future, as this technology becomes more
variable popular. One of the roughest innovations would be
inclusion of biometric security in printed image watermarking
domain. Another much sought improvement is spreading of
watermark in spatial & frequency domains to enhance