IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
Secure Data Encryption and Authentication using Visual Cryptography in the TS...AM Publications,India
In today’s nature transmitting message in a safe and protected miniature is difficult, especially when decidedly conscious message is involved. The system aspiration at suggested a methodology which employs dual stage of examination getting cryptography and steganography to cover the mysterious document message. The Visual cryptography system (VCS) is a protected mode that encoded a mysterious image into shares. The key design behind the suggested access deals with message hiding in image getting Zigzag scanning pattern which is more complex method Z2H in steganography again encoded as shares by VC technique for hidden in separate cover images to present authentication for the VC shares which makes these mysterious shares invisible by hidden them into cover images getting TSVCE method. The mysterious shares generated from VC encryption are watermarked into some cover images getting digitized watermarking. Digitized watermarking is used for providing the dual examination of image shares. The share is embedded into the cover image getting Least Significant Bit Insertion Technique (LSB). The system presents more protected and meaningful mysterious shares that are robust against a total of attacks. The performance of the suggested system is evaluated getting peak signal to noise ratio (PSNR), histogram analysis and also numerical experimentation suggests that hidden time varies linearly with message length. The simulation results show that, the suggested system presents high stage of examination.
Lsb hiding using random approach for image watermarkingeSAT Journals
Abstract A digital image watermarking is the process of embedding an image with a secondary parameter called watermark, without deterioration in the quality of image to provide copyright protection means to provide protection for intellectual property from illegal copying. In this paper the method of nested digital image watermarking is used that means a watermark inside another watermark embedded into the cover image that is the main image. Here the Randomized LSB hiding algorithm is used for embedding one image into another as it has lesser complexity and the approach is more robust to the variations in the type of image. The blowfish algorithm is used to encrypt the watermark image before embedding into the cover image. The concept of encryption of watermark image before get embedded into the main image is used here to increase the security of the watermark image. This is because the research work is mainly focus on to get the more secured watermark by improving and enhancing the embedding capacity. Key Words: Digital image Watermarking, Randomized LSB, Blowfish, Copyright Protection
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
Secure Data Encryption and Authentication using Visual Cryptography in the TS...AM Publications,India
In today’s nature transmitting message in a safe and protected miniature is difficult, especially when decidedly conscious message is involved. The system aspiration at suggested a methodology which employs dual stage of examination getting cryptography and steganography to cover the mysterious document message. The Visual cryptography system (VCS) is a protected mode that encoded a mysterious image into shares. The key design behind the suggested access deals with message hiding in image getting Zigzag scanning pattern which is more complex method Z2H in steganography again encoded as shares by VC technique for hidden in separate cover images to present authentication for the VC shares which makes these mysterious shares invisible by hidden them into cover images getting TSVCE method. The mysterious shares generated from VC encryption are watermarked into some cover images getting digitized watermarking. Digitized watermarking is used for providing the dual examination of image shares. The share is embedded into the cover image getting Least Significant Bit Insertion Technique (LSB). The system presents more protected and meaningful mysterious shares that are robust against a total of attacks. The performance of the suggested system is evaluated getting peak signal to noise ratio (PSNR), histogram analysis and also numerical experimentation suggests that hidden time varies linearly with message length. The simulation results show that, the suggested system presents high stage of examination.
Lsb hiding using random approach for image watermarkingeSAT Journals
Abstract A digital image watermarking is the process of embedding an image with a secondary parameter called watermark, without deterioration in the quality of image to provide copyright protection means to provide protection for intellectual property from illegal copying. In this paper the method of nested digital image watermarking is used that means a watermark inside another watermark embedded into the cover image that is the main image. Here the Randomized LSB hiding algorithm is used for embedding one image into another as it has lesser complexity and the approach is more robust to the variations in the type of image. The blowfish algorithm is used to encrypt the watermark image before embedding into the cover image. The concept of encryption of watermark image before get embedded into the main image is used here to increase the security of the watermark image. This is because the research work is mainly focus on to get the more secured watermark by improving and enhancing the embedding capacity. Key Words: Digital image Watermarking, Randomized LSB, Blowfish, Copyright Protection
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A new approach for providing limited information only that is necessary for fund
transfer during online shopping thereby safeguarding customer data and increasing customer
confidence and preventing identity theft has been proposed. When you make a payment, the
information will never be passed on your personal financial details to merchant sites, keeping your
data safe and your identity protected against fraud. A cryptographic technique based on visual secret
sharing is used for image encryption. Using k out of n (k, n) visual secret sharing scheme a secret
image is encrypted in shares which are meaningless images that can be transmitted or distributed over
an un-trusted communication channel. Only combining the k shares or more give the original secret
image. Phishing is an attempt by an individual or a group to thieve personal confidential information
such as passwords, credit card information etc., from unsuspecting victims for identity theft, financial
gain and other fraudulent activities The use of images is explored to preserve the privacy of image
captcha by decomposing the original image captcha into two shares that are stored in separate
database servers such that the original image captcha can be revealed only when both are
simultaneously available; the individual sheet images do not reveal the identity of the original image
captcha. Once the original image captcha is revealed to the user it can be used as the password.
Several solutions have been proposed to tackle phishing.
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
A Self –Destructing Secure Messaging System Using Multi Key Management Schemeijiert bestjournal
We propose the Pandora Messaging, an enhanced secure instant messaging architecture which is
equipped with a self-message-destructing feature for sensitive personal information applications
in a mobile environment along with Multi Key Security Management using Shamirs algorithm.
The proposed system will be beneficial for Government officers for communicating very
sensitive and confidential messages. We design the Pandora Message Encryption and Exchange
Scheme and the format of a self-destructible message to show how to exchange these messages
atop the existing instant messaging service architecture. The Pandora Messaging-based system
enables senders to set time, frequency, and location constraints. These conditions determine
when the transmitted messages should be destructed and thus become unreadable for receivers.
The Pandora Messaging-based system securely sends self destructible messages to receivers in a
way that it uses ephemeral keys to encrypt the messages and transmits the encrypted messages to
the designated receiver‟s instant messaging service in real time. When the transmitted messages‟
constraints are satisfied, the ephemeral key used for encryption will be deleted .Thus, the
encrypted messages become unrecoverable. The most important part is that the Key are managed
by the system. The system generates a pool of key and any group of the same pool can be used to
encrypt and decrypt the message.
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Many security primitives are supported hard
mathematical problems. Passwords remain the foremost
widely used authentication method despite their well-known
security weaknesses. CAPTCHA authentication is clearly a
practical problem.
Graphical Password by Watermarking for securityIJERA Editor
The most common authentication method is to use alphanumerical usernames and passwords. This method has
been shown to have considerable disadvantage. For example, users tend to pick passwords that can be easily
guessed. On the other hand, if a password is very difficult to guess, then it is often difficult to remember. To
address this problem, some researchers have developed authentication methods that use pictures as passwords.
Graphical Password based on the fact that humans tend to remember images better. In this paper, we will
propose a new algorithm that using watermarking technique as the solution to solving image gallery attacks and
using the random character set generation for each image for resistance to shoulder surfing attack to provide
better system security. All the information images in registration phase will be process by copy right protection
of watermarking where the login page will check this information for security purposes.
An important topic in the exchange of confidential messages over the internet is the security of information conveyance. For instance, the producers and consumers of digital products are keen to know that their products are authentic and can be differentiated from those that are invalid. The science of encryption is the art of embedding data in audio files, images, videos or content in a way that would meet the above security needs. Steganography is a branch of data hiding science which aims to reach a describe level of security in the exchange of private military and commercial data which is not clear. This system is proposed to hide the text information files within the image based on the LSB method in order to meet security requirement such as confidential and integrity. The least significant bit is the bit which is farthest to the right and holds the least value in a multi bit binary number. This system is implemented by using C programming. Win Win Maw | San San Lwin "Text Embedded System using LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26696.pdf Paper URL: https://www.ijtsrd.com/engineering/information-technology/26696/text-embedded-system-using-lsb-method/win-win-maw
Online Payment System using Steganography and Visual CryptographyIJCERT
In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. Phishing is a method of stealing personal confidential information such as username, passwords and credit card details from victims. It is a social engineering technique used to deceive users. In this paper new method is proposed that uses text based steganography and visual cryptography. It represents new approach which will provide limited information for fund transfer. This method secures the customer's data and increases customer's confidence and prevents identity theft.
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
A new data hiding method is proposed in this project , which can increase the steganographic security of a data hiding scheme .In this method a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then it has been divided into non-overlapping embedding units .The division is made such that it gives two consecutive pixel values .As human eye has limited tolerance when it comes to texture and edge areas than in smooth areas , and as the difference between the pixel pairs in those areas are larger , therefore the method exploites pixel value difference (PVD) to solve out overflow underflow problem .
Utilizing distributed storage administrations, clients can store their Information in the cloud to maintain a strategic distance from
the consumption of neighborhood information stockpiling support. To guarantee the uprightness of the information put away in
the Cloud, numerous information, honesty examining plans have been proposed. A client needs to Utilize his private key to
produce the information authenticators for Understanding the information respectability reviewing. In this way, the client needs to
have an equipment token to store his private Key and retain a secret phrase to enact this private key. In the event that this
Equipment token is lost or this secret phrase is overlooked, the majority of the Current information, trustworthiness inspecting
plans would be notable work. We propose another worldview Called information uprightness inspecting without private key
stockpiling and Plan such a plan. In this plan, we use biometric informationas the client's fluffy private key to Abstain from
utilizing the equipment token. In the interim, the plan can at present Successfully complete the information respectability
auditing. We use a direct Sketch with coding and blunder revision procedures to affirm The personality of the client. We use
another mark Conspire which supports blacklist certainty. The security evidence and the Execution examination demonstrates that our proposed plan accomplishes Attractive security andeffectiveness.
Secure system based on recombined fingerprints for sharing multimedia files i...eSAT Journals
Abstract In this paper the execution time is less when compared to previous algorithm. And also it provide security between the merchant and buyer The traitor tracing protocol is used to detect the illegal transaction. Here we used fingerprinting solution to avoid illegal redistribution of multimedia contents. Here we convert the multimedia video file into image then encrypting the image after the encrypted image will be transferred from merchant to buyer. The buyer receives the copyright protection from merchant, he decrypts the image then converts it into video. After that, the copyright protection of file is transferred to child buyer. Then tracing traitor protocol is used to checks the fingerprints for merchant to buyer and buyer to child buyer. Traitor tracing protocol is used to detect the illegal transaction of the content. The Blowfish algorithm is used to encrypt and decrypt the multimedia files. Finally we detect the performance of our work based on efficiency, accuracy and we achieve security. Keywords: Fingerprint, Multimedia files, Blowfish algorithm, Merchant, Buyer, Child Buyer, Copyright Protection
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A new approach for providing limited information only that is necessary for fund
transfer during online shopping thereby safeguarding customer data and increasing customer
confidence and preventing identity theft has been proposed. When you make a payment, the
information will never be passed on your personal financial details to merchant sites, keeping your
data safe and your identity protected against fraud. A cryptographic technique based on visual secret
sharing is used for image encryption. Using k out of n (k, n) visual secret sharing scheme a secret
image is encrypted in shares which are meaningless images that can be transmitted or distributed over
an un-trusted communication channel. Only combining the k shares or more give the original secret
image. Phishing is an attempt by an individual or a group to thieve personal confidential information
such as passwords, credit card information etc., from unsuspecting victims for identity theft, financial
gain and other fraudulent activities The use of images is explored to preserve the privacy of image
captcha by decomposing the original image captcha into two shares that are stored in separate
database servers such that the original image captcha can be revealed only when both are
simultaneously available; the individual sheet images do not reveal the identity of the original image
captcha. Once the original image captcha is revealed to the user it can be used as the password.
Several solutions have been proposed to tackle phishing.
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
A Self –Destructing Secure Messaging System Using Multi Key Management Schemeijiert bestjournal
We propose the Pandora Messaging, an enhanced secure instant messaging architecture which is
equipped with a self-message-destructing feature for sensitive personal information applications
in a mobile environment along with Multi Key Security Management using Shamirs algorithm.
The proposed system will be beneficial for Government officers for communicating very
sensitive and confidential messages. We design the Pandora Message Encryption and Exchange
Scheme and the format of a self-destructible message to show how to exchange these messages
atop the existing instant messaging service architecture. The Pandora Messaging-based system
enables senders to set time, frequency, and location constraints. These conditions determine
when the transmitted messages should be destructed and thus become unreadable for receivers.
The Pandora Messaging-based system securely sends self destructible messages to receivers in a
way that it uses ephemeral keys to encrypt the messages and transmits the encrypted messages to
the designated receiver‟s instant messaging service in real time. When the transmitted messages‟
constraints are satisfied, the ephemeral key used for encryption will be deleted .Thus, the
encrypted messages become unrecoverable. The most important part is that the Key are managed
by the system. The system generates a pool of key and any group of the same pool can be used to
encrypt and decrypt the message.
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Many security primitives are supported hard
mathematical problems. Passwords remain the foremost
widely used authentication method despite their well-known
security weaknesses. CAPTCHA authentication is clearly a
practical problem.
Graphical Password by Watermarking for securityIJERA Editor
The most common authentication method is to use alphanumerical usernames and passwords. This method has
been shown to have considerable disadvantage. For example, users tend to pick passwords that can be easily
guessed. On the other hand, if a password is very difficult to guess, then it is often difficult to remember. To
address this problem, some researchers have developed authentication methods that use pictures as passwords.
Graphical Password based on the fact that humans tend to remember images better. In this paper, we will
propose a new algorithm that using watermarking technique as the solution to solving image gallery attacks and
using the random character set generation for each image for resistance to shoulder surfing attack to provide
better system security. All the information images in registration phase will be process by copy right protection
of watermarking where the login page will check this information for security purposes.
An important topic in the exchange of confidential messages over the internet is the security of information conveyance. For instance, the producers and consumers of digital products are keen to know that their products are authentic and can be differentiated from those that are invalid. The science of encryption is the art of embedding data in audio files, images, videos or content in a way that would meet the above security needs. Steganography is a branch of data hiding science which aims to reach a describe level of security in the exchange of private military and commercial data which is not clear. This system is proposed to hide the text information files within the image based on the LSB method in order to meet security requirement such as confidential and integrity. The least significant bit is the bit which is farthest to the right and holds the least value in a multi bit binary number. This system is implemented by using C programming. Win Win Maw | San San Lwin "Text Embedded System using LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26696.pdf Paper URL: https://www.ijtsrd.com/engineering/information-technology/26696/text-embedded-system-using-lsb-method/win-win-maw
Online Payment System using Steganography and Visual CryptographyIJCERT
In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. Phishing is a method of stealing personal confidential information such as username, passwords and credit card details from victims. It is a social engineering technique used to deceive users. In this paper new method is proposed that uses text based steganography and visual cryptography. It represents new approach which will provide limited information for fund transfer. This method secures the customer's data and increases customer's confidence and prevents identity theft.
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
A new data hiding method is proposed in this project , which can increase the steganographic security of a data hiding scheme .In this method a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then it has been divided into non-overlapping embedding units .The division is made such that it gives two consecutive pixel values .As human eye has limited tolerance when it comes to texture and edge areas than in smooth areas , and as the difference between the pixel pairs in those areas are larger , therefore the method exploites pixel value difference (PVD) to solve out overflow underflow problem .
Utilizing distributed storage administrations, clients can store their Information in the cloud to maintain a strategic distance from
the consumption of neighborhood information stockpiling support. To guarantee the uprightness of the information put away in
the Cloud, numerous information, honesty examining plans have been proposed. A client needs to Utilize his private key to
produce the information authenticators for Understanding the information respectability reviewing. In this way, the client needs to
have an equipment token to store his private Key and retain a secret phrase to enact this private key. In the event that this
Equipment token is lost or this secret phrase is overlooked, the majority of the Current information, trustworthiness inspecting
plans would be notable work. We propose another worldview Called information uprightness inspecting without private key
stockpiling and Plan such a plan. In this plan, we use biometric informationas the client's fluffy private key to Abstain from
utilizing the equipment token. In the interim, the plan can at present Successfully complete the information respectability
auditing. We use a direct Sketch with coding and blunder revision procedures to affirm The personality of the client. We use
another mark Conspire which supports blacklist certainty. The security evidence and the Execution examination demonstrates that our proposed plan accomplishes Attractive security andeffectiveness.
Secure system based on recombined fingerprints for sharing multimedia files i...eSAT Journals
Abstract In this paper the execution time is less when compared to previous algorithm. And also it provide security between the merchant and buyer The traitor tracing protocol is used to detect the illegal transaction. Here we used fingerprinting solution to avoid illegal redistribution of multimedia contents. Here we convert the multimedia video file into image then encrypting the image after the encrypted image will be transferred from merchant to buyer. The buyer receives the copyright protection from merchant, he decrypts the image then converts it into video. After that, the copyright protection of file is transferred to child buyer. Then tracing traitor protocol is used to checks the fingerprints for merchant to buyer and buyer to child buyer. Traitor tracing protocol is used to detect the illegal transaction of the content. The Blowfish algorithm is used to encrypt and decrypt the multimedia files. Finally we detect the performance of our work based on efficiency, accuracy and we achieve security. Keywords: Fingerprint, Multimedia files, Blowfish algorithm, Merchant, Buyer, Child Buyer, Copyright Protection
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
In an ever-changing landscape of one digital disruption after another, companies and organisations are looking for new ways to understand their target markets and engage them better. Increasingly they invest in user experience (UX) and customer experience design (CX) capabilities by working with a specialist UX agency or developing their own UX lab. Some UX practitioners are touting leaner and faster ways of developing customer-centric products and services, via methodologies such as guerilla research, rapid prototyping and Agile UX. Others seek innovation and fulfilment by spending more time in research, being more inclusive, and designing for social goods.
Experience is more than just an interface. It is a relationship, as well as a series of touch points between your brand and your customer. Here are our top 10 highlights and takeaways from the recent UX Australia conference to help you transform your customer experience design.
For full article, continue reading at https://yump.com.au/10-ways-supercharge-customer-experience-design/
How to Build a Dynamic Social Media PlanPost Planner
Stop guessing and wasting your time on networks and strategies that don’t work!
Join Rebekah Radice and Katie Lance to learn how to optimize your social networks, the best kept secrets for hot content, top time management tools, and much more!
Watch the replay here: bit.ly/socialmedia-plan
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm IJECEIAES
The uniqueness, firmness, public recognition, and its minimum risk of intrusion made fingerprint is an expansively used personal authentication metrics. Fingerprint technology is a biometric technique used to distinguish persons based on their physical traits. Fingerprint based authentication schemes are becoming increasingly common and usage of these in fingerprint security schemes, made an objective to the attackers. The repute of the fingerprint image controls the sturdiness of a fingerprint authentication system. We intend for an effective method for fingerprint classification with the help of soft computing methods. The proposed classification scheme is classified into three phases. The first phase is preprocessing in which the fingerprint images are enhanced by employing median filters. After noise removal histogram equalization is achieved for augmenting the images. The second stage is the feature Extraction phase in which numerous image features such as Area, SURF, holo entropy, and SIFT features are extracted. The final phase is classification using hybrid Neural for classification of fingerprint as fake or original. The neural network is unified with BAT algorithm for optimizing the weight factor.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Digital image security and integrity are the top
prioritized issue in today’s information World. Watermarking
is a famous technique that is used for copyright protection and
authentication. Watermark Should be robust and
imperceptible.
Intrusion Detection Systems (IDSs) have become widely recognized as powerful tools for identifying, deterring and deflecting malicious attacks over the network. Intrusion detection systems (IDSs) are designed and installed to aid in deterring or mitigating the damage that can be caused by hacking, or breaking into sensitive IT systems. . The attacks can come from outsider attackers on the Internet, authorized insiders who misuse the privileges that have been given them and unauthorized insiders who attempt to gain unauthorized privileges. IDSs cannot be used in isolation, but must be part of a larger framework of IT security measures. Essential to almost every intrusion detection system is the ability to search through packets and identify content that matches known attacks. Space and time efficient string matching algorithms are therefore important for identifying these packets at line rate. In this paper we examine string matching algorithm and their use for Intrusion Detection. Keywords: System Design, Network Algorithm
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...IJCNCJournal
Addressing real-time network security issues is paramount due to the rapidly expanding IoT jargon. The erratic rise in usage of inadequately secured IoT- based sensory devices like wearables of mobile users, autonomous vehicles, smartphones and appliances by a larger user community is fuelling the need for a trustable, super-performant security framework. An efficient anomaly detection system would aim to address the anomaly detection problem by devising a competent attack detection model. This paper delves into the Deep Deterministic Policy Gradient (DDPG) approach, a promising Reinforcement Learning platform to combat noisy sensor samples which are instigated by alarming network attacks. The authors propose an enhanced DDPG approach based on trust metrics and belief networks, referred to as Deep Deterministic Policy Gradient Belief Network (DDPG-BN). This deep-learning-based approach is projected as an algorithm to provide “Deep-Defense” to the plethora of network attacks. Confidence interval is chosen as the trust metric to decide on the termination of sensor sample collection. Once an enlisted attack is detected, the collection of samples from the particular sensor will automatically cease. The evaluations and results of the experiments highlight a better detection accuracy of 98.37% compared to its counterpart conventional DDPG implementation of 97.46%. The paper also covers the work based on a contemporary Deep Reinforcement Learning (DRL) algorithm, the Actor Critic (AC). The proposed deep learning binary classification model is validated using the NSL-KDD dataset and the performance is compared to a few deep learning implementations as well.
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...IJCNCJournal
Addressing real-time network security issues is paramount due to the rapidly expanding IoT jargon. The erratic rise in usage of inadequately secured IoT- based sensory devices like wearables of mobile users, autonomous vehicles, smartphones and appliances by a larger user community is fuelling the need for a trustable, super-performant security framework. An efficient anomaly detection system would aim to address the anomaly detection problem by devising a competent attack detection model. This paper delves into the Deep Deterministic Policy Gradient (DDPG) approach, a promising Reinforcement Learning platform to combat noisy sensor samples which are instigated by alarming network attacks. The authors propose an enhanced DDPG approach based on trust metrics and belief networks, referred to as Deep Deterministic Policy Gradient Belief Network (DDPG-BN). This deep-learning-based approach is projected as an algorithm to provide “Deep-Defense” to the plethora of network attacks. Confidence interval is chosen as the trust metric to decide on the termination of sensor sample collection. Once an enlisted attack is detected, the collection of samples from the particular sensor will automatically cease. The evaluations and results of the experiments highlight a better detection accuracy of 98.37% compared to its counterpart conventional DDPG implementation of 97.46%. The paper also covers the work based on a contemporary Deep Reinforcement Learning (DRL) algorithm, the Actor Critic (AC). The proposed deep learning binary classification model is validated using the NSL-KDD dataset and the performance is compared to a few deep learning implementations as well.
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
Over the past decades, research in security has concentrated on the development of algorithms and protocols for authentication, encryption and integrity of data. Despite tremendous advances, several security problems still afflict system’s. In this android app watermarking and encryption is being applied on images and data. Because of the human visual system’s low sensitivity to small changes and the high flexibility of digital media, anyone can easily make small changes in digital data with low perceptibility. Here watermarking and encryption are being performed in wavelet domain. Here in watermarking, the coefficients of watermarks are being embedded with the coefficients of the original image. Encryption is being done in wavelet domain so that the probability of an intruder trying to access the contents is very much minimized. Thus, this model provides a high level of security.
LSTM deep learning method for network intrusion detection system IJECEIAES
The security of the network has become a primary concern for organizations. Attackers use different means to disrupt services, these various attacks push to think of a new way to block them all in one manner. In addition, these intrusions can change and penetrate the devices of security. To solve these issues, we suggest, in this paper, a new idea for Network Intrusion Detection System (NIDS) based on Long Short-Term Memory (LSTM) to recognize menaces and to obtain a long-term memory on them, in order to stop the new attacks that are like the existing ones, and at the same time, to have a single mean to block intrusions. According to the results of the experiments of detections that we have realized, the Accuracy reaches up to 99.98 % and 99.93 % for respectively the classification of two classes and several classes, also the False Positive Rate (FPR) reaches up to only 0,068 % and 0,023 % for respectively the classification of two classes and several classes, which proves that the proposed model is effective, it has a great ability to memorize and differentiate between normal traffic and attacks, and its identification is more accurate than other Machine Learning classifiers.
LSTM deep learning method for network intrusion detection system
Nz2422822287
1. Amandeep Kaur, Sukhjeet K. Ranade , Megha Kansal / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue4, July-August 2012, pp.2282-2287
Collusion Resistant Fingerprinting In DCT Domain
Amandeep Kaur*, Sukhjeet K. Ranade**, Megha Kansal***
#
CSE Department, Punjabi University Patiala, India
Abstract
Digital fingerprinting is a technique for generating algorithm and tracing algorithm has very
identifying users who use multimedia content for high efficiency. General process of image
unintended purposes, such as redistribution. fingerprinting embeds data into a host image. The
These fingerprints are typically embedded into the ground process of fingerprinting is depicted in figure
content using watermarking techniques that are 1. The process constitutes of three phases; embedding
designed to be robust to a variety of attacks. A a fingerprint, during transmission it may undergo
cost-effective attack against such digital some possible attacks and tracing the pirate.
fingerprints is collusion, where several differently A unique fingerprint is assigned to each intended
marked copies of the same content are combined recipient, which facilitates the tracing of the culprits
to disrupt the underlying fingerprints. who illegally distribute their data. To protect the
Anti-Collusion Codes (ACCs) are content, it is difficult to remove the fingerprint from
employed to design the fingerprints, which can the content. For multimedia content, fingerprints can
accommodate more users than orthogonal be embedded using conventional watermarking
modulation based fingerprints with the same techniques that are robust against the variety of
amount of signals. The selected DCT coefficients attacks mounted by an individual. The global nature
of the original image are quantized according to of the internet has brought adversaries closer to each
fingerprints; quantization table is employed to other. It is now easy for a group of users with
improve the ability of anti-compression. Blind differently marked versions of the same data to work
fingerprint detection scheme has larger capacity together and collectively mount attacks against the
and is more efficient than the existing algorithms. fingerprints. These attacks are known as multiuser
collusion attacks. These attacks provide a cost-
Keywords— Fingerprinting, Collusion attack, effective method for attenuating each of the
Quantization colluders’ fingerprints.
An improperly designed embedding and
I. INTRODUCTION identification scheme may be vulnerable in the sense
With the advancement of multimedia that a small coalition of colluders can produce a new
technology and internet, a large amount of version of the content with no detectable traces.
multimedia content is distributed through networks. Collusion poses a real threat to protecting media data.
In order to protect the sensitive nature of multimedia So it is desirable to design fingerprints that resist
data that is shared by a group of users, as well as collusion and identify the colluders.
protect the commercial value of content after it has In this Paper, we first provide background
been delivered to subscribers, solutions must be on robust data embedding, upon which the
developed to provide the ability to track and identify multimedia fingerprinting system is built. We also
persons involved in unauthorized redistribution of introduce the basic concepts of fingerprinting and
multimedia content. Digital Fingerprinting is a class collusion and provide a discussion on the various
of technologies whereby unique labels, known as goals associated with fingerprint design and colluder
digital Fingerprints, are inserted in different copies of tracing in section 2. In section 3, the fingerprint
the same content before distribution. embedding using quantization theory is illustrated.
According to the function of digital We also present the fingerprint detection and colluder
fingerprint, the digital fingerprint model needs tracing.
following characteristics: The production being
protected can’t risk appreciable quality degradation II. THE BACKGROUND
when embedding the digital fingerprint. PSNR is used Fingerprinting multimedia requires the use
to measure the transparency of watermark. Digital of robust data embedding methods that are capable to
fingerprint should resist possible disposal, operation resist attacks that adversaries might employ to
and attack so that the information being extracted can remove the fingerprint. Collusion-resistant
trace illegal distributor. It needs adequate information fingerprinting also requires that the fingerprints
after being attacked by user to trace by distributor. So survive collusion attacks and can identify colluders.
it needs enough embedded capacity. When users The earliest concept of fingerprinting used to identify
attack together, the distributor should at least find out the users was proposed by Wagner in 1983 [1]. Now
one illegal distributor after the precondition that has with the development of multimedia technologies the
no entanglement innocent purchaser. It needs the current fingerprinting focuses on tracing colluders.
2282 | P a g e
2. Amandeep Kaur, Sukhjeet K. Ranade , Megha Kansal / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue4, July-August 2012, pp.2282-2287
A lot of fingerprinting algorithms has been proposed performance is high when the JPEG compression is
for code, through which colluders can be traced. The moderate,
other one studies the performance of orthogonal but it reduces sharply when the JPEG quality factor
fingerprinting and embedding methods [5], this reduces further. Another problem is that the capacity
technique has been studied extensively. Orthogonal of fingerprint is limited. So exploring the blind
fingerprints are easy to encode and embed, which detection method is key research direction
makes them attractive to identification applications [6].Considering all the factors, we propose a
that involve a small group of users.
Fig. 1 Using Embedded Fingerprinting for Tracing Users
The problem is that with the increase in number of blind fingerprint detection scheme in this paper. We
fingerprints the orthogonal basic vectors will be employ the random vectors modulated with the
increased. To overcome this problem Trappe fingerprints and embed them by quantizing the DCT
introduced an Anti-Collusion Code (ACC) same coefficients of the original images. By using
length of fingerprint code. The most existing methods Euclidean distance classification method we can trace
are non blind detection means that original signal is the colluder. The proposed scheme can effectively
required during fingerprints detection. Spread detect fingerprints from the collusion copies without
spectrum method is to embed ACC modulated using original images.
fingerprints, which can detect the fingerprints blindly.
However, original fingerprints and the test signals has A. Collusion attack on fingerprinting
are very small the correlation based detection Collusion attacks can be classified as linear
statistics when the original signals were not removed collusion attacks and non linear collusion attacks.
and it lead to low probability of right detection and Linear collusion is one of the most feasible collusion
high probability of wrong detection. The performance attacks. When users come together with the total of K
drops sharply when the colluded version is added differently fingerprinted copies, then they can simply
some noise. Ashwin proposed a fingerprinting combine the K signals to produce the colluded
scheme based on Quantization Index Modulation version. These attacks can be categorised as:
(QIM) [7], where he used the spread transform dither Average Attack: The K fingerprinted copies are
modulation to embed fingerprints. The tracing typically averaged with an equal weight for each user
2283 | P a g e
3. Amandeep Kaur, Sukhjeet K. Ranade , Megha Kansal / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue4, July-August 2012, pp.2282-2287
to produce a pirated image. . As the number of B. Techniques in fingerprinting:
traitors increases, the quality of the pirated image Fingerprinting techniques can be categorized into
improves exponentially. This fact may elude users to spatial domain watermarking and transform domain
join the traitor group in order to get a high quality watermarking.
copy of an image.
1) Spatial domain watermarking:
This domain hides the information into the
spatial domain. It encodes the extra information
into the image by making small modifications into
large number of pixels. The simplest example of
spatial domain fingerprinting is LSB (least significant
modification) method.
2) Transform domain watermarking:
Generally DCT, FFT and wavelet Transform
are used as the methods of data transformation.
The main strength offered by transform domain
technique is that they can take the advantage of
Fig. 2 collusion attack by averaging special properties of alternate domains to address the
limitations of pixel based methods or to support
2) Cut and paste attack: Copy and paste attack, additional features. Designing a fingerprint in DCT
involves users cutting out portions of each of their domain leads to better implementation compatibility.
media signals and pasting them together to form a The frequency domain fingerprinting schemes are
new signal more robust than spatial domain watermarking
schemes, particularly in lossy compression, noise
3) Linear combination collusion attack (LLCA): addition, noise addition, pixel removal, rescaling,
This attack is generalization of the average attack rotation and shearing. Generally, the main drawback
model .LLCA generates a pirated image of good of Transform domain methods is their higher
quality but prevent traitors from being identified. computational requirement. Fourier transform analyse
Nonlinear attacks are also very useful. Class of a signal in the time domain for its frequency content.
nonlinear attacks is based upon operations such as This Fourier transforms work by translating a
taking the maximum, minimum, and the median of function in the time domain into a function in the
corresponding components of k colluders’ frequency domain. The signal can then be analysed
independent watermarked copies. Non linear can be for its frequency content because the Fourier
classified as following. coefficients of the transformed functions represents
the contribution of each sine and cosine function at
1) Minimum/maximum/median attack: Under each frequency.
these three attacks, the colluders create an attacked
signal in which each component is the minimum, C. Applications of fingerprinting
maximum, and median, respectively, of the The various applications of fingerprinting are as
corresponding components of the K watermarked following.
signals associated with the colluders. 1) Copyright Control. Cross-referencing actual
usage rights and permissions in a fingerprint database
2) Minmax attack: Each component of the attacked will facilitate monitoring of authorized and
signal is the average of the maximum and minimum unauthorized uses of content. Content producers and
of the corresponding components of the K distributors will use fingerprints to determine whether
watermarked signals. a database contains unauthorized content. Stock
footage providers will use fingerprints to spot the
3) Modified negative attack: Each component of the clips they license in commercial programming.
attacked signal is the difference between the median
and the sum of the maximum and minimum of the 2) Metadata: Metadata allows content creators to
corresponding components of the K watermarked store all sorts of useful tracking information
signals. associated with content.
4) Randomized negative attack: Each component 3) Behavioral Modeling Advertising: Interest-based
of the attacked signal takes the value of the or behavioral advertising matches ads to individuals
maximum of the corresponding components of the K based on a user’s past online activities, such as
watermarked signals with probability p, and takes the visiting a website or searching for information on a
minimum with probability (1 – p). particular subject. It also brings behavioral
advertising models to new domains, such as VOD
2284 | P a g e
4. Amandeep Kaur, Sukhjeet K. Ranade , Megha Kansal / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue4, July-August 2012, pp.2282-2287
services and cable television where signals must pass N×M pixels are computed using the following
through a set-top box. equation:
For an M×N image, where each image corresponds to
4) Copy Protection: Video fingerprints can be used a 2D matrix, DCT coefficients are calculated as
as a copy protection tool. For example, both a video follows:
fingerprint and an authenticating signature could be
required before a file could be copied or replicated.
5) Forensics: Another promise of video
fingerprinting is in the area of information forensics U=0, 1… M, V=0, 1… N
where fingerprints could be used to detect whether Where,
video footage has been manipulated. Research is
ongoing in this area.
6) Additional Business Opportunities: Digital
fingerprints must be matched against extensive
content ownership databases to be effective. It stands
to reason that maintaining, licensing and managing
access to large-scale fingerprint databases is a
potential revenue opportunity. Audible Magic, for
example, has already established a subscription based
business leveraging its extensive ownership database.
III. PROPOSED SCHEME F (x, y) is the image intensity function and F
The implementation process of (u, v) is a 2D matrix of DCT coefficients. Block-
fingerprinting can be divided into three stages; Pre- based implementation and the entire image are the
processing using Discrete Cosine Transform, two implementations of the DCT. The DCT is applied
Training using Quantization, Classification. to the entire image to obtain the frequency coefficient
matrix of the same dimension. Fig. 4 a and b shows a
A. Discrete Cosine Transform and its typical face image and its DCT coefficients image.
Implementation In general, the DCT coefficients are divided
The DCT is a technique for converting a into three bands (sets), namely low frequencies,
signal or image into elementary frequency middle frequencies and high frequencies. Fig. 4
components. It represents the image as a sum of visualizes these bands. Low frequencies are
sinusoids of varying magnitudes and frequencies. It correlated with the illumination conditions and high
has the property for images without sharp frequencies represent noise and small variations
discontinuities; most of the spectral power is in the (details). Middle frequencies coefficients contain
first few terms, which allows the later one to be useful information and construct the basic structure of
ignored without too much information loss. The (0, 0) the image. From the above discussion, it seems that
element is referred as the DC component and the the middle frequencies coefficients are more suitable.
other values are the AC components as shown in fig
3.
Fig. 4 Low Middle
High
B. Embedding using quantization
Quantization, involved in image processing,
is a lossy compression technique achieved by
compressing a range of values to a single quantum
value. When the number of discrete symbols in a
given stream is reduced, the stream becomes more
compressible. For example, reducing the number of
colors required to represent a digital image makes it
Fig. 3 Zigzag Pattern of DCT components possible to reduce its file size. A typical video codec
works by breaking the picture into discrete blocks
If we input image f(x, y), the DCT coefficients for the (8×8 pixels). These blocks can then be subjected
transformed output image F (u, v) of input image
2285 | P a g e
5. Amandeep Kaur, Sukhjeet K. Ranade , Megha Kansal / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue4, July-August 2012, pp.2282-2287
to discrete cosine transform (DCT) to calculate the 5. Apply Inverse DCT on resultant image to get the
frequency components, both horizontally and watermarked image.
vertically. The resulting block (the same size as the
original block) is then pre-multiplied by the C. Colluder Tracing
quantization scale code and divided element-wise by The classification rule used to trace colluder
the quantization matrix, and rounding each resultant is the Nearest Neighbor. This is a simple
element. The quantization matrix is designed to nonparametric classifier where the most likely class
provide more resolution to more perceivable of the query face is decided by finding the neighbour
frequency components over less perceivable with minimum distance between the features of query
components (usually lower frequencies over high and all prototypes using Minimum Euclidean distance
frequencies) in addition to transforming as many . It is having two vectors X, Y,
components to 0, which can be encoded with greatest
efficiency. Many video encoders and compression
standards allow custom matrices to be used. The
extent of the reduction may be varied by changing the By using same procedure and Euclidean
quantizer scale code, taking up much less bandwidth distance classification method we can trace the
than a full quantizer matrix. Typically this process colluder as shown in fig. 6.
will result in matrices with values primarily in the
upper left (low frequency) corner. By using a zig-zag
ordering to group the non-zero entries and run length
encoding, the quantized matrix can be much more
efficiently stored than the non-quantized version.
This procedure is used to add the finger print in to the
image as shown in Fig. 5.
Fig. 6 Diagram of colluder tracing
1) Algorithm:
Fig. 5 Diagram of fingerprint embedding 1. Calculate the Euclidean distance between the
training and test classification space projection, Y′
and Y respectively, and prepare the distance
matrix.
2. Select the minimal distance from the prepared
matrix.
3. Output the class of the image with minimal
distance.
Where, d0 and d1 are corresponding values The test image is assumed to be in the class whose
of pixel after DCT transform and is quantization distance is the minimal among all other class distance.
step for binary values it will be 2 and X is any
random number and bi is bit to be embedded. IV. CONCLUSIONS
This paper will implement capacity
improved fingerprinting scheme in DCT domain.
Though many fingerprinting schemes have been
X= studied, few of them are blind. Blind fingerprint
detection scheme has larger capacity and is more
1) Algorithm: efficient than the existing algorithms but its
Fingerprint embedding stage includes following performance is not good enough as non-blind
steps: detection. Studying robust fingerprinting resisting
1. Construct the fingerprint database. The size of collusion attack with blind detection is an important
fingerprint is less than or equal to the size of work in the future.
original image.
2. Calculate the DCT coefficients of samples images REFERENCES
as described in previous phase. [1] N.R. Wagner. “Fingerprinting,” In:
3. Calculate the average value and of image by Proceedings Symposium on Security and
using formula given above. Privacy.1983. on Information and Theory,
4. Add the resultant values in to the resultant image. Sep 1998, pp.1897–905.
2286 | P a g e
6. Amandeep Kaur, Sukhjeet K. Ranade , Megha Kansal / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue4, July-August 2012, pp.2282-2287
[2] I. Cox, J. Bloom, and M. Miller, “Digital
Watermarking: Principles & Practice.,” San
Mateo, CA: Morgan Kaufman, 2001.
[3] Dan Boneh and J. Shaw, “Collusion-secure
Fingerprinting for digital data," IEEE Trans.
on Information Theory, vol.44 , Sep. 1998,
pp. 1897-1905.
[4] W. Trappe, M. Wu, and Z.J. Wang,” Anti-
collusion fingerprinting for
multimedia,”IEEE Transactions on Signal
Process, April 2003, pp.1069–1087.
[5] Z.J Wang, M. Wu, H.V Zhao, W. Trappe,
and K.J.R Liu,” Anti-collusion forensics of
multimedia fingerprinting using orthogonal
modulation,” IEEE Transactions on Image
Processing, June 2005, pp.804–821.
[6] M. Wu, W. Trappe, Z. Wang, and K.J.R.
Liu ,”Collusion Resistant Fingerprinting for
Multimedia", IEEE Signal Processing
Magazine, Special Issue on Digital Rights
management, 2004, pp. 16-24.
[7] Swaminathan A, He S, Wu M. “Exploring
QIM-based anti-collusion
fingerprinting for multimedia,” In: Proc.
SPIE/IS&T, Security, Steganography, and
Watermarking of Multimedia Contents.
2006.
[8] Trappe W, Wu M, Liu KJR, “Anti-collusion
fingerprinting for multimedia,” IEEE
Transactions on Signal Processing April
2003, pp.1069–86.
[9] Zhao HV, Wu M, Wang ZJ, Liu KJR,
“Forensic analysis of nonlinear collusion
attacks for multimedia fingerprinting,” IEEE
Transactions on Image Processing , May
2005 pp. 646–61.
[10] Cox I, Kilian J, Leighton F, Shamoon T.
“Secure spread spectrum watermarking for
multimedia,” IEEE Transactions on Image
Processing, December 1997,pp.1673–87.
[11] Podilchuk C, Zeng W. “Image adaptive
watermarking using visual models,”
IEEEJournal of Selected Areas in
Communications , May 1998, pp. 525–40.
[12] Chen B, Wornell GW. “Quantization index
modulation: a class of provably good
methods for digital watermarking and
information embedding,” IEEE Transactions
on Information Theory, May 2001, pp.
1423–43.
2287 | P a g e