... V. A Simple Watermark: Patchwork VI. Current Work in Watermarking VII. Conclusion VIII. Works Cited Introduction It's no news to anyone that's reading this that the meteoric rise of the Internet in recent years has significantly increased the availability of all forms of media. Nowhere is this more obvious than in the realm of commercial musical recordings, where Napster and other internet-based distribution systems have made incredible volumes of musical content widely available, all without the consent of the music's originators. This situation, though, is not unique to the music industry, as photographers, filmmakers, and other content-originators all have the same problem to varying degrees. The solution, and even the need for a solution, to this problem of copyright infringement is still a topic that is open to great debate, but there is no debating the fact that some interesting and novel technology has been designed to help. Digital image watermarking, the practice of secretly embedding a piece of information in an image, is one of the more interesting of these technologies, and deserves some consideration. It is the purpose of this paper to give the reader an overview of watermarking and the diverse benefits that it offers. We begin with a brief history of watermarking and then go on to describe the basic components of any watermarking system, different uses for and characteristics of watermarking systems, types of attacks that watermarks are designed to...
Words: 3166 - Pages: 13
...high demand for a content protection technique such as digital watermarking; which is one of the most efficient ways to protect the digital properties in recent years. Image watermarking techniques are frequently applied in the transform and spatial domains to achieve desired secure and robust protection. This paper provides an overview of the wavelet-based watermarking techniques available for medical images until now. In this paper the major methods have been analyzed along with their advantages & disadvantages. Keywords: Discrete Wavelet Transform, Medical image watermarking, ROI, NROI, I. INTRODUCTION D igital watermarking has emerged as a research area that was originally focused on copyright protection. Also, it has been implemented in lot of domains, such as video, audio, image, and 3D graphic model. Despite the fact there are only a few medical oriented watermarking studies in the literature to date, digital watermarking will be a valuable tool for copyright protection with medical confidentiality protection, patient and examination-related information hiding, data integrity control and source identification, in Hospital Information System(HIS) and picture archiving and communication system(PACS) based on Digital Imaging and Communications in Medicine(DICOM) standard pave the way to store medical image and search for data base and give remote medical treatment [1]. Digital watermarking is the technology that embeds directly additional information by modifying imperceptible...
Words: 3893 - Pages: 16
...of award of B. Tech. Degree in Electronics and Communication Engineering by the National Institute Of Technology, Calicut, during the academic year 2010-2011. Dr. Deepthi P.P Project Guide Department of Electronics and Communication Engineering N.I.T Calicut Dr. P. C. Subrahmaniam Head of the Department Department of Electronics and Communication Engineering N.I.T Calicut Date: April 29th, 2011 CONTENTS 1. 2. 3. 4. ABSTRACT ........................................................................................................... 1 NEED OF DIGITAL FINGERPRINTING ............................................................ 3 WHAT IS DIGITAL FINGERPRINTING?........................................................... 4 COLLUSION ATTACKS...
Words: 7883 - Pages: 32
...using Java decompilers[15], such as SourceAgain[2], Jad[14], Mocha[24], etc. In this situation, the Java program developer’s intellectual property will be infringed if a program user steals anyone else’s class file and builds it into his/her own program without the original programmer's permission. We call this copyright infringement a program theft, which is one of the reasons why many companies hesitate to use Java in the real software development. Although we have copyright law to prohibit the program theft, it is still very important for us to protect our Java program by ourselves [3]. This paper proposes a technique that discourages program theft by embedding Java programs with a digital watermark. Embedding a program developer's copyright notation as a watermark into Java class files will ensure the legal...
Words: 4625 - Pages: 19
...embedded information. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we will discuss how digital images can be used as a carrier to hide messages. This paper also analyses the performance of some of the steganography tools. Steganography is a useful tool that allows covert transmission of information over an over the communications channel. Combining secret image with the carrier image gives the hidden image. The hidden image is difficult to detect without retrieval. This paper will take an in-depth look at this technology by introducing the reader to various concepts of Steganography, a brief history of Steganography and a look at some of the Steganographic technique. In steganography, the possible cover carriers are innocent looking carriers (images, audio, video, text, or some other digitally representative code) which will hold the hidden information. A message is the information hidden and may be plaintext, cipher text, images, or anything that can be embedded into a bit stream. Together the cover carrier and the embedded message create a stego-carrier. Hiding information may require a stego key which is additional secret information, such as a password, required for embedding the information. For example, when a secret message is...
Words: 3246 - Pages: 13
...Literature Review When dealing with patients' sensitive medical records, it's always important how one also deals with medical images that should also be kept private. Health Insurance Portability and Accountability initiated on April 14, 2013 by the federal government, establishes all relevant standards to address the issue of privacy protection. The HIPAA requires for integrity and confidentiality in all of current, previous and future from hospitals, doctors, and other relevant professionals. In an era where digital technology has become of major importance, there is a series of medical images that can now be kept in digital format and become quite easy to retrieve, store and preserve. Watermarking – An Essential Aspect for the Protection of Medical Images A. Ethical reasons and relevant legislation define Medical Information Assurance & Watermarking Medical directions. USA's HIPAA and Europe's EC 95/46 Directive are the major legislations defining relevant directions. When dealing with medical information records, thus, which involve a series of clinical examinations, diagnoses, and EPR images, three major security attributes should be considered: • Confidentiality: only authorised users can view and evaluate medical information; • Availability: Scheduled accessing periods should be set when entering the information system containing the medical data; • Reliability: The information should be examined by authorised people and not changed by unauthorised...
Words: 2623 - Pages: 11
...& Engg, University of Calcutta 92 A.P.C. Road, Kolkata-700009, India ABSTRACT Technique for hiding the data of images has been proposed in this paper. At the source, hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be adjusted by resize function. Secondly, only the final encrypted image i.e. cover image and target image is sent over the network. This image is finally decoded at the receiver end. Received results are encouraging from practical point of view. keys, the relative entropy between encrypt and one specific decrypt key Yusuk Lim, Changsheng Xu and David Dagan Feng, 2001, developed the web based authentication system. In case of watermark embedding system, it is installed in the server as application software that any authorized user, who has access to server, can generate watermarked image. The distribution can use any kind of network transmission such as FTP, email etc. Once image is distributed to externally, client can access to authentication web page to get verification of image [2]. Min Wu and Bede Liu, June 2003, proposed [3] a new method which manipulates “flappable” pixels to enforce specific block based relationship in order to embed a significant amount of data without causing noticeable artifacts. The hidden data can then be extracted without using the original image and can also be accurately extracted after high quality printing and scanning with the...
Words: 2120 - Pages: 9
...Neutral Sentences Is Doubtfully Effective Secret inside What is steganography? What is it used for? ● ● ● Hiding the fact that you are sending messages Hiding several messages inside data Digital watermarking Kerckhoffs' principle ● ● Secure with knowlegde of the system Message can only be read with secret key What is steganography? Hiding several messages ● ● ● ● Deniable cryptography Knowledge of encrypted data No proof of how much information is stored Rubberhose (http://www.rubberhose.org) What is steganography? Digital watermarking ● ● ● ● Not really hiding information Important: not modificable Uses the hiding-property of steganography Recent: MPAA hides watermarks in movies Implementation Hiding information ● ● ● ● Text / Webpages Images Audio Video Implementation Text / Webpages ● ● ● ● ● Use of a codebook Layout of texts Every Nth character Use of whitespaces and newlines Can be difficult to detect and decode Implementation Text / Webpages In the midway of this our mortal life, I found me in a gloomy wood, astray Gone from the path direct: and e'en to tell It were no easy task, how savage wild That...
Words: 681 - Pages: 3
...hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Well through the 20th century, stenography was a necessary skill for secretaries, reporters, and other people who needed to quickly and accurately record written information. In all cases, the goal of stenography is to make it easy to write something down quickly and with great accuracy. Using stenography, someone can record information much more quickly than he or she could be writing. Like many security tools, steganography can be used for a variety of reasons, some good, some not so good. Legitimate purposes can include things like watermarking images for reasons such as copyright protection. Digital watermarks are similar to steganography in that they are overlaid in files, which appear to be part of the original file and are thus not easily detectable by the average person. Further,...
Words: 665 - Pages: 3
...P R E FAC E THE ACCOUNTING ENVIRONMENT Accounting is the most employable, sought-after major for 2009, according to entrylevel job site CollegeGrad.com. One reason for this interest is found in the statement by former Secretary of the Treasury and Economic Advisor to the President, Lawrence Summers. He noted that the single-most important innovation shaping our capital markets was the idea of generally accepted accounting principles (GAAP). We agree with Mr. Summers. Relevant and reliable financial information is a necessity for viable capital markets. Without it, our markets would be chaotic, and our standard of living would decrease. This textbook is the market leader in providing the tools needed to understand what GAAP is and how it is applied in practice. Mastery of this material will be invaluable to you in whatever field you select. Through many editions, this textbook has continued to reflect the constant changes taking place in the GAAP environment. This edition continues this tradition, which has become even more significant as the financial reporting environment is exploding with major change. Here are three areas of major importance that are now incorporated extensively into this edition of the text. A New Way of Looking at Generally Accepted Principles (GAAP) Learning GAAP used to be a daunting task, as it is comprised of many standards that vary in form, completeness, and structure. Fortunately, the profession has recently developed the Financial Accounting...
Words: 115901 - Pages: 464
...History of Cryptography Developments in cryptography | Period | Development | 2000 BC | In Egypt, hieroglyphics were used in inscriptions. | 500-600 BC | Hebrews used the atbash method for encryption. In this method, each letter of the alphabet mapped to a different letter to hide the true meaning of a word. | 487 BC | The Spartans used the scytale for encryption – messages were written on paper wrapped around a wooden rod. The paper was then unwrapped and sent. The recipient could read the message only by wrapping this paper on a rod of the same length and diameter. | 100-44 BC | Julius Caesar used an encryption method similar to the atbash method. He shifted each letter of the alphabet by a fixed number of places to send encrypted messages. | 1379 | Gabrieli di Lavinde developed the nomenclator. | 1466-1467 | The first polyalphabetic cipher was invented, which was much stronger than the nomenclator. | 1518 | Johannes Trithemius invented a steganographic cipher in which each letter was represented as a word taken from a succession of columns. | 1553 | Giovan Batista Belaso introduced the use of a passphrase as the key for a repeated polyalphabetic cipher. In 1563, Giovanni Battista Porta introduced the digraphic cipher and classified ciphers as transposition, substitution, and symbol substitution. | 1585 | Blaise de Vigenere developed the polyalphabetic substitution cipher. William Frederick Friedman published a book on cryptography, and is known as the...
Words: 1015 - Pages: 5
...SECURITY WEAKNESSES FOR QUALITY WEB DESIGN Contents Course........................................................................................................ Error! Bookmark not defined. Introduction ............................................................................................................................................ 3 Abstract .................................................................................................................................................. 4 Company Background.............................................................................................................................. 4 Software Weaknesses and Recommendations......................................................................................... 5 Hardware Weaknesses and Recommendations........................................................................................ 6 Network Security flaws and Recommendations ....................................................................................... 7 REFERENCES:........................................................................................................................................... 7 Introduction A company that deals with making web site and web business solutions is known as Quality web design. The company provides its customers to provide an opportunity so that they can spread their business through the internet. The other business solutions accompanied are accounting...
Words: 1406 - Pages: 6
...embedding messages within other, seemingly harmless messages. Steganography takes cryptography a step farther by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images. Steganography sometimes is used when encryption is not permitted or, more commonly, is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen. In modern digital steganography, data is first encrypted by the usual means and then inserted, using a special algorithm, into redundant (that is, provided but unneeded) data that is part of a particular file format such as a JPEG image. Think of all the bits that represent the same color pixels repeated in a row. By applying the encrypted data to this redundant data in some random or nonconspicuous way, the result will be data that appears to have the "noise" patterns of regular, nonencrypted data. A trademark or other identifying symbol hidden in software code is sometimes known as a...
Words: 6118 - Pages: 25
...CSE 4482 Computer Security Management: Assessment and Forensics Introduction to Information Security Instructor: N. Vlajic, Fall 2010 Learning Objectives Upon completion of this material, you should be able to: • Define key terms and critical concepts of information security. List the key challenges of information security, and key protection layers. Describe the CNSS security model (McCumber Cube). Be able to differentiate between threats and attacks to information. Identify today’s most common threats and attacks against information. • • • • Introduction “In the last 20 years, technology has permeated every facet of the business environment. The business place is no longer static – it moves whenever employees travel from office to office, from office to home, from city to city. Since business have become more fluid, …, information security is no longer the sole responsibility of a small dedicated group of professionals, …, it is now the responsibility of every employee, especially managers.” http://www.businessandleadership.com/fs/img/news/200811/378x/business-traveller.jpg http://www.businessandleadership.com/fs/img/news/200811/378x/businesshttp://www.koolringtones.co.uk/wp-content/uploads/2010/01/mobile-phones.jpg http://www.koolringtones.co.uk/wp- content/uploads/2010/01/mobile- Information Technology • Information Technology – enables storage and transportation of information from one business unit to another in many organizations...
Words: 4051 - Pages: 17
...Steganography Hide and Seek: An Introduction to Steganography Although people have hidden secrets in plain sight— now called steganography—throughout the ages, the recent growth in computational power and technology has propelled it to the forefront of today’s security techniques. N IELS PROVOS AND PETER HONEYMAN University of Michigan teganography is the art and science of hiding communication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. In the past, people used hidden tattoos or invisible ink to convey steganographic content. Today, computer and network technologies provide easy-to-use communication channels for steganography. Essentially, the information-hiding process in a steganographic system starts by identifying a cover medium’s redundant bits (those that can be modified without destroying that medium’s integrity).1 The embedding process creates a stego medium by replacing these redundant bits with data from the hidden message. Modern steganography’s goal is to keep its mere presence undetectable, but steganographic systems— because of their invasive nature—leave behind detectable traces in the cover medium. Even if secret content is not revealed, the existence of it is: modifying the cover medium changes its statistical properties, so eavesdroppers can detect the distortions in the resulting stego medium’s statistical properties. The process of finding these distortions is called...
Words: 8940 - Pages: 36