scholarly journals A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application

2021 ◽  
Vol 2021 ◽  
pp. 1-27
Author(s):  
Chirag Sharma ◽  
Amandeep Bagga ◽  
Bhupesh Kumar Singh ◽  
Mohammad Shabaz

The multimedia technologies are gaining a lot of popularity these days. Many unauthorized persons are gaining the access of multimedia such as videos, audios, and images. The transmission of multimedia across the Internet by unauthorized person has led to the problem of illegal distribution. The problem arises when copyrighted data is getting accessed without the knowledge of copyright owner. The videos are the most attacked data during COVID-19 pandemic. In this paper, the frame selection video watermarking technique is proposed to tackle the issue. The proposed work enlightens frame selection followed by watermarking embedding and testing of the technique against various attacks. The embedding of the watermark is done on selected frames of the video. The additional security feature Hyperchaotic Encryption is applied on watermark before embedding. Watermark embedding is done using graph-based transform and singular-valued decomposition and the performance of the technique is further optimized using hybrid combination of grey wolf optimization and genetic algorithm. Many researchers face the challenge of quality loss after embedding of watermark. Proposed technique will aim to overcome those challenges. A total of 6 videos (Akiyo, Coastguard, Foreman, News, Bowing, and Pure Storage) are used for carrying out research work. The performance evaluation of the proposed technique has been carried out after processing it against practical video processing attacks Gaussian noise, sharpening, rotation, blurring, and JPEG compression.

Author(s):  
Roop Singh ◽  
Himanshu Mittal ◽  
Raju Pal

AbstractVideo piracy is a challenging issue in the modern world. Approximately $$90\%$$ 90 % of newly released films were illegally distributed around the world via the Internet. To overcome this issue, video watermarking is an effective process that integrates a logo in video frames as a watermark. Therefore, this paper presents an efficient lossless video-watermarking scheme based on optimal keyframe selection using an intelligent gravitational search algorithm in linear wavelet transform. This technique obtains color motion and motionless frames from the cover video by the histogram difference method. One-level linear wavelet transform is performed on the chrominance channel of motion frames and a low-frequency sub-band LL opts for watermark embedding. The performance of the proposed technique has been evaluated against 12 video processing attacks in terms of imperceptibility and robustness. Experiments demonstrate that the proposed technique outperforms five state-of-the-art schemes on the considered attacks.


Electronics ◽  
2021 ◽  
Vol 10 (20) ◽  
pp. 2467
Author(s):  
Jong-Uk Hou

We present a robust video watermarking scheme and report the detailed robustness of the video watermarking assessed based on standard criteria obtained from Information Hiding and its Criteria (IHC) Committee. Using discrete cosine transform domain spread-spectrum watermarking, our system achieves robustness under various non-hostile video processing techniques, including MPEG compression and digital/analog–analog/digital (DA-AD) conversion. The proposed system ensures that a 16-bit embedded sequence can be extracted through adaptive frame selection in any 15-s interval, even with a long video clip. To evaluate the performance of the proposed watermarking scheme, we conducted robustness tests under a DA-AD conversion environment, based on the MPEG-4 part 10 (H.264) codec. The experiment results obtained indicate that, in addition to being robust against non-hostile video processes, the proposed method achieves invisibility. The assessment of the developed watermarking scheme also satisfies the third edition of the IHC video watermarking evaluation criteria.


Author(s):  
Aisha Yrgyzbaykyzy Zhubatkhan ◽  
Aigerim Mussina ◽  
Sanzhar Serikovich Aubakirov

In our research work, we study transport card security issues. One of the questions of our study is its relevance in the world and particular in Kazakhstan. Therefore, in this work, we conducted research on the market of transport cards in the world and Kazakhstan. As part of the study, we searched for answers to the following questions: what technologies are used to accept payment by transport cards, in which countries the electronic ticketing system has been introduced, in which cities of Kazakhstan have electronic ticketing systems been implemented, what technologies are used in Kazakhstan. As a result, we showed that the popularity of using NFC payment in the world and in Kazakhstan is growing. We also analyzed the existing electronic ticketing systems in Kazakhstan, made a comparative analysis and got a comparative table.


Author(s):  
Tran Khanh Dang

In an outsourced database service model, query assurance takes an important role among well-known security issues. To the best of our knowledge, however, none of the existing research work has dealt with ensuring the query assurance for outsourced tree-indexed data. To address this issue, the system must prove authenticity and data integrity, completeness, and freshness guarantees for the result set. These objectives imply that data in the result set is originated from the actual data owner and has not been tampered with; the server did not omit any tuples matching the query conditions; and the result set was generated with respect to the most recent snapshot of the database. In this paper, we propose a vanguard solution to provide query assurance for outsourced tree-indexed data on untrusted servers with high query assurance and at reasonable costs. Experimental results with real datasets confirm the effciency of our approach and theoretical analyses.


Author(s):  
M. N. Favorskaya ◽  
V. V. Buryachenko

Abstract. Mobile devices provide a huge amount of multimedia information sending to the members of social groups every day. Sometimes it is required to authorize the sending information using the limited computational resources of smartphones, tablets or laptops. The hardest problem is with smartphones, which have the limited daily energy and battery life. There are two scenarios for using mobile watermarking techniques. The first scenario is to implement the embedding and extraction schemes using proxy server. In this case, the watermarking scheme does not differ from conventional techniques, including the advanced ones based on adaptive paradigms, deep learning, multi-level protection, and so on. The main issue is to hide the embedding and extracting information from the proxy server. The second scenario is to provide a pseudo-optimized algorithm respect to robustness, imperceptibility and capacity using limited mobile resources. In this paper, we develop the second approach as a light version of adaptive image and video watermarking schemes. We propose a simple approach for creating a patch-based set for watermark embedding using texture estimates in still images and texture/motion estimates in frames that are highly likely to be I-frames in MPEG notation. We embed one or more watermarks using relevant large-sized patches according to two main criteria: high texturing in still images and high texturing/non-significant motion in videos. The experimental results confirm the robustness of our approach with minimal computational costs.


Cloud Computing (CC) provides an easy way to access and store the information by vast remote servers, instead of using personal computer. There is no physical control over personal data by user, hence some security issues may arise for users and organization to secure the data in cloud. The sensitive data can be hacked by attackers, so the integrity of data stored in cloud is a major concern for users. In this research work, the data integrity can be ensured by using Third Party Storage Auditing Service (TPSAS), where it satisfies all the requirements of users in cloud. The ultimate aim of this research is to avoid the unauthorized access of user’s data stored in the cloud. In this paper, two major problems are considered for attaining the integrity of data in the cloud. The first one is, the unauthorized user tries to modify the data, which is solved by the proposed TPSAS. The second problem considered in this research is, since the Cloud Service Provider (CSP) is semi trustable it can be malfunctioned at any time, which can be solved based on the secure secret key sharing algorithm and proxy re-encryption methodology. The secure secret key sharing is implemented based on the Shamir key sharing algorithm and the proxy re-encryption process is implemented based on the bear and lion proxy re-encryption methodology.


2021 ◽  
Author(s):  
Florance G ◽  
R.J Anandhi

The internet is faced with many problems daily, one of them is decrement in network bandwidth because of Distributed Denial of Service (DDoS) attack on host server, which deplete host resources. Researchers has been invented many protection mechanisms such as detection, trace back, prevention, reaction, and characterization are in case of DDoS attacks, which will control the number of malicious packets received by the victim. But it does not provide efficient detection technique with high rate in real time network infrastructure. Thus, modern technologies are prepared on Mininet network simulators, which give more impact to simulate the real network. The architecture of Software Defined Networks (SDN) and OpenFlow architecture is used to demonstrate a programmable network model and centralized management of real network. In this research work, we provide design of software defined network (SDN) using mininet simulator and security issues related to the Software Defined Network.


The routing process in Vehicular Ad hoc Networks (VANET) remains a more demanding task in city backgrounds. Identifying an optimal end-to-end path that satisfies reduced overhead and delay control is still facing a lot of difficulties and limitations in recent days. These limitations are owing to the increased movement of vehicles, the repeated failures of a path, and the varied obstacles that might have an effect on the consistency of the data routing and transmission. Hence, this paper intends to present an enhanced VANET routing model by considering the network quality metrics including congestion, travel, collision and QoS awareness cost. Accordingly, in the proposed work, a cost model is modeled as the solution for the vehicle routing problem by taking into account the above-mentioned constraints. For determining the optimal route, this research work establishes a new hybrid algorithm known as Grey Updated Butterfly Operator (GU-BO) that links both the concepts of Monarch Butterfly Optimization (MBO) Algorithm and Grey Wolf Optimization (GWO). Finally, the performance of the implemented approach is compared over other conventional approaches with respect to congestion and cost analysis, and proves its superiority of proposed work over others.


Sign in / Sign up

Export Citation Format

Share Document