Issues on Image Authentication

2005 ◽  
pp. 173-206
Author(s):  
Ching-Yung Lin

Multimedia authentication distinguishes itself from other data integrity security issues because of its unique property of content integrity in several different levels — from signal syntax levels to semantic levels. In this section, we describe several image authentication issues, including the mathematical forms of optimal multimedia authentication systems, a description of robust digital signature, the theoretical bound of information hiding capacity of images, an introduction of the self-authentication-and-recovery image (SARI) system, and a novel technique for image/video authentication in the semantic level. This chapter provides an overview of these image authentication issues.

2008 ◽  
pp. 3282-3308
Author(s):  
Ching-Yung Lin

Multimedia authentication distinguishes itself from other data integrity security issues because of its unique property of content integrity in several different levels — from signal syntax levels to semantic levels. In this section, we describe several image authentication issues, including the mathematical forms of optimal multimedia authentication systems, a description of robust digital signature, the theoretical bound of information hiding capacity of images, an introduction of the self-authentication-and-recovery image (SARI) system, and a novel technique for image/video authentication in the semantic level. This chapter provides an overview of these image authentication issues.


2013 ◽  
Vol 798-799 ◽  
pp. 423-426
Author(s):  
Xiao Feng Wang

Through the analysis of the hypertext markup, proposed and implemented several new methods of text information hiding. The concealment of these methods is better, Comprehensive utilization of these methods can obtain large information hiding capacity, better concealed. And they have better robustness for traditional attack.


Author(s):  
Edilson Ferneda ◽  
Fernando William Cruz ◽  
Hércules Antonio Do Prado ◽  
Renato da Veiga Guadagnin ◽  
Laurindo Campos Dos Santos ◽  
...  

Interoperability is one of the fundamental requirements to enable electronic government. Its implementation can be classified into technical, syntactic, semantic, and organizational levels. At the semantic level, ontology is regarded as a practical solution to be considered. In this context, its adoption was identified in several countries, with different levels of maturity and so many focuses as the specific implementations. One of the main challenges to be overcome is the legal question that refers to the legislation to assure “the preservation of the legal meaning of data”. The lack of efficient mechanisms to support the deployment and use of ontologies can turn the overall task time-expensive, restricted in scope, or even unfeasible. Additionally, many initiatives are recent and need to be validated over time. This paper presents a non-exhaustive survey of the state of interoperability in e-government from the perspective of ontologies' use. The cases of Palestine, European Union, Netherlands, Estonia, and Brazil are discussed.


2021 ◽  
pp. 034-041
Author(s):  
A.Y. Gladun ◽  
◽  
K.A. Khala ◽  

It is becoming clear with growing complication of cybersecurity threats, that one of the most important resources to combat cyberattacks is the processing of large amounts of data in the cyber environment. In order to process a huge amount of data and to make decisions, there is a need to automate the tasks of searching, selecting and interpreting Big Data to solve operational information security problems. Big data analytics is complemented by semantic technology, can improve cybersecurity, and allows you to process and interpret large amounts of information in the cyber environment. Using of semantic modeling methods in Big Data analytics is necessary for the selection and combination of heterogeneous Big Data sources, recognition of the patterns of network attacks and other cyber threats, which must occur quickly to implement countermeasures. Therefore to analyze Big Data metadata, the authors propose pre-processing of metadata at the semantic level. As analysis tools, it is proposed to create a thesaurus of the problem based on the domain ontology, which should provide a terminological basis for the integration of ontologies of different levels. To build a thesaurus of the problem, it is proposed to use the standards of open information resources, dictionaries, encyclopedias. The development of an ontology hierarchy formalizes the relationships between data elements that will be used in future for machine learning and artificial intelligence algorithms to adapt to changes in the environment, which in turn will increase the efficiency of big data analytics for the cybersecurity domain.


2018 ◽  
pp. 54-76
Author(s):  
Tabassum N. Mujawar ◽  
Ashok V. Sutagundar ◽  
Lata L. Ragha

Cloud computing is recently emerging technology, which provides a way to access computing resources over Internet on demand and pay per use basis. Cloud computing is a paradigm that enable access to shared pool of resources efficiently, which are managed by third party cloud service providers. Despite of various advantages of cloud computing security is the biggest threat. This chapter describes various security concerns in cloud computing. The clouds are subject to traditional data confidentiality, integrity, availability and various privacy issues. This chapter comprises various security issues at different levels in environment that includes infrastructure level security, data level and storage security. It also deals with the concept of Identity and Access Control mechanism.


2019 ◽  
Vol 1 (1) ◽  
pp. 22-29
Author(s):  
Mouleeswaran S.K. ◽  
Kanya Devi J ◽  
Illayaraja

The security issues in the cloud have been well studied. The data security has much importance in point of data owner. There are number of approaches presented earlier towards performance in data security in cloud. To overcome the issues, a class based multi stage encryption algorithm is presented in this paper. The method classifies the data into number of classes and different encryption scheme is used for different classes in different levels. Similarly, the user has been authenticated for their access and they have been classified into different categories. According to the user profile, the method restricts the access of user and based on the same, the method defines security measures. A system defined encryption methodology is used for encrypting the data. Moreover, the user has been returned with other encryption methods which can be decrypted by the user using their own key provided by the system. The proposed algorithm improves the performance of security and improves the data security.


2021 ◽  
Vol 5 (1) ◽  
pp. 113-117
Author(s):  
Igor Ruban ◽  
Nataliia Bolohova ◽  
Vitalii Martovytskyi ◽  
Oleh Koptsev

The development of new technologies, the growing volume of data and the total consumption of content in the digital environment are changing the ecosystem of modern media. Data can be easily and completely duplicated. It brings great convenience to life, work, scientific research and other areas of human activity. However, information security issues have appeared that have attracted a lot of attention. The purpose of this article is to present a model for digital image authentication. This article proposes a model for reliable verification of digital image authenticity with a high degree of protection and parameters for assessing the effectiveness of such systems.  Reliability is achieved because the watermark is hidden not in the whole image, but in its fragment, which is most suitable for hiding the image, as well as for using anti-noise codes as a watermark. Based on the current state of watermarking methods, it is recommended to use modern algorithms and architectures of convolutional neural networks to ensure a high degree of security.


Symmetry ◽  
2021 ◽  
Vol 13 (10) ◽  
pp. 1896
Author(s):  
Chwei-Shyong Tsai ◽  
Hsin-Liang Chen ◽  
Hsien-Chu Wu ◽  
Josh Jia-Ching Ying

The information technique has developed rapidly. The technique of QR codes is widely applied in our daily life, and the mechanism is suitable to share data. A QR code uses symmetric encryption to store and retrieve data efficiently. However, the security issues of QR codes are seldom discussed by the wider community. Moreover, if the sender wishes only the authorized participant to attain the private data which are shared, the data must be encrypted. Furthermore, we do not know who should be censured when problems arise. In view of this, to maintain the integrity and the confidentiality of information security, this paper proposed a new puzzle-based data sharing scheme to share the private information safely. Firstly, we generated the digital signature of the information, then applied the random grids algorithm to obtain the shares. Then, we disarrayed the shares which contain the information and the digital signature with a puzzle-based encoding method. Afterwards, we concealed them into the cover QR codes. With the QR code mechanism of error correction, the marked QR code remain meaningful. Finally, we could send marked QR codes via transmission. The receiver could use XOR operation to obtain the private information after solving the puzzles and verify whether it was tampered with by the digital signature. The proposed system can recover the lossless data and protect them from being divulged. To deal with the potential hazard of transmission in a public environment, there are more and more studies on data hiding and image authentication.


Sign in / Sign up

Export Citation Format

Share Document