Digital watermarking is used to hide the information inside a signal, which can not be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different f...Digital watermarking is used to hide the information inside a signal, which can not be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party. With a lot of information available on various search engines, to protect the ownership of information is a crucial area of research. In latest years, several digital watermarking techniques are presented based on discrete cosine transform (DCT), discrete wavelets transform (DWT) and discrete fourier transforms (DFT). In this paper, we propose an algorithm for digital image watermarking technique based on singular value decomposition;both of the L and U components are explored for watermarking algorithm. This technique refers to the watermark embedding algorithm and watermark extracting algorithm. The experimental results prove that the quality of the watermarked image is excellent and there is strong resistant against many geometrical attacks.展开更多
Over the last few years,the need of a cloud environment with the ability to detect illegal behaviours along with a secured data storage capability has increased largely.This study presents such a secured cloud storage...Over the last few years,the need of a cloud environment with the ability to detect illegal behaviours along with a secured data storage capability has increased largely.This study presents such a secured cloud storage framework comprising of a deoxyribonucleic acid(DNA)based encryption key which has been generated to make the framework unbreakable,thus ensuring a better and secured distributed cloud storage environment.Furthermore,this work proposes a novel DNA-based encryption technique inspired by the biological characteristics of DNA and the protein synthesis mechanism.The introduced DNA based model also has an additional advantage of being able to decide on selecting suitable storage servers from an existing pool of storage servers on which the data must be stored.A fuzzy-based technique for order of preference by similarity to ideal solution(TOFSIS)multi-criteria decisionmaking(MCDM)model has been employed to achieve the above-mentioned goal.This can decide the set of suitable storage servers and also results in a reduction in execution time by keeping up the level of security to an improved grade.This study also investigates and analyzes the strength of the proposed S-Box and encryption technique against some standard criteria and benchmarks,such as avalanche effect,correlation coefficient,information entropy,linear probability,and differential probability etc.After the avalanche effect analysis,the average change in cipher-text has been found to be 51.85%.Moreover,thorough security,sensitivity and functionality analysis show that the proposed scheme guarantees high security with robustness.展开更多
文摘Digital watermarking is used to hide the information inside a signal, which can not be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party. With a lot of information available on various search engines, to protect the ownership of information is a crucial area of research. In latest years, several digital watermarking techniques are presented based on discrete cosine transform (DCT), discrete wavelets transform (DWT) and discrete fourier transforms (DFT). In this paper, we propose an algorithm for digital image watermarking technique based on singular value decomposition;both of the L and U components are explored for watermarking algorithm. This technique refers to the watermark embedding algorithm and watermark extracting algorithm. The experimental results prove that the quality of the watermarked image is excellent and there is strong resistant against many geometrical attacks.
基金This publication was an outcome of the R&D work undertaken project under the Visvesvaraya PhD Scheme of Ministry of Electronics&Information Technology,Government of India,being implemented by Digital India Corporation.
文摘Over the last few years,the need of a cloud environment with the ability to detect illegal behaviours along with a secured data storage capability has increased largely.This study presents such a secured cloud storage framework comprising of a deoxyribonucleic acid(DNA)based encryption key which has been generated to make the framework unbreakable,thus ensuring a better and secured distributed cloud storage environment.Furthermore,this work proposes a novel DNA-based encryption technique inspired by the biological characteristics of DNA and the protein synthesis mechanism.The introduced DNA based model also has an additional advantage of being able to decide on selecting suitable storage servers from an existing pool of storage servers on which the data must be stored.A fuzzy-based technique for order of preference by similarity to ideal solution(TOFSIS)multi-criteria decisionmaking(MCDM)model has been employed to achieve the above-mentioned goal.This can decide the set of suitable storage servers and also results in a reduction in execution time by keeping up the level of security to an improved grade.This study also investigates and analyzes the strength of the proposed S-Box and encryption technique against some standard criteria and benchmarks,such as avalanche effect,correlation coefficient,information entropy,linear probability,and differential probability etc.After the avalanche effect analysis,the average change in cipher-text has been found to be 51.85%.Moreover,thorough security,sensitivity and functionality analysis show that the proposed scheme guarantees high security with robustness.