IMAGE AUTHENTICATION TECHNIQUES seminars report
#4
PRESENTED BY:
MUKESH KUMAR THAKUR

[attachment=12071]
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems
AUTOMATIC VISUAL SURVEILLANCE SYSTEM
• Automatic Visual Surveillance system is a self monitoring system which consists of a video camera unit, central unit and transmission networks.
AUTHENTICATION TECHNIQUES
• Authentication: It ensures that whoever supplies or accesses sensitive data is an authorized party.
CRYPTOGRAPHY
• In Cryptography, the meaning of the message is hidden, not its existence.
– Kryptos = “hidden” in Greek
• Cryptography is the science of transforming documents.
• It has mainly two functions:
• Encryption
• Decryption
Basic Terms
• Encryption: scrambling a message or data using a specialized cryptographic algorithm.
• Plaintext: the message or data before it gets encrypted.
• Ciphertext: the encrypted (scrambled) version of the message.
• Cipher: the algorithm that does the encryption.
• Decryption: the process of converting ciphertext back to the original plaintext.
CRYPTOGRAPHY
• The key is a randomly selected string of numbers.
• Encryption schemes are classified as:
1. Symmetric encryption :
In which the same key is used to both encode and decode the document.
2. Public key or asymmetric encryption:
It requires a pair of keys: one for encrypting the plain text and the other for decrypting the cipher text. A file encrypted with one key of a pair can be decrypted with other key of the same pair.
CRYPTOGRAPHIC DATA AUTHENTICATION
• Data Integrity
• This involves ensuring that when a message (or any kind of data, including documents and programs) is sent over a network, the data that arrives is the same as the data that was originally sent. It is important that the data has not been tampered with.
• Technical solutions include:
– Encryption
– Hashing algorithms
DRAWBACKS OF CRYPTOGRAPHIC AUTHENTICATION:
• Knowledge of private key :
If the manipulator knows the private key of the camera, he can change the digest to involve the modifications he had made on the actual sequence.
High requirements of video camera:
To avoid the above discussed problem, the video camera should perform the compression of the video sequences prior to digest calculation. This requires the video camera to have high computation as storage requirements.
Delay in transmission:
Digest calculations and encryption introduces a delay in transmission of video documents. This is harmful in system where the timely generation of alarm is critical
• Protecting privacy is difficult :
A part of the program cannot be removed for privacy reasons since it will alter the calculated digest.
WATERMARKING
 Watermark = Water (Invisible) + Mark
 Digital watermarking is the art and science of embedding copyright information in the original files. The information embedded is called ‘watermarks ‘. Digital watermarks are difficult to remove without noticeably degrading the content .
Watermark task consists of two main steps:
1. Watermark casting:-in which the signal represented by the watermark is transmitted over the channel, that is in watermark casting an encoder function Є takes a host image ‘f’ and a watermark ‘w’ and generate a new image
Fw= Є (f, w)
2. Watermark detection:-in which the signal is received and extracted from possibly corrupted image.
• Watermark Image
CLASSIFICATION OF WATERMARKING AUTHENTICATION SCHEMS
Fragile watermarking

• Fragile watermarking refers to the case where watermark inserted within the data is lost or altered as soon as host data undergoes any modification. Watermark loss or alternation is taken as evidence that data has been tampered with, whereas the information contained within data used to demonstrate data origin.
Robust watermarking
• Robust watermarking a summary of the candidate frame or video sequence is computed and is inserted within the video sequence. Information about the data origin is also with the summary. To prove data integrity the information conveyed by the watermark is recovered and compared with the actual content of the sequence. Their mismatch is taken as an evidence of data tampering. The capability to localize the manipulation will depend on the summary of which is embedded in to the image.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: butterworths australian legal, image authentication wikipedia, fragile watermark, who is karan, image authentication techniques seminar, ppt of image authentication techniques, image authentication,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: IMAGE AUTHENTICATION TECHNIQUES seminars report - by seminar class - 12-04-2011, 10:54 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  blast seminars report electronics seminars 6 15,376 09-09-2017, 04:08 PM
Last Post: jaseela123d
  Electronics seminars lists10 computer science crazy 169 92,393 28-03-2015, 10:07 AM
Last Post: seminar report asees
  gsm pdf and final seminars report suvendu9238 10 11,893 19-11-2014, 09:34 PM
Last Post: jaseela123d
  Authentication Schemes for Session Passwords using Color and Images computer girl 2 2,424 20-09-2013, 10:52 AM
Last Post: computer topic
  optical switching seminars report electronics seminars 7 10,644 29-04-2013, 10:55 AM
Last Post: computer topic
  memristor seminars report project report tiger 21 22,927 25-01-2013, 12:02 PM
Last Post: seminar details
Smile smart note taker seminars full report [email protected] 59 31,436 25-01-2013, 12:00 PM
Last Post: seminar details
Information Automated Authentication of Identity Documents Computer Science Clay 2 2,211 19-01-2013, 12:46 AM
Last Post: jellajagadish
Video Automated Authentication of Identity Documents computer science crazy 2 3,566 29-12-2012, 11:38 AM
Last Post: seminar details
  A Digital Watermark Based on The Wavelet Transform and its Robustness on Image project topics 1 2,379 19-12-2012, 11:48 AM
Last Post: seminar details

Forum Jump: