PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

An Adaptive Approach for image adaptive watermarking using Elliptical curve cryptography (ECC)

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Konferencja
International Conference on Information Technology and Knowledge Management (1 ; 22-23.12.2017 ; New Delhi, India)
Języki publikacji
EN
Abstrakty
EN
Elliptical curve cryptography (ecc) is a public key encryption approach based on elliptic curve idea that may be used to create quicker, smaller, and greater green cryptographic keys. Ecc generates keys through the houses of the elliptic curve equation in area of the traditional approach of generation as the manufactured from very huge prime numbers. The technology may be used at the side of maximum public key encryption strategies, together with rsa, and diffiehellman. Consistent with some researchers, ecc can yield a degree of safety with a 164-bit key that different structures require a 1,024-bit key to advantage. Because of the fact ecc helps to establish equivalent safety with decrease computing power and battery useful resource usage, it's far turning into widely used for cellular programs. In this work we implement ECC Algorithm with altered approach for encrypting and decrypting the probe image and encrypted images respectively. Our proposed approach has proposed that the elapsed time to perform the task for same input image is less than the conventional approach. We have run the cryptography procedure for n number of iterations in order to get the accurate results and compared that particular elapsed time with the conventional approach. We have contemplated an approach in which we consider region of interest (ROI) unlike the conventional approach, the advantage of the proposed work is we n need not to cover all the pixel vectors but only those which is required to be encrypted or decrypted. The proposed work has applied ecc algorithm for error calculations which has been shown in the experimental results. The proposed work has compared the result in both the aspects in terms of elapsed time to perform the algorithm and ROI feature to get implemented at the same time.
Słowa kluczowe
EN
object   Matlab   rsa   ECC   cryptographic  
PL
obiekt   Matlab   rsa   ECC   kryptografia  
Rocznik
Tom
Strony
89--92
Opis fizyczny
Bibliogr. 15 poz., il.
Twórcy
autor
  • Computer Science & Engineering, Govt. Engineering College, Ajmer, India
autor
  • Computer Science & Engineering, Govt. Engineering College, Ajmer, India
  • Computer Science & Engineering, Aryabhatt College of Engg. & Research Center, Ajmer, India
Bibliografia
  • 1. Stenger, A., Rabenstein, R.: Adaptive Volterra Filters For Nonlinear Acoustic Echo Cancellation. In: Proc. NSIP, vol. 2, pp. 679–683 (1999)
  • 2. 4. Paleologu, C., Benesty, J., Ciochin, S.: A Variable Step-Size Affine Projection Algorithm Designed for Acoustic Echo Cancellation. IEEE Transactions on Audio, Speech, and Language Processing 16, 1466–1478 (2008)
  • 3. Van Schyndel, R. G., Tirkel, A. Z., and Osborne, C. F., “A digital Watermark.” Proc. of the IEEE Int. Conference on Image Processing. Vol. 2, (1994): pp. 86-90.
  • 4. Swanson, M.D., Kobayashi, M., and Tewfik, A.H., “Multimedia Data-Embedding and Watermarking Technologies.” Proc. of the IEEE. Vol. 86, No. 6, (June 1998): pp. 1064– 1087.
  • 5. Petitcolas, F., Anderson, R., and Kuhn, M., “Information Hiding—a Survey.” Proc. of the IEEE. Vol. 87, No. 7, (July 2016): pp. 1062–1078.
  • 6. Barni, M., Bartolini, F., Cox, I.J., Hernandez, J., and Perez-Gonzalez, F., “Digital Watermarking for Copyright Protection: A communications perspective.” IEEE Communications Magazine. Vol. 39, No. 8, (August 2015):pp. 90–133.
  • 7. Langelaar, Gerhard C., Setyawan, I., and Lagendijk, R. L., “Watermarking Digital Image and Video Data: A state-of-the-art-overview.” IEEE Signal Processing Magazine. Vol. 17, No. 5, (September 2015): pp. 20-47.
  • 8. Voyatzis, G., Mikolaides, N., and Pitas, I., “Digital watermarking: An overview.” Proc. of IX European Signal Processing Conference(EUSIPCO), Island of Rhodes, Greece. (September 8-11, 2014): pp. 13-16.
  • 9. Wolfgang, R. B., Podilchuk, C. I., and Edward J. Delp, “Perceptual Watermarks for Image and Video.” Proc. of the IEEE. Vol. 87, No. 7, (July 2013): pp. 1109-1126.
  • 10. Cox, I. J., Miller, M. L., and Bloom, J. A., “Watermarking Applications and their Properties.” Proc. of IEEE Int. Conference on Information Technology, Las Vegas. (March 2012): pp. 6-10.
  • 11. Craver, S., Memon, N., Yeo, B.-L., and Yeung, M. M., “Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks and Implications.” IEEE Journal On Selected Areas in Communications. Vol. 16, No. 4, (May 1998): pp. 573-586
  • 12. Ruanaidh, J. J. K. O’, and Pun, T., “Rotation, Scale and Translation Invariant Digital Image Watermarking.” Proc. of IEEE Int. Conference on Image Processing, Santa Barbara, CA, USA. Vol. 1, (October 2011): pp. 536-539.
  • 13. Cox, I. J., Kilian, J., Leighton, F. T., and Shamoon, T., “Secure Spread Spectrum Watermarking for Multimedia.” Proc. of IEEE Int. Conference on Image Processing. Vol. 6, (December 2011): pp. 1673-1687.
  • 14. Boland, F. M., Ruanaidh, J. J. K. O’, and Dautzenberg, C. “Watermarking Digital Images for Copyright Protection.” Proc. of IEEE Int. Conference on Image Processing and its Application, Edinburgh, U.K. (July 2009): pp. 321-326.
  • 15. Barni, M., Bartolini, F., Cappellini, V., and Piva, A., “A DCT Domain System for Robust Image Watermarking.” Signal Processing Archive. Vol. 66, No. 3, (May 2008): pp. 357- 372.
Uwagi
1. Preface
2. Technical Session: First International Conference on Information Technology and Knowledge Management
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-46d1bbf6-92a1-4921-8335-01eba9ec32ee
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.