• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • Tagged with
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Secure Mutual Self-Authenticable Mechanism for Wearable Devices

Eya, Nnabuike N., Mapoka, Trust T., Shepherd, Simon J., Abd-Alhameed, Raed, Elfergani, Issa T., Rodriguez, Jonathan 03 1900 (has links)
Yes / Due to the limited communication range of wearable devices, there is the need for wearable devices to communicate amongst themselves, supporting devices and the internet or to the internet. Most wearable devices are not internet enabled and most often need an internet enabled broker device or intermediate device in order to reach the internet. For a secure end to end communication between these devices security measures like authentication must be put in place in other to prevent unauthorised access to information given the sensitivity of the information collected and transmitted. Therefore, there are other existing authentication solutions for wearable devices but these solutions actively involve from time to time the user of the device which is prone to a lot of challenges. As a solution to these challenges, this paper proposes a secure point-to-point Self-authentication mechanism that involves device to device interaction. This work exploits existing standards and framework like NFC, PPP, EAP etc. in other to achieve a device compatible secure authentication protocol amongst wearable device and supporting devices..
2

Digital image watermarking methods for copyright protection and authentication

Woo, Chaw-Seng January 2007 (has links)
The ease of digital media modification and dissemination necessitates content protection beyond encryption. Information hidden as digital watermarks in multimedia enables protection mechanism in decrypted contents. The aims of this research are three-fold: (i) to investigate the strength and limitations of current watermarking schemes, (ii) to design and develop new schemes to overcome the limitations, and (iii) to evaluate the new schemes using application scenarios of copyright protection, tamper detection and authentication. We focus on geometrically robust watermarking and semi-fragile watermarking for digital images. Additionally, hybrid schemes that combine the strength of both robust and semi-fragile watermarks are studied. Robust watermarks are well suited for copyright protection because they stay intact with the image under various manipulations. We investigated two major approaches of robust watermarking. In the synchronization approach, we employed motion estimation for watermark resynchronization. We also developed a novel watermark resynchronization method that has low computational cost using scale normalization and flowline curvature. In another approach, we firstly analyzed and improved a blind watermark detection method. The new method reduces significantly the computational cost of its watermark embedding. Secondly, we created a geometric invariant domain using a combination of transforms, and adapted the blind watermark detection method that we improved. It totally eliminates the need of resynchronization in watermark detection, which is a very desirable achievement that can hardly be found in existing schemes. On the other hand, semi-fragile watermarks are good at content authentication because they can differentiate minor image enhancements from major manipulations. New capabilities of semi-fragile watermarks are identified. Then, we developed a semi-fragile watermarking method in wavelet domain that offers content authentication and tamper localization. Unlike others, our scheme overcomes a major challenge called cropping attack and provides approximate content recovery without resorting to an original image. Hybrid schemes combine robust and semi-fragile watermarks to offer deductive information in digital media forensics. We firstly carried out a pilot study by combining robust and fragile watermarks. Then, we performed a comparative analysis on two implementation methods of a hybrid watermarking scheme. The first method has the robust watermark and the fragile watermark overlapped while the second method uses non-overlapping robust and fragile watermarks. Based on the results of the comparative analysis, we merge our geometric invariant domain with our semi-fragile watermark to produce a hybrid scheme. This hybrid scheme fulfilled the copyright protection, tamper detection, and content authentication objectives when evaluated in an investigation scenario.

Page generated in 0.1324 seconds