• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 122
  • 16
  • 10
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 209
  • 104
  • 58
  • 45
  • 37
  • 33
  • 29
  • 24
  • 24
  • 23
  • 22
  • 21
  • 20
  • 19
  • 19
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

Transformation de programme et protection de la propriété intellectuelle - préparation, intégration et vérification

Grenier, Christophe 01 October 2013 (has links) (PDF)
Dans le domaine de la Défense, les contrats export s'accompagnent souvent de transferts de technologie. Un compromis est donc nécessaire entre la protection de la propriété industrielle, celle du secret national et les demandes client. Nous étudierons dans ce contexte et au sein de DCNS les transformations de sécurisation de programme, principalement l'obfuscation et le watermarking. Nous présenterons ces transformations et les principaux résultats théoriques qui les concernent, ainsi que leur adéquation au besoin de sécurité. Nous étudierons la formalisation et la mise en oeuvre des principales techniques connues de transformations. Celles-ci ont pour objectif de rendre diffcile la rétro-ingénierie tout en préservant les fonctionnalités et les performances des systèmes. Nous aborderons les grandes familles existantes et leur implémentation à travers le bytecode Java. Ensuite, nous étudierons l'intégration de ces techniques dans le cycle de développement d'un logiciel complexe. Un premier focus sera effectué sur la mise en oeuvre de certaines techniques de transformation où leurs limites seront exhibées et des pistes d'amélioration proposées. Nous présenterons l'outillage réalisé pour cette analyse et les perspectives d'utilisation envisagées. Enfin, nous présenterons les mécanismes déployés en amont de la transformation permettant d'intégrer au plus tôt la gestion des contraintes et en aval pour vérifier que les techniques utilisées sont conformes à celles demandées afin de renforcer la confiance dans les transformations effectuées.
132

Digital Video Watermarking Robust to Geometric Attacks and Compressions

Liu, Yan 03 October 2011 (has links)
This thesis focuses on video watermarking robust against geometric attacks and video compressions. In addition to the requirements for an image watermarking algorithm, a digital video watermarking algorithm has to be robust against advanced video compressions, frame loss, frame swapping, aspect ratio change, frame rate change, intra- and inter-frame filtering, etc. Video compression, especially, the most efficient compression standard, H.264, and geometric attacks, such as rotation and cropping, frame aspect ratio change, and translation, are considered the most challenging attacks for video watermarking algorithms. In this thesis, we first review typical watermarking algorithms robust against geometric attacks and video compressions, and point out their advantages and disadvantages. Then, we propose our robust video watermarking algorithms against Rotation, Scaling and Translation (RST) attacks and MPEG-2 compression based on the logpolar mapping and the phase-only filtering method. Rotation or scaling transformation in the spatial domain results in vertical or horizontal shift in the log-polar mapping (LPM) of the magnitude of the Fourier spectrum of the target frame. Translation has no effect in this domain. This method is very robust to RST attacks and MPEG-2 compression. We also demonstrate that this method can be used as a RST parameters detector to work with other watermarking algorithms to improve their robustness to RST attacks. Furthermore, we propose a new video watermarking algorithm based on the 1D DFT (one-dimensional Discrete Fourier Transform) and 1D projection. This algorithm enhances the robustness to video compression and is able to resist the most advanced video compression, H.264. The 1D DFT for a video sequence along the temporal domain generates an ideal domain, in which the spatial information is still kept and the temporal information is obtained. With detailed analysis and calculation, we choose the frames with highest temporal frequencies to embed the fence-shaped watermark pattern in the Radon transform domain of the selected frames. The performance of the proposed algorithm is evaluated by video compression standards MPEG-2 and H.264; geometric attacks such as rotation, translation, and aspect-ratio changes; and other video processing. The most important advantages of this video watermarking algorithm are its simplicity, practicality and robustness.
133

Towards Template Security for Iris-based Biometric Systems

Fouad, Marwa 18 April 2012 (has links)
Personal identity refers to a set of attributes (e.g., name, social insurance number, etc.) that are associated with a person. Identity management is the process of creating, maintaining and destroying identities of individuals in a population. Biometric technologies are technologies developed to use statistical analysis of an individual’s biological or behavioral traits to determine his identity. Biometrics based authentication systems offer a reliable solution for identity management, because of their uniqueness, relative stability over time and security (among other reasons). Public acceptance of biometric systems will depend on their ability to ensure robustness, accuracy and security. Although robustness and accuracy of such systems are rapidly improving, there still remain some issues of security and balancing it with privacy. While the uniqueness of biometric traits offers a convenient and reliable means of identification, it also poses the risk of unauthorized cross-referencing among databases using the same biometric trait. There is also a high risk in case of a biometric database being compromised, since it’s not possible to revoke the biometric trait and re-issue a new one as is the case with passwords and smart keys. This unique attribute of biometric based authentication system poses a challenge that might slow down public acceptance and the use of biometrics for authentication purposes in large scale applications. In this research we investigate the vulnerabilities of biometric systems focusing on template security in iris-based biometric recognition systems. The iris has been well studied for authentication purposes and has been proven accurate in large scale applications in several airports and border crossings around the world. The most widely accepted iris recognition systems are based on Daugman’s model that creates a binary iris template. In this research we develop different systems using watermarking, bio-cryptography as well as feature transformation to achieve revocability and security of binary templates in iris based biometric authentication systems, while maintaining the performance that enables widespread application of these systems. All algorithms developed in this research are applicable on already existing biometric authentication systems and do not require redesign of these existing, well established iris-based authentication systems that use binary templates.
134

Template Based Image Watermarking In The Fractional Fourier Domain

Gokozan, Tolga 01 February 2005 (has links) (PDF)
One of the main features of digital technology is that the digital media can be duplicated and reproduced easily. However, this allows unauthorized and illegal use of information, i.e. data piracy. To protect digital media against illegal attempts a signal, called watermark, is embedded into the multimedia data in a robust and invisible manner. A watermark is a short sequence of information, which contains owner&rsquo / s identity. It is used for evidence of ownership and copyright purposes. In this thesis, we use fractional Fourier transformation (FrFT) domain, which combines space and spatial frequency domains, for watermark embedding and implement well-known secure spread spectrum watermarking approach. However, the spread spectrum watermarking scheme is fragile against geometrical attacks such as rotation and scaling. To gain robustness against geometrical attacks, an invisible template is inserted into the watermarked image in Fourier transformation domain. The template contains no information in itself but it is used to detect the transformations undergone by the image. Once the template is detected, these transformations are inverted and the watermark signal is decoded. Watermark embedding is performed by considering the masking characteristics of the Human Visual System, to ensure the watermark invisibility. In addition, we implement watermarking algorithms, which use different transformation domains such as discrete cosine transformation domain, discrete Fourier transformation domain and discrete wavelet transformation domain for watermark embedding. The performance of these algorithms and the FrFT domain watermarking scheme is experimented against various attacks and distortions, and their robustness are compared.
135

FPGA prototyping of a watermarking algorithm for MPEG-4

Cai, Wei. Kougianos, Elias, Mohanty, Saraju, January 2007 (has links)
Thesis (M.S.)--University of North Texas, May, 2007. / Title from title page display. Includes bibliographical references.
136

Σχεδίαση και ανάπτυξη υδατογραφικού σχήματος για σήματα ηλεκτροεγκεφαλογραφήματος

Γκιόξη, Ειρήνη 11 January 2011 (has links)
Σκοπός της παρούσας μεταπτυχιακής διπλωματικής εργασίας είναι η μελέτη και σχεδίαση ενός υδατογραφικού σχήματος για ηλεκτροεγκεφαλογραφικά (ΗΕΓ) σήματα επιληπτικών ασθενών. Το υδατογραφικό σχήμα που εφαρμόστηκε βασίζεται στο Μετασχηματισμό Κυματιδίων (wavelet transform) και είχε μέχρι πρότινος εφαρμοστεί μόνο σε ιατρικές εικόνες. Στόχος της ανάπτυξης του υδατογραφικού αυτού σχήματος, είναι η ενσωμάτωση πληροφοριών που έχουν μεγάλη αξία για διάγνωση και θεραπεία χωρίς όμως να αλλοιώνεται αισθητά το σήμα μετά την ενσωμάτωση των δεδομένων. Πριν την εφαρμογή όμως του υδατογραφικού μας σχήματος, απομονώνεται με έναν ειδικά σχεδιασμένο αλγόριθμο η περιοχή της επιληπτικής κρίσης γιατί είναι η περιοχή με τη μεγαλύτερη διαγνωστική αξία και στόχος είναι να παραμείνει εντελώς αναλλοίωτη. Η πρόοδος στον τομέα της τηλεϊατρικής έχει επιτρέψει τη μεταφορά ιατρικών σημάτων με στόχο τη διάγνωση και θεραπεία ασθενών που βρίσκονται σε απομακρυσμένες περιοχές. Κατά τη μεταφορά του υδατογραφημένου σήματος όμως μπορεί αυτό να υποστεί αλλοιώσεις που προέρχονται από συμπιέσεις του σήματος με σκοπό τη μείωση του μεγέθους τους, αλλά και αλλοιώσεις που προέρχονται από προσθήκη θορύβου. Για να εκτιμηθεί η αποτελεσματικότητα λοιπόν του υδατογραφικού μας σχήματος, εφαρμόζονται στο σήμα επιθέσεις συμπίεσης με διαφορετικά κατώφλια και επιθέσεις προσθήκης λευκού θορύβου με διαφορετικούς σηματοθορυβικούς λόγους SNR. Εφαρμόζοντας αυτές τις επιθέσεις, υπολογίζεται το ποσοστό ανάκτησης του υδατογραφήματος από το σήμα που έχει υποστεί επίθεση καθώς και το ποσοστό αλλοίωσης μεταξύ του αρχικού υδατογραφημένου σήματος και του υδατογραφημένου σήματος που έχει υποστεί επίθεση. Μεγαλύτερο ποσοστό ανάκτησης του υδατογραφήματος παρατηρείται όσο το κατώφλι συμπίεσης μικραίνει ενώ αντίθετα ο σηματοθορυβικός λόγος SNR μεγαλώνει. / The purpose of this thesis is the disquisition of a digital watermarking scheme for electroencephalogram (EEG) signals designed for epileptic patients. The watermarking scheme that has been applied in EEG signals is based on wavelet transform applied only in medical images. The objective implementing this digital watermarking scheme in EEG signals, is to embed important data with great significance in patient’s medical history. Furthermore, the scheme can be used for: diagnosis and cure, without distort the initial signal in such a way that leads in a misdiagnosis. Prior to implementation of our watermarking scheme, the area that presents the epileptic seizure is isolated with a specific designed algorithm so as the signal in this area remains undistorted. Nowadays, modern telecommunication infrastructure supports the possibility of delivering quality health care without the physical presence of medical experts. During the telecommunication signal transfers, the watermarking signals can be distorted due to compression methods or/and addition of white noise. In order to evaluate the efficiency of watermarking scheme, the signal is subjected to different kinds of attacks, such as compression with different compression thresholds, and attacks of adding white noise with different SNR ratio. After applying these attacks to the signal, it is computed the recovery ratio of the watermark and the distortion between the initial watermarked signal and the signal that has been subjected to the attacks. Given the results, the conclusion is that the smaller the compression threshold is, the better the recovery ratio of the watermark. On the other hand, in white noise attacks, the recovery ratio increases as the SNR ratio gets higher.
137

Watermarking Video Game Textures

Khoshdani, Pedram January 2013 (has links)
How amazing would it be to prevent illegal copies of computer games? Game developers work with the hope that they can make good profit out of their games, but when they know that they would not sell much they will be so disappointed and that is because once a few original copies of their games are released, soon or late, there will be illegal copies available in the market. Working on how to distinguish between a legal copy and an illegal copy is the general topic of this thesis. / In a game there are many images and textures used for graphical purposes. One of the most recent texture file extensions used in modern games to store Microsoft DirectDraw Surface which is the basic image unit in Microsoft DirectX graphics is DirectDraw Surface or DDS in short. In this thesis, it was attempted to embed as many bits (watermark/ message) as possible and retrieve the bits after embedding to mark the file in a distinguishable way. The result has been very promising under different circumstances. / +46723136160
138

Neuronové sítě v algoritmech vodoznačení audio signálů / Neural networks in audio signal watermarking algorithms

Kaňa, Ondřej January 2010 (has links)
Digital watermarking is a technique for digital multimedia copyright protection. The robustness and the imperceptibility are the main requirements of the watermark. This thesis deals with watermarking audio signals using artificial neural networks. There is described audio watermarking method in the DCT domain. Method is based on human psychoacoustic model and the techniques of neural networks.
139

A critical analysis of the use of IP as a form of information warfare against the developing world

Tlhapi, William Rasebabele 27 May 2005 (has links)
Please read the abstract in the section 00front of this document / Thesis (DPhil (Information Science))--University of Pretoria, 2005. / Information Science / unrestricted
140

Digital Video Watermarking Robust to Geometric Attacks and Compressions

Liu, Yan January 2011 (has links)
This thesis focuses on video watermarking robust against geometric attacks and video compressions. In addition to the requirements for an image watermarking algorithm, a digital video watermarking algorithm has to be robust against advanced video compressions, frame loss, frame swapping, aspect ratio change, frame rate change, intra- and inter-frame filtering, etc. Video compression, especially, the most efficient compression standard, H.264, and geometric attacks, such as rotation and cropping, frame aspect ratio change, and translation, are considered the most challenging attacks for video watermarking algorithms. In this thesis, we first review typical watermarking algorithms robust against geometric attacks and video compressions, and point out their advantages and disadvantages. Then, we propose our robust video watermarking algorithms against Rotation, Scaling and Translation (RST) attacks and MPEG-2 compression based on the logpolar mapping and the phase-only filtering method. Rotation or scaling transformation in the spatial domain results in vertical or horizontal shift in the log-polar mapping (LPM) of the magnitude of the Fourier spectrum of the target frame. Translation has no effect in this domain. This method is very robust to RST attacks and MPEG-2 compression. We also demonstrate that this method can be used as a RST parameters detector to work with other watermarking algorithms to improve their robustness to RST attacks. Furthermore, we propose a new video watermarking algorithm based on the 1D DFT (one-dimensional Discrete Fourier Transform) and 1D projection. This algorithm enhances the robustness to video compression and is able to resist the most advanced video compression, H.264. The 1D DFT for a video sequence along the temporal domain generates an ideal domain, in which the spatial information is still kept and the temporal information is obtained. With detailed analysis and calculation, we choose the frames with highest temporal frequencies to embed the fence-shaped watermark pattern in the Radon transform domain of the selected frames. The performance of the proposed algorithm is evaluated by video compression standards MPEG-2 and H.264; geometric attacks such as rotation, translation, and aspect-ratio changes; and other video processing. The most important advantages of this video watermarking algorithm are its simplicity, practicality and robustness.

Page generated in 0.0798 seconds