sharbani bhattacharya gyanodya 2014
Post on 13-Apr-2017
262 Views
Preview:
TRANSCRIPT
SHARBANI BHATTACHARYA
Fuzzy Logic in Watermarking System
Gyanodaya 2014IEC-College of Engineering & Technology, Greater Noida29th March 2014
WATERMARK AND NATURAL CALAMITY The natural calamity and disaster
management are often predicted by pictures taken from satellite from space shuttle.
Terrorist can tamper the image and can given altogether different image which depicts different view.
So, image is required to be watermarked properly to be used for any kind of judgement..
WATERMARKING
Watermarking is a method of authentication of an image. It is used for copyright of the digital contents.
Watermarking text
ENCRYPTION
Cryptography is art of converting an message into cipher text and sent to the destination. The authorized person can decipher the text and retrieve the original message.
FUZZY LOGIC
It is logic developed by Loft Zadeh in 1965 at University of California. It is the logic with which unprecise data can be captured to form a set.
FUZZIFICATION
Fuzzy set are acquired from Crisp Set using membership function. This process is known as fuzzification.
DEFUZZIFICATION
Converting Fuzzy set to Crisp set .
FUZZY SET & WATERMARKING SYSTEM This fuzzy sets are then used to design
the front-end of the Watermarking System.
WATERMARKING CRITERIA Robustness Visual Quality Information Embedding Capacity
FUZZY SET WATERMARKING CRITERIA
FRobustness is Fuzzy set for Robustness criteria
FVisual Quality for Visual Quality FEmbedding Capacity Information Embedding
Capacity
Criteria for Watermarking
Factors affecting Watermarking
Fuzzy Sets of Factors
Fuzzy Rule
Design of Front-End
CRITERIA FOR CHOICE
Front-end architecture of watermarking system with criteria robustness.
FACTOR EFFECTING ROBUSTNESS1. Visibile (Vis)2. Invisible(NVis)3. Blind(BL)4. Non-Blind(NBL)5. Medical Image(Mimg)6. Non-Medical Image(Nimg)7. Cryptography (Cryp)8. Non-Crypotographic (Ncryp)9. RSA Algo used(RSA)10. DES Algo used (DES)11. AES Algo used (AES)12. New Algo used (Jnew)13. Watermarking Method using Fuzzy logic(WMF)14. Watermarking Method using Genetic Algorithm(WMGA)15. Watermarking Method using Fuzzy-Genetic algo(WMFGA)16. Fuzzy set for Robust Watermarking Scheme I17. Fuzzy set for Semi Fragile Watermarking Scheme (SFr)18. Fuzzy set for Fragile Watermarking Scheme (Fr)19. Fuzzy set for Watermarking Method(WM)20. Fuzzy set for Robustness (FRobustness)
STEPS FOR WATERMARKING SYSTEM DESIGN Taking all the factors on which robustness of
watermarking scheme depends as crisp set. This crisp set is converted to fuzzy sets. This fuzzy sets are then used to design the front-
end of the Watermarking System. Converting crisp set to fuzzy set is called
fuzzification. These, fuzzy set elements are then put to their
respective places and positions in the user-friendly front-end according to their membership functions.
FUZZY SETS OF WATERMARKING SYSTEM We are defining the following fuzzy sets. FRobustness =[ (R,0.8), (Fr, 0.2), (SFr,0.4)] WM =[ (WMF, 0.5) , (WMGA, 0.4),( WMFGA,0.8)] FCryp = [ (RSA,0.8) , (DES,0.6),(AES,0.4), (Jnew,0.2)] Fr=[ (Vis,0.8) , (BL,0.9), (Ncryp,0.9)] SFr=[ (Vis,0.4),(BL,0.6), (Cryp,0.6)] R=[(NBL,0.8) , (Cryp,0.8) ,(Nvis,0.9) ,(WM,0.4)]
ROBUSTNESS
FRobustness.This opens a Frame having three tabs
Robust Semi Fragile Fragile.
ROBUST TAB HAS
1. Invisibility2.Cryptography3.Non-Blind 4.Watermarking method i.e. -Fuzzy or GA or Fuzzy-Genetic etc.
FRONT-END ARCHITECTURE
Using fuzzy sets in front-end architecture can give more user-friendly interface. The user can see the values of each factors in percentage. This is defuzzification of fuzzy set into crisp set.
FRONT-END ARCHITECTURE
The architecture is designed on the fuzzy rules and user can understand the impact of the changes with its effects of factors in percentage given in the text box below a drop down box.
CONCLUSION
The above method is applicable to all kind of software architecture. As the complexity increases the fuzzy rules can make design easier.
BENEFIT
The benefit is it makes more user friendly front-end.
DRAWBACKS
Drawback is if membership function is not properly judged it can be cumbersome. User can be dismayed by its complicacy.
REFERENCES [1] Lecture Notes on Cryptography Shafi Goldwasser1 Mihir Bellare2, July 2008 [2]Answare, ETIK, ELTE Jedlik Ányos Program RFID research project “Cryptographic Techniques for Physical Security” (Seminar Notes) Author:
Daniel A. Nagy ELTECRYPT Research Group Supported by the National Office for Research and Technology (NKTH) in the framework of Jedlik Ányos Program with number of tender NKFP2-00027/2005.
[3] Whitefiled Diffie and Martin E. Hellman,“Multiuser Cryptographic Techniques*” ,Stanford University Stanford, California [4] Alina Mihaela Oprea ,“Efficient Cryptographic Techniques for Securing Storage Systems” CMU-CS-07-119April 2007, PhD thesis, School of
Computer Science Carnegie Mellon University ,Pittsburgh, PA 15213. [5] Kenneth W. Dam and Herbert S. Lin “Cryptography's Role in Securing the Information Society”, Editors, Committee to Study National
Cryptography Policy, National Research Council. [6] Public-Key Cryptography Theory and Practice, PhD thesis of Darmstadt. [7] Glenn Durfee, PhD thesis “Cryptanalysis Of RSA Using Algebraic And Lattice Methods”, June 2002, Stanford University. [8] Sharbani Bhattacharya , “Data Security :Issue in Cloud Computing for e-Learning” , Published in University School of Management
Studies ,Guru Govind Singh Indraprastha University in National Conference on Information Management 20th March 2010 on. Conference proceedings & Book in “ Information Management in Knowledge Economy” named “ by MacMillan Publishers Page 165.
[9] Xinyuan Wang, “Robust Correlation of Encrypted Attack Traffic Through Stepping Stones By Watermarking The Interpacket Timing”, Dept. of Computer Science, North Carolina State University Raleigh, NC 27695ACM No. 3543246 Douglas S. Reeves (Advisor) Dept. of Computer Science ,North Carolina State University,Raleigh, NC 27695
[10] J. C. Kelkboom, Jeroen Breebaart, Member, Ileana Buhan, and Raymond N. J.Veldhuis “ Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources” IEEE Transaction On Information Forensic and Security, Vol. 7, No. 4, August 2012 Page No. 122Emile
[11] Harvey Cohn , “Advanced Number Theory”, ,Distinguished Professor, City University New York. [12]Rethinking Public Key Infrastructures and Digital Certificates, Rethinking Public Key Infrastructures and Digital Certificates, MIT Press [13] A. Menezes, P. van Oorschot, and S. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1996. [14]Lecture Notes on Advanced Cryptography, MIT [15] William Duke Yuri Tschinkel ,Editors , “Clay Mathematics Institute A Tribute to Gauss and Dirichlet” ,Clay Mathematics Proceedings,Volume 7
American Mathematical Society. [16]Elementary Number Theory: Primes, Congruences, and Secrets William Stein November 16, 2011 [17]An Introduction to Cryptography, Copyright © 1990-1999 Network Associates, Inc. and its Affiliated Companies. [18] Benny Pinkas, “Cryptographic techniques for privacy preserving data mining”, HP Labs ,benny.pinkas@hp.com [19] W. Edwin Clark , Elementary Number Theory A revision by Jim Hefferon, St Michael’s College, 2003-Dec of notes, University of South Florida,
2002-Dec. [20]Classical Encryption Techniques Lecture Notes on “Computer and Network Security” by Avi Kak (kak@purdue.edu)January 19, 2012 Avinash Kak, Purdue University. [21] Discrete Mathematics, Lecture Notes, Yale University, Spring 1999 ,L. Lov´asz and K. Vesztergombi [22]Number Theory ,Naoki Sato sato@artofproblemsolving.com [23] Sharbani Bhattacharya , “Additive Watermarking in Optimized Digital Image in IEEE Beacon,IEEE (Delhi Section) publication in March 2012
Volume 31 No.1 ,page 79 www.ieeebeacon.com.
Thankyou
top related