+ All Categories
Home > Engineering > Sharbani bhattacharya gyanodya 2014

Sharbani bhattacharya gyanodya 2014

Date post: 13-Apr-2017
Category:
Upload: sharbani-bhattacharya
View: 258 times
Download: 3 times
Share this document with a friend
32
SHARBANI BHATTACHARYA Fuzzy Logic in Watermarking System Gyanodaya 2014 IEC-College of Engineering & Technology, Greater Noida 29 th March 2014
Transcript
Page 1: Sharbani bhattacharya gyanodya 2014

SHARBANI BHATTACHARYA

Fuzzy Logic in Watermarking System

Gyanodaya 2014IEC-College of Engineering & Technology, Greater Noida29th March 2014

Page 2: Sharbani bhattacharya gyanodya 2014

WATERMARK AND NATURAL CALAMITY The natural calamity and disaster

management are often predicted by pictures taken from satellite from space shuttle.

Terrorist can tamper the image and can given altogether different image which depicts different view.

So, image is required to be watermarked properly to be used for any kind of judgement..

Page 3: Sharbani bhattacharya gyanodya 2014
Page 4: Sharbani bhattacharya gyanodya 2014
Page 5: Sharbani bhattacharya gyanodya 2014
Page 6: Sharbani bhattacharya gyanodya 2014
Page 7: Sharbani bhattacharya gyanodya 2014
Page 8: Sharbani bhattacharya gyanodya 2014
Page 9: Sharbani bhattacharya gyanodya 2014

WATERMARKING

Watermarking is a method of authentication of an image. It is used for copyright of the digital contents.

Page 10: Sharbani bhattacharya gyanodya 2014

Watermarking text

Page 11: Sharbani bhattacharya gyanodya 2014

ENCRYPTION

Cryptography is art of converting an message into cipher text and sent to the destination. The authorized person can decipher the text and retrieve the original message.

Page 12: Sharbani bhattacharya gyanodya 2014

FUZZY LOGIC

It is logic developed by Loft Zadeh in 1965 at University of California. It is the logic with which unprecise data can be captured to form a set.

Page 13: Sharbani bhattacharya gyanodya 2014

FUZZIFICATION

Fuzzy set are acquired from Crisp Set using membership function. This process is known as fuzzification.

Page 14: Sharbani bhattacharya gyanodya 2014

DEFUZZIFICATION

Converting Fuzzy set to Crisp set .

Page 15: Sharbani bhattacharya gyanodya 2014

FUZZY SET & WATERMARKING SYSTEM This fuzzy sets are then used to design

the front-end of the Watermarking System.

Page 16: Sharbani bhattacharya gyanodya 2014

WATERMARKING CRITERIA Robustness Visual Quality Information Embedding Capacity

Page 17: Sharbani bhattacharya gyanodya 2014

FUZZY SET WATERMARKING CRITERIA

FRobustness is Fuzzy set for Robustness criteria

FVisual Quality for Visual Quality FEmbedding Capacity Information Embedding

Capacity

Page 18: Sharbani bhattacharya gyanodya 2014

Criteria for Watermarking

Factors affecting Watermarking

Fuzzy Sets of Factors

Fuzzy Rule

Design of Front-End

Page 19: Sharbani bhattacharya gyanodya 2014

CRITERIA FOR CHOICE

Front-end architecture of watermarking system with criteria robustness.

Page 20: Sharbani bhattacharya gyanodya 2014

FACTOR EFFECTING ROBUSTNESS1. Visibile (Vis)2. Invisible(NVis)3. Blind(BL)4. Non-Blind(NBL)5. Medical Image(Mimg)6. Non-Medical Image(Nimg)7. Cryptography (Cryp)8. Non-Crypotographic (Ncryp)9. RSA Algo used(RSA)10. DES Algo used (DES)11. AES Algo used (AES)12. New Algo used (Jnew)13. Watermarking Method using Fuzzy logic(WMF)14. Watermarking Method using Genetic Algorithm(WMGA)15. Watermarking Method using Fuzzy-Genetic algo(WMFGA)16. Fuzzy set for Robust Watermarking Scheme I17. Fuzzy set for Semi Fragile Watermarking Scheme (SFr)18. Fuzzy set for Fragile Watermarking Scheme (Fr)19. Fuzzy set for Watermarking Method(WM)20. Fuzzy set for Robustness (FRobustness)

Page 21: Sharbani bhattacharya gyanodya 2014

STEPS FOR WATERMARKING SYSTEM DESIGN Taking all the factors on which robustness of

watermarking scheme depends as crisp set. This crisp set is converted to fuzzy sets. This fuzzy sets are then used to design the front-

end of the Watermarking System. Converting crisp set to fuzzy set is called

fuzzification. These, fuzzy set elements are then put to their

respective places and positions in the user-friendly front-end according to their membership functions.

Page 22: Sharbani bhattacharya gyanodya 2014

FUZZY SETS OF WATERMARKING SYSTEM We are defining the following fuzzy sets. FRobustness =[ (R,0.8), (Fr, 0.2), (SFr,0.4)] WM =[ (WMF, 0.5) , (WMGA, 0.4),( WMFGA,0.8)] FCryp = [ (RSA,0.8) , (DES,0.6),(AES,0.4), (Jnew,0.2)]   Fr=[ (Vis,0.8) , (BL,0.9), (Ncryp,0.9)] SFr=[ (Vis,0.4),(BL,0.6), (Cryp,0.6)] R=[(NBL,0.8) , (Cryp,0.8) ,(Nvis,0.9) ,(WM,0.4)]

Page 23: Sharbani bhattacharya gyanodya 2014

ROBUSTNESS

FRobustness.This opens a Frame having three tabs

Robust Semi Fragile Fragile.

Page 24: Sharbani bhattacharya gyanodya 2014

ROBUST TAB HAS

1. Invisibility2.Cryptography3.Non-Blind 4.Watermarking method i.e. -Fuzzy or GA or Fuzzy-Genetic etc.

Page 25: Sharbani bhattacharya gyanodya 2014
Page 26: Sharbani bhattacharya gyanodya 2014

FRONT-END ARCHITECTURE

Using fuzzy sets in front-end architecture can give more user-friendly interface. The user can see the values of each factors in percentage. This is defuzzification of fuzzy set into crisp set.

Page 27: Sharbani bhattacharya gyanodya 2014

FRONT-END ARCHITECTURE

The architecture is designed on the fuzzy rules and user can understand the impact of the changes with its effects of factors in percentage given in the text box below a drop down box.

Page 28: Sharbani bhattacharya gyanodya 2014

CONCLUSION

The above method is applicable to all kind of software architecture. As the complexity increases the fuzzy rules can make design easier.

Page 29: Sharbani bhattacharya gyanodya 2014

BENEFIT

The benefit is it makes more user friendly front-end.

Page 30: Sharbani bhattacharya gyanodya 2014

DRAWBACKS

Drawback is if membership function is not properly judged it can be cumbersome. User can be dismayed by its complicacy.

Page 31: Sharbani bhattacharya gyanodya 2014

REFERENCES [1] Lecture Notes on Cryptography Shafi Goldwasser1 Mihir Bellare2, July 2008 [2]Answare, ETIK, ELTE Jedlik Ányos Program RFID research project “Cryptographic Techniques for Physical Security” (Seminar Notes) Author:

Daniel A. Nagy ELTECRYPT Research Group Supported by the National Office for Research and Technology (NKTH) in the framework of Jedlik Ányos Program with number of tender NKFP2-00027/2005.

[3] Whitefiled Diffie and Martin E. Hellman,“Multiuser Cryptographic Techniques*” ,Stanford University Stanford, California [4] Alina Mihaela Oprea ,“Efficient Cryptographic Techniques for Securing Storage Systems” CMU-CS-07-119April 2007, PhD thesis, School of

Computer Science Carnegie Mellon University ,Pittsburgh, PA 15213. [5] Kenneth W. Dam and Herbert S. Lin “Cryptography's Role in Securing the Information Society”, Editors, Committee to Study National

Cryptography Policy, National Research Council. [6] Public-Key Cryptography Theory and Practice, PhD thesis of Darmstadt. [7] Glenn Durfee, PhD thesis “Cryptanalysis Of RSA Using Algebraic And Lattice Methods”, June 2002, Stanford University. [8] Sharbani Bhattacharya , “Data Security :Issue in Cloud Computing for e-Learning” , Published in University School of Management

Studies ,Guru Govind Singh Indraprastha University in National Conference on Information Management 20th March 2010 on. Conference proceedings & Book in “ Information Management in Knowledge Economy” named “ by MacMillan Publishers Page 165.

[9] Xinyuan Wang, “Robust Correlation of Encrypted Attack Traffic Through Stepping Stones By Watermarking The Interpacket Timing”, Dept. of Computer Science, North Carolina State University Raleigh, NC 27695ACM No. 3543246 Douglas S. Reeves (Advisor) Dept. of Computer Science ,North Carolina State University,Raleigh, NC 27695

[10] J. C. Kelkboom, Jeroen Breebaart, Member, Ileana Buhan, and Raymond N. J.Veldhuis “ Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources” IEEE Transaction On Information Forensic and Security, Vol. 7, No. 4, August 2012 Page No. 122Emile

[11] Harvey Cohn , “Advanced Number Theory”, ,Distinguished Professor, City University New York. [12]Rethinking Public Key Infrastructures and Digital Certificates, Rethinking Public Key Infrastructures and Digital Certificates, MIT Press [13] A. Menezes, P. van Oorschot, and S. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1996. [14]Lecture Notes on Advanced Cryptography, MIT [15] William Duke Yuri Tschinkel ,Editors , “Clay Mathematics Institute A Tribute to Gauss and Dirichlet” ,Clay Mathematics Proceedings,Volume 7

American Mathematical Society. [16]Elementary Number Theory: Primes, Congruences, and Secrets William Stein November 16, 2011 [17]An Introduction to Cryptography, Copyright © 1990-1999 Network Associates, Inc. and its Affiliated Companies. [18] Benny Pinkas, “Cryptographic techniques for privacy preserving data mining”, HP Labs ,[email protected] [19] W. Edwin Clark , Elementary Number Theory A revision by Jim Hefferon, St Michael’s College, 2003-Dec of notes, University of South Florida,

2002-Dec. [20]Classical Encryption Techniques Lecture Notes on “Computer and Network Security” by Avi Kak ([email protected])January 19, 2012 Avinash Kak, Purdue University. [21] Discrete Mathematics, Lecture Notes, Yale University, Spring 1999 ,L. Lov´asz and K. Vesztergombi [22]Number Theory ,Naoki Sato [email protected] [23] Sharbani Bhattacharya , “Additive Watermarking in Optimized Digital Image in IEEE Beacon,IEEE (Delhi Section) publication in March 2012

Volume 31 No.1 ,page 79 www.ieeebeacon.com.

Page 32: Sharbani bhattacharya gyanodya 2014

Thankyou


Recommended