Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

PDF

Turkish Journal of Electrical Engineering and Computer Sciences

2019

Authentication

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Formally Analyzed M-Coupon Protocol With Confirmation Code (Mcwcc), Keri̇m Yildirim, Gökhan Dalkiliç, Nevci̇han Duru Jan 2019

Formally Analyzed M-Coupon Protocol With Confirmation Code (Mcwcc), Keri̇m Yildirim, Gökhan Dalkiliç, Nevci̇han Duru

Turkish Journal of Electrical Engineering and Computer Sciences

There are many marketing methods used to attract customers' attention and customers search for special discounts and conduct research to get products cheaper. Using discount coupons is one of the widely used methods for obtaining discounts. With the development of technology, classical paper-based discount coupons become e-coupons and then turn into mobile coupons (m-coupons). It is inevitable that retailers will use m-coupon technology to attract customers while mobile devices are used in daily life. As a result, m-coupon technology is a promising technology. One of the significant problems with using m-coupons is security. Here it is necessary to ensure the …


Invisible Watermarking Framework That Authenticates And Prevents The Visualization Of Anaglyph Images For Copyright Protection, David-Octavio Muñoz-Ramirez, Volodymyr Ponomaryov, Rogelio Reyes-Reyes, Clara Cruz-Ramos, Beatriz-Paulina Garcia-Salgado Jan 2019

Invisible Watermarking Framework That Authenticates And Prevents The Visualization Of Anaglyph Images For Copyright Protection, David-Octavio Muñoz-Ramirez, Volodymyr Ponomaryov, Rogelio Reyes-Reyes, Clara Cruz-Ramos, Beatriz-Paulina Garcia-Salgado

Turkish Journal of Electrical Engineering and Computer Sciences

In this work, a watermarking framework to authenticate and protect the copyright that prevents the visualization of nonauthorized anaglyph images is proposed. Designed scheme embeds a binary watermark and the Blue channel of the anaglyph image into the discrete cosine transform domain of the original image. The proposed method applies the quantization index modulation-dither modulation algorithm and a combination of Bose-Chaudhuri-Hocquenghem with repetition codes, which permit to increase the capability in recovering the watermark. Additionally, Hash algorithm is used to scramble the component where the watermark should be embedding, guaranteeing a higher security performance of the scheme. This new technique …