Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Engineering

E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle Jan 2010

E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle

Conference papers

We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then ‘embedded’ in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is accomplished by: (i) extracting the binary image from the host image; (ii) correlating the result with the original cipher. In principle, any cipher generator can be used for this purpose and the method has been …


Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle Sep 2009

Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle

Conference papers

This paper discusses a new approach to ‘watermarking’ digital signals using linear frequency modulated or ‘chirp’ coding. The principles underlying this approach are based on the use of a matched filter to provide a reconstruction of a chirped code that is uniquely robust in the case of signals with very low signal-to-noise ratios. Chirp coding for authenticating data is generic in the sense that it can be used for a range of data types and applications (the authentication of speech and audio signals, for example). The theoretical and computational aspects of the matched filter and the properties of a chirp …


A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy Jan 2009

A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy

Articles

A principal weakness of all encryption systems is that the output data can be ‘seen’ to be encrypted. In other words, encrypted data provides a ‘flag’ on the potential value of the information that has been encrypted. In this paper, we provide a new approach to ‘hiding’ encrypted data in a digital image.

In conventional (symmetric) encryption, the plaintext is usually represented as a binary stream and encrypted using an XOR type operation with a binary cipher. The algorithm used is ideally designed to: (i) generate a maximum entropy cipher so that there is no bias with regard to any …


Audio Data Verification And Authentication Using Frequency Modulation Based Watermarking, Jonathan Blackledge, Omar Farooq Jan 2008

Audio Data Verification And Authentication Using Frequency Modulation Based Watermarking, Jonathan Blackledge, Omar Farooq

Articles

An approach to watermarking digital signals using frequency modulation - ‘Chirp Coding’ - is considered. The principles underlying this approach are based on the use of a matched filter to reconstruct a ‘chirp stream’ code that is uniquely robust. The method is generic in the sense that it can, in principle, be used for a variety of different signal (the authentication of speech and biomedical signals, for example). Further, by generating a bit stream that is signal dependent, chirp coding provides a method of self-authentication, which has a wide range of applications including copyright protection and digital rights management. However, …