Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (3)
- Digital Communications and Networking (3)
- Applied Mathematics (2)
- Computer Sciences (2)
- Electrical and Computer Engineering (2)
-
- Physical Sciences and Mathematics (2)
- Communication (1)
- Communication Technology and New Media (1)
- Databases and Information Systems (1)
- Numerical Analysis and Computation (1)
- Other Applied Mathematics (1)
- Signal Processing (1)
- Social and Behavioral Sciences (1)
- Software Engineering (1)
- Systems and Communications (1)
- Publication
Articles 1 - 4 of 4
Full-Text Articles in Engineering
E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle
E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle
Conference papers
We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then ‘embedded’ in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is accomplished by: (i) extracting the binary image from the host image; (ii) correlating the result with the original cipher. In principle, any cipher generator can be used for this purpose and the method has been …
Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle
Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle
Conference papers
This paper discusses a new approach to ‘watermarking’ digital signals using linear frequency modulated or ‘chirp’ coding. The principles underlying this approach are based on the use of a matched filter to provide a reconstruction of a chirped code that is uniquely robust in the case of signals with very low signal-to-noise ratios. Chirp coding for authenticating data is generic in the sense that it can be used for a range of data types and applications (the authentication of speech and audio signals, for example). The theoretical and computational aspects of the matched filter and the properties of a chirp …
A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy
A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy
Articles
A principal weakness of all encryption systems is that the output data can be ‘seen’ to be encrypted. In other words, encrypted data provides a ‘flag’ on the potential value of the information that has been encrypted. In this paper, we provide a new approach to ‘hiding’ encrypted data in a digital image.
In conventional (symmetric) encryption, the plaintext is usually represented as a binary stream and encrypted using an XOR type operation with a binary cipher. The algorithm used is ideally designed to: (i) generate a maximum entropy cipher so that there is no bias with regard to any …
Audio Data Verification And Authentication Using Frequency Modulation Based Watermarking, Jonathan Blackledge, Omar Farooq
Audio Data Verification And Authentication Using Frequency Modulation Based Watermarking, Jonathan Blackledge, Omar Farooq
Articles
An approach to watermarking digital signals using frequency modulation - ‘Chirp Coding’ - is considered. The principles underlying this approach are based on the use of a matched filter to reconstruct a ‘chirp stream’ code that is uniquely robust. The method is generic in the sense that it can, in principle, be used for a variety of different signal (the authentication of speech and biomedical signals, for example). Further, by generating a bit stream that is signal dependent, chirp coding provides a method of self-authentication, which has a wide range of applications including copyright protection and digital rights management. However, …