scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Smart security and securing data through watermarking

TL;DR: A contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up.
Abstract: The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.
References
More filters
Proceedings ArticleDOI
07 Jul 2015
TL;DR: The design and implementation of a low-cost system monitoring based on Raspberry Pi, a single board computer which follows Motion Detection algorithm written in Python as a default programming environment, to significantly decrease storage usage and save investment costs are described.
Abstract: Nowadays, the Closed-Circuit Television (CCTV) surveillance system is being utilized in order to keep peace and provide security to people. There are several defects in the video surveillance system, such as: picture is indistinct, anomalies cannot be identified automatically, a lot of storage spaces are needed to save the surveillance information, and prices remain relatively high. This paper describes the design and implementation of a low-cost system monitoring based on Raspberry Pi, a single board computer which follows Motion Detection algorithm written in Python as a default programming environment. In addition, the system uses the motion detection algorithm to significantly decrease storage usage and save investment costs. The algorithm for motion detection is being implemented on Raspberry Pi, which enables live streaming camera along with detection of motion. The live video camera can be viewed from any web browser, even from mobile in real-time.

62 citations

Journal ArticleDOI
TL;DR: Experimental results reveal that the proposed watermarking algorithm yields watermarked images with superior imperceptibility and robustness to common attacks, such as JPEG compression, rotation, Gaussian noise, cropping, and median filter.
Abstract: Digital watermarking, which has been proven effective for protecting digital data, has recently gained considerable research interest. This study aims to develop an enhanced technique for producing watermarked images with high invisibility. During extraction, watermarks can be successfully extracted without the need for the original image. We have developed discrete wavelet transform with a Haar filter to embed a binary watermark image in selected coefficient blocks. A probabilistic neural network is used to extract the watermark image. To evaluate the efficiency of the algorithm and the quality of the extracted watermark images, we used widely known image quality function measurements, such as peak signal-to-noise ratio (PSNR) and normalized cross correlation (NCC). Results indicate the excellent invisibility of the extracted watermark image (PSNR=68.27dB), as well as exceptional watermark extraction (NCC=0.9779). Experimental results reveal that the proposed watermarking algorithm yields watermarked images with superior imperceptibility and robustness to common attacks, such as JPEG compression, rotation, Gaussian noise, cropping, and median filter.

61 citations

Journal ArticleDOI
TL;DR: The imperceptibility and robustness of the watermarking approach are proven and showing perfectly the detection of the tamper zones are proven.

24 citations