WO2020095118A1 - Method and system to prevent illegal use of data - Google Patents

Method and system to prevent illegal use of data Download PDF

Info

Publication number
WO2020095118A1
WO2020095118A1 PCT/IB2019/050876 IB2019050876W WO2020095118A1 WO 2020095118 A1 WO2020095118 A1 WO 2020095118A1 IB 2019050876 W IB2019050876 W IB 2019050876W WO 2020095118 A1 WO2020095118 A1 WO 2020095118A1
Authority
WO
WIPO (PCT)
Prior art keywords
share
image
encoding pattern
code
component
Prior art date
Application number
PCT/IB2019/050876
Other languages
French (fr)
Inventor
Sheshang D. DEGADWALA
Dhairya VYAS
Arpana MAHAJAN
Original Assignee
Degadwala Sheshang D
Vyas Dhairya
Mahajan Arpana
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Degadwala Sheshang D, Vyas Dhairya, Mahajan Arpana filed Critical Degadwala Sheshang D
Publication of WO2020095118A1 publication Critical patent/WO2020095118A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1063Personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0064Geometric transfor invariant watermarking, e.g. affine transform invariant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition
    • G06V30/22Character recognition characterised by the type of writing
    • G06V30/224Character recognition characterised by the type of writing of printed characters having additional code marks or containing code marks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0064Image watermarking for copy protection or copy management, e.g. CGMS, copy only once, one-time copy

Definitions

  • the present disclosure relates generally to wireless technology and in particularly relates to A method for remotely charging of an appliance using kinetic energy.
  • the visible electronic watermark data is made visually perceptible by synthesizing a special word or code for an image. Although such insertion of the visible electronic watermark data may cause deterioration of an image quality, it may visually evoke prevention of an illegal diversion to users of the digital images.
  • the invisible electronic watermark data As the electronic watermark data is embedded into an image with care not to cause the image quality to be deteriorated, there is hardly any deterioration of the image quality originated from insertion of the electronic watermark data, so that the electronic watermark data embedded is visually imperceptible. If information capable of identifying an author is embedded into the image as this electronic watermark data, the author can be discriminated by detecting this electronic watermark data, even after an illegal copy has been performed.
  • a system to prevent illegal use of data includes a receiving unit 102 for receiving a user name entered by a user; a first processing unit 104 for: generating text format of said user name; converting said text format to QR-code using zxing library; converting the QR-code in to the share using Binary Visual cryptography; generating share-2 and saving in a database for future reference at receiver side and embedding share- 1 into the R-Component LL bit using of block DWT-SVD and Pseudo Zernike moment; adding G, B Component in embedded image; and a transmitting unit 106 for transferring colored watermark image from a network; an ascertaining unit 108 for ascertaining application of RST attacks on the color watermark image and generated attack watermark image; a second processing unit 110 for: recovering said attacks at receiver side; applying Pseudo Zernike moment, surf feature on R- component to extract attacks pixel; recovering scale-angle using affine transformation; a controlling unit 11
  • a method to prevent illegal use of data includes the steps of: receiving (202) a user name entered by a user; generating (204) text format of said user name; converted (206) said text format to QR-code using zxing library; converting (208) the QR-code in to the share using Binary Visual cryptography; generating (210) share-2 and saving in a database for future reference at receiver side and embedding share- 1 into the R- Component LL bit using of block DWT-SVD and Pseudo Zernike moment; adding (212) G, B Component in embedded image; and transferring (214) colored watermark image from a network.
  • the method 200 includes ascertaining application of RST attacks on the color watermark image and generated attack watermark Image; recovering said attacks at the receiver side; applying Pseudo Zernike moment, surf feature on R-component to extract attacks pixel; recovering scale-angle using affine transformation; and combining said share- 1 and another share-2 to get the QR-Code; and decoding final QR-code to get the user name and password.
  • An object of the present invention is to provide a system to do secure transaction which is visual cryptography scheme and, for copyright protection and deal with geometrical attacks the watermarking scheme is used
  • It is an object of the invention is prevent illegal use of data.
  • Figure 1 shows a block diagram for a system to prevent illegal use of data in accordance with an embodiment of the present invention
  • Figure 2 shows a flow chart of a method to prevent illegal use of data in accordance with an embodiment of the present invention by implementing the system illustrated in Figure.1 ;
  • Figure 3 shows a proposed work flow in accordance with an exemplary implementation of the present invention
  • Figure 4 illustrates a typical hardware configuration of a computer system, which is representative of a hardware environment for practicing the present invention.
  • the system 100 includes a receiving unit 102 for receiving a user name entered by a user; a first processing unit 104 for: generating text format of said user name; converting said text format to QR-code using zxing library; converting the QR-code in to the share using Binary Visual cryptography; generating share-2 and saving in a database for future reference at receiver side and embedding share-l into the R-Component LL bit using of block DWT-SVD and Pseudo Zernike moment; adding G, B Component in embedded image; anda transmitting unit 106 for transferring colored watermark image from a network; an ascertaining unit 108 for ascertaining application of RST attacks on the color watermark image and generated attack watermark image; a second processing unit 110 for: recovering said attacks at receiver side; applying Pseudo Zernike moment, surf feature on R-component to extract attacks pixel; recovering scale-angle using affine transformation; a
  • a method 200 to prevent illegal use of data includes the steps of: receiving (202) a user name entered by a user; generating (204) text format of said user name; converted (206) said text format to QR-code using zxing library.
  • Quick Response code is“2-dimension (2D) barcode. It improves the reading speed of 2D-barcodes and contains data for both vertical and horizontal dimensions and that’s why it can contain a significantly greater amount of information.
  • QR code contains information like text, web link, number, and multimedia data and is speed is 20 times faster than that of other 2D symbols.
  • QR code When secrete message embed into QR code, first it encode and then after develop the structure of QR code but it is time consuming, risky, and from QR code cannot get the secret message” directly converting (208) the QR-code in to the share using Binary Visual cryptography; generating (210) share-2 and saving in a database for future reference at receiver side and embedding share- 1 into the R-Component LL bit using of block DWT-SVD and Pseudo Zernike moment; adding (212) G, B Component in embedded image; and transferring (214) colored watermark image from a network.
  • the method 200 includes ascertaining application of RST attacks on the color watermark image and generated attack watermark Image; recovering said attacks at the receiver side; applying Pseudo Zernike moment, surf feature on R-component to extract attacks pixel; recovering scale-angle using affine transformation; and combining said share- 1 and another share-2 to get the QR-Code; and decoding final QR-code to get the user name and password.
  • the method 200 includes applying VCS scheme to generate two shares of QR-Code.
  • VCS is a kind of cryptographic idea that efforts on resolving the problems of distribution the private images. VCS having the capacity to conceal information/data, for example, individual subtle elements is exceptionally fortunate. At the point when the information is covered up inside isolated pictures, it is altogether unrecognizable.
  • a pixel is a littlest component of an advanced picture.“In a 32-bit advanced picture every pixel comprises of 32 bits, which is isolated into four sections, in particular red, green, blue and alpha; each with 8 bits.“Alpha part introduces level of straightforwardness. In the event that each bits of Alpha part are O', then the picture is absolutely straightforward. Human visual framework goes about as an OR work. In the event that two straightforward items are stacked together, then the last heap of articles will be straightforward.
  • said embedding includes:
  • server share is stored in bank database and client share is kept by user.
  • the method 200 further includes applying the watermark technique on client share image for providing authentication and data integrity; and transmitting said client share image on an open communication channel.
  • the method 200 further includes using Singular Value Decomposition discrete wavelet transform based watermarking technique.
  • FIG. 3 shows a proposed work flow in accordance with an exemplary implementation of the present invention.
  • a new technique for secure bank transaction is provided.
  • authenticity and data integrity of the shares using watermark technique is provided.
  • One QR-image is taken as as original image or host image and shares using 2-out-of-2 VC scheme are created.
  • server share is stored in bank database and client share is kept by user. The user will present with client share during all the transactions with bank. After that we apply the watermark technique on that client share image for providing the authentication and data integrity and send it on the open communication channel.
  • QR-Generation As shown in the Figure 3 First select the user name and password. Now using zxing library generating the QR-code. That QR-code is now in invisible form so now one can see the data inside. Further we have Apply VCS scheme to generate two shares of QR-Code.
  • Embedding In this process select the color cover image. Extract the R,G and B component. Now Select R-component and Apply P-Zernike Moment and DWT-SVD transformation and Extract LL-bit. In the LL-Bit embedding the Share-l data. After Invers DWT-SVD transformation to generate R-Embedded Image Now Add Remain G and B Component to Create Color Water Mark Image. Color Watermark Image is transmitted over the Network Different Attackers Apply RST attacks on it.
  • the present system includes:
  • Step 1 Enter ETser name and Password
  • Step 2 Encode to QR-Image
  • Step 3 Apply VCS and Generate 2-Share
  • Step 7 Apply Block DWT + SVD + Pseudo Zernike Moment
  • Step 8 Embedding Share 1 in LL-band,G and B to Generate Watermark image
  • Step 1 Read Attack Watermark Image
  • Step 4 Apply Surf Feature Extraction and Affine Transformation
  • Step 6 Apply Block DWT + SVD
  • Step 7 Extract Sharel from LL-band
  • Step 8 Combine Share 1 and Share 2
  • Step 9 Decode QR-Image
  • Step 10 Recover ETser name and Password
  • the system converts convert username and password into QR- code.
  • the QR-code is further divided into shares that shares are embedding into cover image.
  • multilayer Privacy is provided by the present invention. Now whenever Dual RST attacks apply on Color Cover image between transmission and receiving.
  • the present Privacy Preserving System Recover Attacks Here we have use Block DWT-SVD and Pseudo Zernike Moment with surf feature based watermarking system. Affine transformation is also applied for recover attacks on watermark image. So after extraction the proposed system will increase PSNR value for Recovered Image.
  • the present system provides efficient as well as privacy preserving communication in traditional systems.
  • the computer system 400 can include a set of instructions that can be executed to cause the computer system 400 to perform any one or more of the methods disclosed.
  • the computer system 400 may operate as a standalone device or may be connected, e.g., using a network, to other computer systems or peripheral devices.
  • the computer system 400 may operate in the capacity of a server or as a client user computer in a server-client user network environment, or as a peer computer system in a peer-to-peer (or distributed) network environment.
  • the computer system 400 can also be implemented as or incorporated into various devices, such as a personal computer (PC), a tablet PC, a personal digital assistant (PDA), a mobile device, a palmtop computer, a laptop computer, a desktop computer, a communications device, a wireless telephone, a land-line telephone, a control system, a camera, a scanner, a printer, a personal trusted device, a web appliance, a network router, switch or bridge, or any other machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
  • the term "system” shall also be taken to include any collection of systems or sub-systems that individually or jointly execute a set, or multiple sets, of instructions to perform
  • the computer system 400 may include a processor 402 e.g., a central processing unit (CPU), a graphics processing unit (GPU), or both.
  • the processor 402 may be a component in a variety of systems.
  • the processor may be part of a standard personal computer or a workstation.
  • the processor 402 may be one or more general processors, digital signal processors, application specific integrated circuits, field programmable gate arrays, servers, networks, digital circuits, analog circuits, combinations thereof, or other now known or later developed devices for analysing and processing data.
  • the processor 402 may implement a software program, such as code generated manually (i.e., programmed).
  • the computer system 400 may include a memory 404, such as a memory 404 that can communicate via a bus 408.
  • the memory 404 may be a main memory, a static memory, or a dynamic memory.
  • the memory 404 may include, but is not limited to computer readable storage media such as various types of volatile and non-volatile storage media, including but not limited to random access memory, read-only memory, programmable read-only memory, electrically programmable read-only memory, electrically erasable read-only memory, flash memory, magnetic tape or disk, optical media and the like.
  • the memory 404 includes a cache or random access memory for the processor 402.
  • the memory 404 is separate from the processor 402, such as a cache memory of a processor, the system memory, or other memory.
  • the memory 404 may be an external storage device or database for storing data. Examples include a hard drive, compact disc (“CD”), digital video disc (“DVD”), memory card, memory stick, floppy disc, universal serial bus (“USB”) memory device, or any other device operative to store data.
  • the memory 404 is operable to store instructions executable by the processor 402. The functions, acts or tasks illustrated in the figures or described may be performed by the programmed processor 402 executing the instructions stored in the memory 404.
  • processing strategies may include multiprocessing, multitasking, parallel processing and the like.
  • the computer system 400 may or may not further include a display unit 410, such as a liquid crystal display (LCD), an organic light emitting diode (OLED), a flat panel display, a solid state display, a cathode ray tube (CRT), a projector, a printer or other now known or later developed display device for outputting determined information.
  • the display 410 may act as an interface for the user to see the functioning of the processor 402, or specifically as an interface with the software stored in the memory 404 or in the drive unit 416.
  • the computer system 400 may include an input device 412 configured to allow a user to interact with any of the components of system 400.
  • the input device 412 may be a number pad, a keyboard, or a cursor control device, such as a mouse, or a joystick, touch screen display, remote control or any other device operative to interact with the computer system
  • the computer system 400 may also include a disk or optical drive unit 416.
  • the disk drive unit 616 may include a computer-readable medium 422 in which one or more sets of instructions 424, e.g. software, can be embedded. Further, the instructions 424 may embody one or more of the methods or logic as described. In a particular example, the instructions 424 may reside completely, or at least partially, within the memory 404 or within the processor 402 during execution by the computer system 400.
  • the memory 404 and the processor 402 also may include computer-readable media as discussed above.
  • the present invention contemplates a computer-readable medium that includes instructions 424 or receives and executes instructions 424 responsive to a propagated signal so that a device connected to a network 426 can communicate voice, video, audio, images or any other data over the network 426. Further, the instructions 424 may be transmitted or received over the network 426 via a communication port or interface 420 or using a bus 408.
  • the communication port or interface 420 may be a part of the processor 402 or may be a separate component.
  • the communication port 420 may be created in software or may be a physical connection in hardware.
  • the communication port 420 may be configured to connect with a network 426, external media, the display 410, or any other components in system 400 or combinations thereof.
  • connection with the network 426 may be a physical connection, such as a wired Ethernet connection or may be established wirelessly as discussed later.
  • additional connections with other components of the system 400 may be physical connections or may be established wirelessly.
  • the network 426 may alternatively be directly connected to the bus 408.
  • the network 426 may include wired networks, wireless networks, Ethernet AVB networks, or combinations thereof.
  • the wireless network may be a cellular telephone network, an 802.11, 802.16, 802.20, 802.1Q or WiMax network.
  • the network 426 may be a public network, such as the Internet, a private network, such as an intranet, or combinations thereof, and may utilize a variety of networking protocols now available or later developed including, but not limited to TCP/IP based networking protocols.
  • dedicated hardware implementations such as application specific integrated circuits, programmable logic arrays and other hardware devices, can be constructed to implement various parts of the system 400.
  • Applications that may include the systems can broadly include a variety of electronic and computer systems.
  • One or more examples described may implement functions using two or more specific interconnected hardware modules or devices with related control and data signals that can be communicated between and through the modules, or as portions of an application-specific integrated circuit. Accordingly, the present system encompasses software, firmware, and hardware implementations.
  • the system described may be implemented by software programs executable by a computer system. Further, in a non-limited example, implementations can include distributed processing, component/object distributed processing, and parallel processing. Alternatively, virtual computer system processing can be constructed to implement various parts of the system.
  • the system is not limited to operation with any particular standards and protocols.
  • standards for Internet and other packet switched network transmission e.g., TCP/IP, UDP/IP, HTML, HTTP
  • TCP/IP packet switched network transmission
  • UDP/IP UDP/IP
  • HTML HyperText Markup Language
  • HTTP HyperText Transfer Protocol

Abstract

The present invention provides a system to prevent illegal use of data. The system includes a receiving unit 102 for receiving a user name entered by a user; a first processing unit 104 for: generating text format of said user name; converting said text format to QR-code; converting the QR-code in to a first share using Binary Visual cryptography; generating a second share and saving in a database for future reference at receiver side and embedding share-1 into the R-Component LL bit; adding G, B Component in embedded image; and a transmitting unit 106 for transferring colored watermark image from a network; an ascertaining unit 108 for ascertaining application of RST attacks on the color watermark image and generated attack watermark image; a second processing unit 110 for: recovering said attacks at receiver side; recovering scale-angle using affine transformation; a controlling unit 112 for combining said first share and another second share to get the QR-Code; and decoding final QR-code to get the user name and password.

Description

Method and System to prevent illegal use of data
FIELD OF THE INVENTION
The present disclosure relates generally to wireless technology and in particularly relates to A method for remotely charging of an appliance using kinetic energy.
BACKGROUND OF THE INVENTION
Over the years, it has become a problem to copy digital images illegally. In order to prevent this illegal copy, it has been considered that digital image data are enciphered and only reproduction systems with a lawful cipher deciphering key can reproduce the enciphered digital image data. However, once the cipher is deciphered, this system can not prevent subsequent copies. Therefore, in order to prevent an illegal use and copy of digital images, a method has been considered where special information (this information is referred to as electronic watermark data as described below) is embedded into the digital images themselves. As for such electronic watermark data for digital images, two kinds of data, such as visible and invisible electronic watermark data, are conceivable.
The visible electronic watermark data is made visually perceptible by synthesizing a special word or code for an image. Although such insertion of the visible electronic watermark data may cause deterioration of an image quality, it may visually evoke prevention of an illegal diversion to users of the digital images.
One example of embedment of visible electronic watermark data is disclosed in Japanese Patent Laid-Open Publication No. Hei 8-241403. In this approach, when visible electronic watermark data is synthesized into an original image, the electronic watermark data is synthesized into the original image by changing only a brightness component of pixels corresponding to opaque portions of the electronic watermark data by a scaling value without changing a color component. The scaling value is determined by a color component, a random number, and a value of pixels of the electronic watermark data.
In contrast, in the case of the invisible electronic watermark data, as the electronic watermark data is embedded into an image with care not to cause the image quality to be deteriorated, there is hardly any deterioration of the image quality originated from insertion of the electronic watermark data, so that the electronic watermark data embedded is visually imperceptible. If information capable of identifying an author is embedded into the image as this electronic watermark data, the author can be discriminated by detecting this electronic watermark data, even after an illegal copy has been performed. In addition, if information expressing disapproval of copying is embedded as this electronic watermark data, when a reproduction device detects the copy disapproval information, for example, the reproduction device can inform a user that the image is copy disapproval data or cause a copy prevention mechanism in the reproduction device to activate and restrict copying to a VTR or the like. Therefore there exists a need to provide systems and methods that enable utilize the energy generated through human motion and wirelessly and remotely charge an electronic appliance.
SUMMARY OF THE INVENTION
In an embodiment, a system to prevent illegal use of data is provided. The system includes a receiving unit 102 for receiving a user name entered by a user; a first processing unit 104 for: generating text format of said user name; converting said text format to QR-code using zxing library; converting the QR-code in to the share using Binary Visual cryptography; generating share-2 and saving in a database for future reference at receiver side and embedding share- 1 into the R-Component LL bit using of block DWT-SVD and Pseudo Zernike moment; adding G, B Component in embedded image; and a transmitting unit 106 for transferring colored watermark image from a network; an ascertaining unit 108 for ascertaining application of RST attacks on the color watermark image and generated attack watermark image; a second processing unit 110 for: recovering said attacks at receiver side; applying Pseudo Zernike moment, surf feature on R- component to extract attacks pixel; recovering scale-angle using affine transformation; a controlling unit 112 for combining said share- 1 and another share-2 to get the QR-Code; and decoding final QR-code to get the user name and password.
In another embodiment, a method to prevent illegal use of data is provided. The method includes the steps of: receiving (202) a user name entered by a user; generating (204) text format of said user name; converted (206) said text format to QR-code using zxing library; converting (208) the QR-code in to the share using Binary Visual cryptography; generating (210) share-2 and saving in a database for future reference at receiver side and embedding share- 1 into the R- Component LL bit using of block DWT-SVD and Pseudo Zernike moment; adding (212) G, B Component in embedded image; and transferring (214) colored watermark image from a network.
In another embodiment, the method 200 includes ascertaining application of RST attacks on the color watermark image and generated attack watermark Image; recovering said attacks at the receiver side; applying Pseudo Zernike moment, surf feature on R-component to extract attacks pixel; recovering scale-angle using affine transformation; and combining said share- 1 and another share-2 to get the QR-Code; and decoding final QR-code to get the user name and password.
An object of the present invention is to provide a system to do secure transaction which is visual cryptography scheme and, for copyright protection and deal with geometrical attacks the watermarking scheme is used
It is an object of the invention to provide a secure system that does not require additional computational power keeping in mind the end goal to decode the data.
It is an object of the invention is prevent illegal use of data.
To further clarify advantages and features of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.
BRIEF DESCRIPTION OF FIGURES
These and other features, aspects, and advantages of the present invention will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
Figure 1 shows a block diagram for a system to prevent illegal use of data in accordance with an embodiment of the present invention;
Figure 2 shows a flow chart of a method to prevent illegal use of data in accordance with an embodiment of the present invention by implementing the system illustrated in Figure.1 ;
Figure 3 shows a proposed work flow in accordance with an exemplary implementation of the present invention;
Figure 4 illustrates a typical hardware configuration of a computer system, which is representative of a hardware environment for practicing the present invention.
Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity and may not have been necessarily been drawn to scale. For example, the flow charts illustrate the method in terms of the most prominent steps involved to help to improve understanding of aspects of the present invention. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the drawings by conventional symbols, and the drawings may show only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the drawings with details that will be readily apparent to those of ordinary skill in the art having benefit of the description herein.
DETAILED DESCRIPTION:
For the purpose of promoting an understanding of the principles of the invention, reference will now be made to the embodiment illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended, such alterations and further modifications in the illustrated system, and such further applications of the principles of the invention as illustrated therein being contemplated as would normally occur to one skilled in the art to which the invention relates. It will be understood by those skilled in the art that the foregoing general description and the following detailed description are exemplary and explanatory of the invention and are not intended to be restrictive thereof.
Reference throughout this specification to “an aspect”, “another aspect” or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrase“in an embodiment”,“in another embodiment” and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
The terms "comprises", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such process or method. Similarly, one or more devices or sub-systems or elements or structures or components proceeded by "comprises...a" does not, without more constraints, preclude the existence of other devices or other sub-systems or other elements or other structures or other components or additional devices or additional sub-systems or additional elements or additional structures or additional components.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The system, methods, and examples provided herein are illustrative only and not intended to be limiting.
Embodiments of the present invention will be described below in detail with reference to the accompanying drawings.
Referring to Figure 1, a system 100 to prevent illegal use of data is provided. The system 100 includes a receiving unit 102 for receiving a user name entered by a user; a first processing unit 104 for: generating text format of said user name; converting said text format to QR-code using zxing library; converting the QR-code in to the share using Binary Visual cryptography; generating share-2 and saving in a database for future reference at receiver side and embedding share-l into the R-Component LL bit using of block DWT-SVD and Pseudo Zernike moment; adding G, B Component in embedded image; anda transmitting unit 106 for transferring colored watermark image from a network; an ascertaining unit 108 for ascertaining application of RST attacks on the color watermark image and generated attack watermark image; a second processing unit 110 for: recovering said attacks at receiver side; applying Pseudo Zernike moment, surf feature on R-component to extract attacks pixel; recovering scale-angle using affine transformation; a controlling unit 112 for combining said share- 1 and another share-2 to get the QR-Code; and decoding final QR-code to get the user name and password.
Referring to Figure 2, a method 200 to prevent illegal use of data is provided. The method 200 includes the steps of: receiving (202) a user name entered by a user; generating (204) text format of said user name; converted (206) said text format to QR-code using zxing library. Quick Response code is“2-dimension (2D) barcode. It improves the reading speed of 2D-barcodes and contains data for both vertical and horizontal dimensions and that’s why it can contain a significantly greater amount of information. QR code contains information like text, web link, number, and multimedia data and is speed is 20 times faster than that of other 2D symbols. When secrete message embed into QR code, first it encode and then after develop the structure of QR code but it is time consuming, risky, and from QR code cannot get the secret message” directly converting (208) the QR-code in to the share using Binary Visual cryptography; generating (210) share-2 and saving in a database for future reference at receiver side and embedding share- 1 into the R-Component LL bit using of block DWT-SVD and Pseudo Zernike moment; adding (212) G, B Component in embedded image; and transferring (214) colored watermark image from a network.
In another embodiment, the method 200 includes ascertaining application of RST attacks on the color watermark image and generated attack watermark Image; recovering said attacks at the receiver side; applying Pseudo Zernike moment, surf feature on R-component to extract attacks pixel; recovering scale-angle using affine transformation; and combining said share- 1 and another share-2 to get the QR-Code; and decoding final QR-code to get the user name and password. In another embodiment, the method 200 includes applying VCS scheme to generate two shares of QR-Code. VCS is a kind of cryptographic idea that efforts on resolving the problems of distribution the private images. VCS having the capacity to conceal information/data, for example, individual subtle elements is exceptionally fortunate. At the point when the information is covered up inside isolated pictures, it is altogether unrecognizable. At the point when the shares are partitioned, the information is totally ambiguous. Every picture holds distinctive bits of the information and when they are stacked together, the mystery message can be recuperated effortlessly. Every share relies on upon each other with a specific end goal to get the decoded data. A pixel is a littlest component of an advanced picture.“In a 32-bit advanced picture every pixel comprises of 32 bits, which is isolated into four sections, in particular red, green, blue and alpha; each with 8 bits.“Alpha part introduces level of straightforwardness. In the event that each bits of Alpha part are O', then the picture is absolutely straightforward. Human visual framework goes about as an OR work. In the event that two straightforward items are stacked together, then the last heap of articles will be straightforward. Be that as it may, in the event that one of them is non- straightforward, then the last pile of items will be non-transparent. Like 0 OR 0 = 0, considering 0 as straightforward and, 0 OR 1 =1, 1 OR 0=1, 1 OR 1=1, in view of 1 as non-straightforward.
In another embodiment, said embedding includes:
a. selecting the color cover image;
b. extracting the R,G and B component; and
c. selecting R-component and Applying P-Zernike Moment and DWT-SVD transformation and Extract LL-bit.
In another embodiment, when two shares are created, server share is stored in bank database and client share is kept by user.
In another embodiment, the method 200 further includes applying the watermark technique on client share image for providing authentication and data integrity; and transmitting said client share image on an open communication channel. In another embodiment, the method 200 further includes using Singular Value Decomposition discrete wavelet transform based watermarking technique.
Figure 3 shows a proposed work flow in accordance with an exemplary implementation of the present invention. In the present invention, a new technique for secure bank transaction is provided. In this mechanism, authenticity and data integrity of the shares using watermark technique is provided. One QR-image is taken as as original image or host image and shares using 2-out-of-2 VC scheme are created. When two shares will be created, server share is stored in bank database and client share is kept by user. The user will present with client share during all the transactions with bank. After that we apply the watermark technique on that client share image for providing the authentication and data integrity and send it on the open communication channel.
QR-Generation: As shown in the Figure 3 First select the user name and password. Now using zxing library generating the QR-code. That QR-code is now in invisible form so now one can see the data inside. Further we have Apply VCS scheme to generate two shares of QR-Code.
Embedding: In this process select the color cover image. Extract the R,G and B component. Now Select R-component and Apply P-Zernike Moment and DWT-SVD transformation and Extract LL-bit. In the LL-Bit embedding the Share-l data. After Invers DWT-SVD transformation to generate R-Embedded Image Now Add Remain G and B Component to Create Color Water Mark Image. Color Watermark Image is transmitted over the Network Different Attackers Apply RST attacks on it.
Extraction: After RST attacks getting the Attack Color Image Which is now apply the P- Zernike Moment with Surf Feature Extraction to recover attacks. Now Extracting the share 1 and it will combine with another database share 2 to generate QR-image. QR decoder will decode the Username and Password.
The beauty of our system lies in the fact that, if any attacker makes a copy of any image share to forge it later, the watermark will be distorted so for such forged image share our system will not allow the generation of host image from the stack of 2 image shares. Thus, the attacker will not get the original image.
Here we use Singular Value Decomposition discrete wavelet transform based watermarking technique which is geometrically invariant. This type watermarking scheme is robust against the RST attacks, various JPEG and noise attacks.
The present system includes:
I ENCODER
Step 1 : Enter ETser name and Password
Step 2: Encode to QR-Image
Step 3: Apply VCS and Generate 2-Share
Step 4: Share 2 is Save in Database
Step 5: Select Color Cover Image
Step 6: Extract R-Component
Step 7: Apply Block DWT + SVD + Pseudo Zernike Moment
Step 8: Embedding Share 1 in LL-band,G and B to Generate Watermark image
NETWORK
Apply Rotation, Scale and Translation on Watermark Image
DECODER
Step 1 : Read Attack Watermark Image
Step 2: Extract R-Component
Step 3: Apply Pseudo Zernike Moment
Step 4: Apply Surf Feature Extraction and Affine Transformation
Step 5: Recover Rotation, Scale and translation Attacks
Step 6: Apply Block DWT + SVD
Step 7: Extract Sharel from LL-band
Step 8: Combine Share 1 and Share 2
Step 9: Decode QR-Image
Step 10: Recover ETser name and Password
In the present invention, the system converts convert username and password into QR- code. The QR-code is further divided into shares that shares are embedding into cover image. So multilayer Privacy is provided by the present invention. Now whenever Dual RST attacks apply on Color Cover image between transmission and receiving. The present Privacy Preserving System Recover Attacks. Here we have use Block DWT-SVD and Pseudo Zernike Moment with surf feature based watermarking system. Affine transformation is also applied for recover attacks on watermark image. So after extraction the proposed system will increase PSNR value for Recovered Image. The present system provides efficient as well as privacy preserving communication in traditional systems.
Referring to Figure 4, a typical hardware configuration of a computer system, which is representative of a hardware environment for practicing the present invention, is illustrated. The computer system 400 can include a set of instructions that can be executed to cause the computer system 400 to perform any one or more of the methods disclosed. The computer system 400 may operate as a standalone device or may be connected, e.g., using a network, to other computer systems or peripheral devices.
In a networked deployment, the computer system 400 may operate in the capacity of a server or as a client user computer in a server-client user network environment, or as a peer computer system in a peer-to-peer (or distributed) network environment. The computer system 400 can also be implemented as or incorporated into various devices, such as a personal computer (PC), a tablet PC, a personal digital assistant (PDA), a mobile device, a palmtop computer, a laptop computer, a desktop computer, a communications device, a wireless telephone, a land-line telephone, a control system, a camera, a scanner, a printer, a personal trusted device, a web appliance, a network router, switch or bridge, or any other machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. Further, while a single computer system 400 is illustrated, the term "system" shall also be taken to include any collection of systems or sub-systems that individually or jointly execute a set, or multiple sets, of instructions to perform one or more computer functions.
The computer system 400 may include a processor 402 e.g., a central processing unit (CPU), a graphics processing unit (GPU), or both. The processor 402 may be a component in a variety of systems. For example, the processor may be part of a standard personal computer or a workstation. The processor 402 may be one or more general processors, digital signal processors, application specific integrated circuits, field programmable gate arrays, servers, networks, digital circuits, analog circuits, combinations thereof, or other now known or later developed devices for analysing and processing data. The processor 402 may implement a software program, such as code generated manually (i.e., programmed).
The computer system 400 may include a memory 404, such as a memory 404 that can communicate via a bus 408. The memory 404 may be a main memory, a static memory, or a dynamic memory. The memory 404 may include, but is not limited to computer readable storage media such as various types of volatile and non-volatile storage media, including but not limited to random access memory, read-only memory, programmable read-only memory, electrically programmable read-only memory, electrically erasable read-only memory, flash memory, magnetic tape or disk, optical media and the like. In one example, the memory 404 includes a cache or random access memory for the processor 402. In alternative examples, the memory 404 is separate from the processor 402, such as a cache memory of a processor, the system memory, or other memory. The memory 404 may be an external storage device or database for storing data. Examples include a hard drive, compact disc ("CD"), digital video disc ("DVD"), memory card, memory stick, floppy disc, universal serial bus ("USB") memory device, or any other device operative to store data. The memory 404 is operable to store instructions executable by the processor 402. The functions, acts or tasks illustrated in the figures or described may be performed by the programmed processor 402 executing the instructions stored in the memory 404. The functions, acts or tasks are independent of the particular type of instructions set, storage media, processor or processing strategy and may be performed by software, hardware, integrated circuits, firm-ware, micro-code and the like, operating alone or in combination. Likewise, processing strategies may include multiprocessing, multitasking, parallel processing and the like.
As shown, the computer system 400 may or may not further include a display unit 410, such as a liquid crystal display (LCD), an organic light emitting diode (OLED), a flat panel display, a solid state display, a cathode ray tube (CRT), a projector, a printer or other now known or later developed display device for outputting determined information. The display 410 may act as an interface for the user to see the functioning of the processor 402, or specifically as an interface with the software stored in the memory 404 or in the drive unit 416. Additionally, the computer system 400 may include an input device 412 configured to allow a user to interact with any of the components of system 400. The input device 412 may be a number pad, a keyboard, or a cursor control device, such as a mouse, or a joystick, touch screen display, remote control or any other device operative to interact with the computer system
400.
The computer system 400 may also include a disk or optical drive unit 416. The disk drive unit 616 may include a computer-readable medium 422 in which one or more sets of instructions 424, e.g. software, can be embedded. Further, the instructions 424 may embody one or more of the methods or logic as described. In a particular example, the instructions 424 may reside completely, or at least partially, within the memory 404 or within the processor 402 during execution by the computer system 400. The memory 404 and the processor 402 also may include computer-readable media as discussed above.
The present invention contemplates a computer-readable medium that includes instructions 424 or receives and executes instructions 424 responsive to a propagated signal so that a device connected to a network 426 can communicate voice, video, audio, images or any other data over the network 426. Further, the instructions 424 may be transmitted or received over the network 426 via a communication port or interface 420 or using a bus 408. The communication port or interface 420 may be a part of the processor 402 or may be a separate component. The communication port 420 may be created in software or may be a physical connection in hardware. The communication port 420 may be configured to connect with a network 426, external media, the display 410, or any other components in system 400 or combinations thereof. The connection with the network 426 may be a physical connection, such as a wired Ethernet connection or may be established wirelessly as discussed later. Likewise, the additional connections with other components of the system 400 may be physical connections or may be established wirelessly. The network 426 may alternatively be directly connected to the bus 408.
The network 426 may include wired networks, wireless networks, Ethernet AVB networks, or combinations thereof. The wireless network may be a cellular telephone network, an 802.11, 802.16, 802.20, 802.1Q or WiMax network. Further, the network 426 may be a public network, such as the Internet, a private network, such as an intranet, or combinations thereof, and may utilize a variety of networking protocols now available or later developed including, but not limited to TCP/IP based networking protocols.
In an alternative example, dedicated hardware implementations, such as application specific integrated circuits, programmable logic arrays and other hardware devices, can be constructed to implement various parts of the system 400.
Applications that may include the systems can broadly include a variety of electronic and computer systems. One or more examples described may implement functions using two or more specific interconnected hardware modules or devices with related control and data signals that can be communicated between and through the modules, or as portions of an application-specific integrated circuit. Accordingly, the present system encompasses software, firmware, and hardware implementations.
The system described may be implemented by software programs executable by a computer system. Further, in a non-limited example, implementations can include distributed processing, component/object distributed processing, and parallel processing. Alternatively, virtual computer system processing can be constructed to implement various parts of the system.
The system is not limited to operation with any particular standards and protocols. For example, standards for Internet and other packet switched network transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) may be used. Such standards are periodically superseded by faster or more efficient equivalents having essentially the same functions. Accordingly, replacement standards and protocols having the same or similar functions as those disclosed are considered equivalents thereof.
The drawings and the forgoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, orders of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts necessarily need to be performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples. Numerous variations, whether explicitly given in the specification or not, such as differences in structure, dimension, and use of material, are possible. The scope of embodiments is at least as broad as given by the following claims.
Benefits, other advantages, and solutions to problems have been described above with regard to specific embodiments. However, the benefits, advantages, solutions to problems, and any component(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential feature or component of any or all the claims.

Claims

We claim:
1. A system to prevent misappropriating data, said system comprising:
a. a receiving unit 102 for receiving a user name entered by a user; b. a first processing unit 104 for:
i. generating a first encoding pattern said user name;
ii. converting said first encoding pattern into a second encoding pattern; iii. converting the second encoding pattern in to a first share using a first type of cryptography;
iv. generating a second share and saving in a database for future reference at receiver side and embedding first share into a R-Component LL bit; and
v. adding G, B Component in an embedded image;
c. a transmitting unit 106 for transferring colored watermark image from a network;
d. an ascertaining unit 108 for ascertaining application of RST attacks on the color watermark image and generated attack watermark image;
e. a second processing unit 110 for:
i. recovering said attacks at receiver side;
ii. recovering scale-angle using affine transformation;
f. a controlling unit 112 for combining said first share and another second share to retrieve the second encoding pattern and; and decoding the retrieved second encoding pattern to extract the user name and password.
2. The system as claimed in claim 1, wherein the first encoding pattern is a textual pattern, the second encoding pattern is a QR code of the first encoding pattern; the first type of cryptography is a Binary Visual cryptography.
3. The system as claimed in claim 2, wherein first processing unit 104 involves DWT- SVD and Pseudo Zernike moment for embedding first share, and wherein first processing unit 104 involves applying Pseudo Zernike moment, surf feature on R- component to extract attacks pixel.
4. A method to prevent misappropriation of data using system as claimed in claim 1, said method comprising:
a. receiving (202) a user name entered by a user;
b. generating (204) a first encoding pattern of said user name , wherein the first encoding pattern is a textual pattern;
c. converting (206) said first encoding pattern into a second encoding pattern; the second encoding pattern is a QR code of the first encoding pattern d. converting (208) the second encoding pattern in to a first share using a first type of cryptography, the first type of cryptography is a Binary Visual cryptography;
e. generating (210) a second share and saving in a database for future reference at receiver side and embedding share- 1 into the R-Component LL bit; f. adding (212) G, B Component in embedded image; and
g. transferring (214) colored watermark image from a network.
5. The method as claimed in claim 4 further comprising:
a. ascertaining application of RST attacks on the color watermark image and generated attack watermark Image;
b. recovering said attacks at the receiver side; and
c. recovering scale-angle using affine transformation, wherein said method includes applying DWT-SVD and Pseudo Zernike moment for embedding first share, and applying Pseudo Zernike moment, surf feature on R- component to extract attacks pixel.
6. The method as claimed in claim 4 further comprising: combining said first share and another second share to get the QR-Code; and decoding final QR-code to get the user name and password.
7. The method as claimed in claim 4 further comprising applying VCS scheme to generate two shares of QR-Code.
8. The method as claimed in claim 4, wherein said embedding includes:
a. selecting the color cover image;
b. extracting the R,G and B component; and
c. selecting R-component and Applying P-Zernike Moment and DWT-SVD transformation and Extract LL-bit.
9. The method as claimed in claim 4, wherein when two shares are created, server share is stored in bank database and client share is kept by user.
10. The method as claimed in claim 4 further comprising applying the watermark technique on client share image for providing authentication and data integrity; and transmitting said client share image on an open communication channel;using Singular Value Decomposition discrete wavelet transform based watermarking technique.
PCT/IB2019/050876 2018-11-10 2019-02-04 Method and system to prevent illegal use of data WO2020095118A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN201821042313 2018-11-10
IN201821042313 2018-11-10

Publications (1)

Publication Number Publication Date
WO2020095118A1 true WO2020095118A1 (en) 2020-05-14

Family

ID=70611353

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2019/050876 WO2020095118A1 (en) 2018-11-10 2019-02-04 Method and system to prevent illegal use of data

Country Status (1)

Country Link
WO (1) WO2020095118A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101303717A (en) * 1995-02-13 2008-11-12 英特特拉斯特技术公司 Systems and methods for secure transaction management and electronic rights protection
US20170346851A1 (en) * 2016-05-30 2017-11-30 Christopher Nathan Tyrwhitt Drake Mutual authentication security system with detection and mitigation of active man-in-the-middle browser attacks, phishing, and malware and other security improvements.

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101303717A (en) * 1995-02-13 2008-11-12 英特特拉斯特技术公司 Systems and methods for secure transaction management and electronic rights protection
US20170346851A1 (en) * 2016-05-30 2017-11-30 Christopher Nathan Tyrwhitt Drake Mutual authentication security system with detection and mitigation of active man-in-the-middle browser attacks, phishing, and malware and other security improvements.

Similar Documents

Publication Publication Date Title
Nyeem et al. Digital image watermarking: its formal model, fundamental properties and possible attacks
Wu et al. Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification
Huang et al. High-capacity reversible data hiding in encrypted image based on specific encryption process
TW522722B (en) Method of integrating a watermark into a compressed image
Wang et al. A majority-voting based watermarking scheme for color image tamper detection and recovery
Abikoye et al. Efficient data hiding system using cryptography and steganography
US20060045309A1 (en) Systems and methods for digital content security
US7454797B2 (en) Secure image authentication with discrete level tamper localization
Wei et al. A technique for sharing a digital image
Neamah et al. Hide text depending on the three channels of pixels in color images using the modified LSB algorithm
Ye et al. Noise-free thumbnail-preserving image encryption based on MSB prediction
Li et al. A novel image-hiding scheme based on block difference
Basahel et al. Enhancing security of transmitted data by improved steganography method
Tarun et al. Digital video steganography using LSB technique
Rasmi et al. A comprehensive review of digital data hiding techniques
Alam et al. An investigation into encrypted message hiding through images using LSB
Chowdhuri et al. Improved data hiding capacity through repeated embedding using modified weighted matrix for color image
WO2020095118A1 (en) Method and system to prevent illegal use of data
Pavithra et al. Web service deployment for selecting a right steganography scheme for optimizing both the capacity and the detectable distortion
Kuo et al. Secure multi-group data hiding based on gemd map
Rao et al. A novel information security scheme using cryptic steganography
Raj et al. A survey on reversible data hiding in encrypted image
Das et al. Visual Cryptography for Colour Image Using Symmetric Key
Siddiqui et al. A Survey On Image Steganography Using Lsb Substitution
AU2021107010A4 (en) A method for an image steganography with an rsa encryption

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19881330

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19881330

Country of ref document: EP

Kind code of ref document: A1