Proposed Secure Mechanism for Identification of Ownership of Undressed Photographs or Movies captured Using Camera Based Mobile Phones

被引:0
作者
Patel, Samir B. [1 ]
Pradhan, Shrikant N. [2 ]
机构
[1] AES Inst Comp Studies, HL Coll Campus,PB 4206, Ahmadabad 380009, Gujarat, India
[2] Nirma Univ, Dept Comp Sci & Engn, Nirma Inst Sci & Technol, Ahmadabad, Gujarat, India
来源
JOURNAL OF INFORMATION ASSURANCE AND SECURITY | 2007年 / 2卷 / 04期
关键词
Steganography; DCT; LSB; Digital Watermarking;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cameras attached to mobile phones are becoming more and more common, and as we move towards 3G and Next Generation Networks, it has become more a standard feature of mobile phones. Over recent months there have been a few grandiose claims within the media about the potential misuse of phones with camera capability. Unfortunately some of these claims are not proved by available facts resulting into confusion and misunderstanding. It may suffice to say that some digital cameras are smaller, convenient and technology superior in image quality. This makes them easier to use in an unacceptable manner. Camera phones are designed to provide a means of transferring images via your mobile phone to complement voice or text based communication for business or personal reasons. Normally the youth gets attracted towards the sexual photography and watching movies on the mobile devices. Some times such movies get broadcast on the network like wild fire and it is available to all the community. It is indeed a difficult task to identify the user who has captured these photographs or movies and made it public. This paper focuses on a technique through which this problem can be solved. This technique, if implemented, on a mobile phone can really help the concerned authority to identify the culprits.
引用
收藏
页码:297 / 302
页数:6
相关论文
共 29 条
[1]  
ACKEN JM, 1998, COMMUN ACM, V41, P75
[2]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[3]  
ANDERSON RJ, 1996, LECT NOTES COMPUTER, V1174
[4]   Secure delivery of images over open networks [J].
Augot, D ;
Boucqueau, JM ;
Delaigle, JF ;
Fontaine, C ;
Goray, E .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1251-1266
[5]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[6]   Digital watermarking: From concepts to real-time video applications [J].
Busch, C ;
Funk, W ;
Wolthusen, S .
IEEE COMPUTER GRAPHICS AND APPLICATIONS, 1999, 19 (01) :25-35
[7]  
Cachin C., 1998, LECT NOTES CS, V1525
[8]  
Craver S., 1998, LECT NOTES COMP SC, V1525
[9]  
CRAVER S, 1998, COMMUN ACM, V41, P45, DOI DOI 10.1145/278476.278486
[10]  
Franz E., 1996, LECT NOTES COMPUTER, V1174