- Browse by Subject
Browsing by Subject "copyright information"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Information Hiding Through Images(Office of the Vice Chancellor for Research, 2014-04-11) Miranda, Jose HIn the age of technology, copyright information is a vital component to organizations or individuals that utilizes the Internet as means of productivity and communication. Unfortunately, this type of information is public and any individual can alter or falsify the information to commit negative actions. This study focuses on developing several techniques to hide messages within gray scale images. Two methods have been developed: hiding every bit of the ASCII representation of each character of the message in a pixel preceding the Most Significant Bit (MSB) of such, and hiding every bit of the ASCII representation of each character of the message in the Least Significant Bit (LSB) of the pixel. The study also focuses on embedding the message in the image as well as successfully retrieving the message. Both of these techniques are in current development and will be analyzed utilizing an image quality tool, Peak Signal-to-Noise Ratio (PSNR) to measure the quality of the altered image in comparison to the original image.Item PROTECTING COPYRIGHT INFORMATION THROUGH INFORMATION HIDING TECHNIQUES(Office of the Vice Chancellor for Research, 2013-04-05) Miranda, Jose HIn the age of technology, copyright information is a vital component to organizations or individuals that utilizes the Internet as means of productivity and communication. Unfortunately, this type of information is public and any individual can alter or falsify the information to commit negative actions. This research project analyzes different information hiding techniques that involves the use of steganography and digital watermarking to embed messages in a digital image without a visual difference and without harming the image. The procedure is to encode the message utilizing a hashing function that will return a location (i, j, k) based on a generated key that will be utilized to provide a collision-free distribution among the image. This technique will result on an image I’ that will be visible publicly, but the embedded message will be retrieved only and only if the other party contains the key.