-
Chaotic Encryption Scheme Using 1-D Chaotic Map
Authors:
Mina Mishra,
Vijay H. Mankar
Abstract:
This paper proposes three different chaotic encryption methods using 1-D chaotic map known as Logistic map named as Logistic, NLFSR and Modified NLFSR according to the name of chaotic map and non-linear function involved in the scheme. The designed schemes have been crypt analyzed for five different methods for testing its strength. Cryptanalysis has been performed for various texts using various…
▽ More
This paper proposes three different chaotic encryption methods using 1-D chaotic map known as Logistic map named as Logistic, NLFSR and Modified NLFSR according to the name of chaotic map and non-linear function involved in the scheme. The designed schemes have been crypt analyzed for five different methods for testing its strength. Cryptanalysis has been performed for various texts using various keys selected from domain of key space. Logistic and NLFSR methods are found to resist known plaintext attack for available first two characters of plaintext. Plaintext sensitivity of both methods is within small range along with medium key sensitivity. Identifiability for keys of first two of the scheme has not been derived concluding that methods may prove to be weak against brute-force attack. In the last modified scheme avalanche effect found to be improved compared to the previous ones and method is found to resist brute-force attack as it derives the conclusion for identifiability.
△ Less
Submitted 14 December, 2013;
originally announced December 2013.
-
Devnagari Handwritten Numeral Recognition using Geometric Features and Statistical Combination Classifier
Authors:
Vikas J. Dongre,
Vijay H. Mankar
Abstract:
This paper presents a Devnagari Numerical recognition method based on statistical discriminant functions. 17 geometric features based on pixel connectivity, lines, line directions, holes, image area, perimeter, eccentricity, solidity, orientation etc. are used for representing the numerals. Five discriminant functions viz. Linear, Quadratic, Diaglinear, Diagquadratic and Mahalanobis distance are u…
▽ More
This paper presents a Devnagari Numerical recognition method based on statistical discriminant functions. 17 geometric features based on pixel connectivity, lines, line directions, holes, image area, perimeter, eccentricity, solidity, orientation etc. are used for representing the numerals. Five discriminant functions viz. Linear, Quadratic, Diaglinear, Diagquadratic and Mahalanobis distance are used for classification. 1500 handwritten numerals are used for training. Another 1500 handwritten numerals are used for testing. Experimental results show that Linear, Quadratic and Mahalanobis discriminant functions provide better results. Results of these three Discriminants are fed to a majority voting type Combination classifier. It is found that Combination classifier offers better results over individual classifiers.
△ Less
Submitted 21 October, 2013;
originally announced October 2013.
-
Development of Comprehensive Devnagari Numeral and Character Database for Offline Handwritten Character Recognition
Authors:
Vikas J. Dongre,
Vijay H. Mankar
Abstract:
In handwritten character recognition, benchmark database plays an important role in evaluating the performance of various algorithms and the results obtained by various researchers. In Devnagari script, there is lack of such official benchmark. This paper focuses on the generation of offline benchmark database for Devnagari handwritten numerals and characters. The present work generated 5137 and 2…
▽ More
In handwritten character recognition, benchmark database plays an important role in evaluating the performance of various algorithms and the results obtained by various researchers. In Devnagari script, there is lack of such official benchmark. This paper focuses on the generation of offline benchmark database for Devnagari handwritten numerals and characters. The present work generated 5137 and 20305 isolated samples for numeral and character database, respectively, from 750 writers of all ages, sex, education, and profession. The offline sample images are stored in TIFF image format as it occupies less memory. Also, the data is presented in binary level so that memory requirement is further reduced. It will facilitate research on handwriting recognition of Devnagari script through free access to the researchers.
△ Less
Submitted 16 August, 2013;
originally announced September 2013.
-
Hybrid Message-Embedded Cipher Using Logistic Map
Authors:
Mina Mishra,
V. H. Mankar
Abstract:
The proposed hybrid message embedded scheme consists of hill cipher combined with message embedded chaotic scheme. Message-embedded scheme using non-linear feedback shift register as non-linear function and 1-D logistic map as chaotic map is modified, analyzed and tested for avalanche property and strength against known plaintext attack and brute-force attack. Parameter of logistic map acts as a s…
▽ More
The proposed hybrid message embedded scheme consists of hill cipher combined with message embedded chaotic scheme. Message-embedded scheme using non-linear feedback shift register as non-linear function and 1-D logistic map as chaotic map is modified, analyzed and tested for avalanche property and strength against known plaintext attack and brute-force attack. Parameter of logistic map acts as a secret key. As we know that the minimum key space to resist brute-force attack is 2100, and it is observed from analysis that key space of the discussed method is lesser than 2100. But the identifiability test concludes that the scheme consists of identifiable keys which are sufficient condition to resist brute-force attack for chaotic ciphers. A complete file can be encrypted and decrypted successfully by the method that assures security against brute force attack. It is also concluded that the scheme has an average key sensitivity.
△ Less
Submitted 12 September, 2012;
originally announced September 2012.
-
Message Embedded cipher using 2-D chaotic map
Authors:
Mina Mishra,
V. H. Mankar
Abstract:
This paper constructs two encryption methods using 2-D chaotic maps, Duffings and Arnold's cat maps respectively. Both of the methods are designed using message embedded scheme and are analyzed for their validity, for plaintext sensitivity, key sensitivity, known plaintext and brute-force attacks. Due to the less key space generally many chaotic cryptosystem developed are found to be weak against…
▽ More
This paper constructs two encryption methods using 2-D chaotic maps, Duffings and Arnold's cat maps respectively. Both of the methods are designed using message embedded scheme and are analyzed for their validity, for plaintext sensitivity, key sensitivity, known plaintext and brute-force attacks. Due to the less key space generally many chaotic cryptosystem developed are found to be weak against Brute force attack which is an essential issue to be solved. For this issue, concept of identifiability proved to be a necessary condition to be fulfilled by the designed chaotic cipher to resist brute force attack, which is a basic attack. As 2-D chaotic maps provide more key space than 1-D maps thus they are considered to be more suitable. This work is accompanied with analysis results obtained from these developed cipher. Moreover, identifiable keys are searched for different input texts at various key values. The methods are found to have good key sensitivity and possess identifiable keys thus concluding that they can resist linear attacks and brute-force attacks.
△ Less
Submitted 9 August, 2012;
originally announced August 2012.
-
Spread Spectrum based Robust Image Watermark Authentication
Authors:
T. S. Das,
V. H. Mankar,
S. K. Sarkar
Abstract:
In this paper, a new approach to Spread Spectrum (SS) watermarking technique is introduced. This problem is particularly interesting in the field of modern multimedia applications like internet when copyright protection of digital image is required. The approach exploits two-predecessor single attractor (TPSA) cellular automata (CA) suitability to work as efficient authentication function in wavel…
▽ More
In this paper, a new approach to Spread Spectrum (SS) watermarking technique is introduced. This problem is particularly interesting in the field of modern multimedia applications like internet when copyright protection of digital image is required. The approach exploits two-predecessor single attractor (TPSA) cellular automata (CA) suitability to work as efficient authentication function in wavelet based SS watermarking domain. The scheme is designed from the analytical study of state transition behaviour of non-group CA and the basic cryptography/encryption scheme is significantly different from the conventional SS data hiding approaches. Experimental studies confirm that the scheme is robust in terms of confidentiality, authentication, non-repudiation and integrity. The transform domain blind watermarking technique offers better visual & statistical imperceptibility and resiliency against different types of intentional & unintentional image degradations. Interleaving and interference cancellation methods are employed to improve the robustness performance significantly compared to conventional matched filter detection.
△ Less
Submitted 11 July, 2012;
originally announced July 2012.
-
Robust Image Watermarking Under Pixel Wise Masking Framework
Authors:
V. H. Mankar,
T. S. Das,
S. Saha,
S. K. Sarkar
Abstract:
The current paper presents a robust watermarking method for still images, which uses the similarity of discrete wavelet transform and human visual system (HVS). The proposed scheme makes the use of pixel wise masking in order to make binary watermark imperceptible to the HVS. The watermark is embedded in the perceptually significant, spatially selected detail coefficients using sub band adaptive t…
▽ More
The current paper presents a robust watermarking method for still images, which uses the similarity of discrete wavelet transform and human visual system (HVS). The proposed scheme makes the use of pixel wise masking in order to make binary watermark imperceptible to the HVS. The watermark is embedded in the perceptually significant, spatially selected detail coefficients using sub band adaptive threshold scheme. The threshold is computed based on the statistical analysis of the wavelet coefficients. The watermark is embedded several times to achieve better robustness. Here, a new type of non-oblivious detection method is proposed. The improvement in robustness performance against different types of deliberate and non-intentional image impairments (lossy compression, scaling, cropping, filtering etc) is supported through experimental results. The reported result also shows improvement in visual and statistical invisibility of the hidden data. The proposed method is compared with a state of the art frequency based watermarking technique, highlighting its performance. This algorithmic architecture utilizes the existing allocated bandwidth in the data transmission channel in a more efficient manner.
△ Less
Submitted 11 July, 2012;
originally announced July 2012.
-
Discrete Chaotic Sequence based on Logistic Map in Digital Communications
Authors:
V. H. Mankar,
T. S. Das,
S. K. Sarkar
Abstract:
The chaotic systems have been found applications in diverse fields such as pseudo random number generator, coding, cryptography, spread spectrum (SS) communications etc. The inherent capability of generating a large space of PN sequences due to sensitive dependence on initial conditions has been the main reason for exploiting chaos in spread spectrum communication systems. This behaviour suggests…
▽ More
The chaotic systems have been found applications in diverse fields such as pseudo random number generator, coding, cryptography, spread spectrum (SS) communications etc. The inherent capability of generating a large space of PN sequences due to sensitive dependence on initial conditions has been the main reason for exploiting chaos in spread spectrum communication systems. This behaviour suggests that it is straightforward to generate a variety of initial condition induced PN sequences with nice statistical properties by quantising the output of an iterated chaotic map. In the present paper the study has been carried out for the feasibility and usefulness of chaotic sequence in SS based applications like communication and watermarking.
△ Less
Submitted 11 July, 2012;
originally announced July 2012.
-
Performance Evaluation of Spread Spectrum Watermarking using Error Control Coding
Authors:
T. S. Das,
V. H. Mankar,
S. K. Sarkar
Abstract:
This paper proposes an oblivious watermarking algorithm with blind detection approach for high volume data hiding in image signals. We present a detection reliable signal adaptive embedding scheme for multiple messages in selective sub-bands of wavelet (DWT) coefficients using direct sequence spread spectrum (DS-SS) modulation technique. Here the impact of volumetric distortion sources is analyzed…
▽ More
This paper proposes an oblivious watermarking algorithm with blind detection approach for high volume data hiding in image signals. We present a detection reliable signal adaptive embedding scheme for multiple messages in selective sub-bands of wavelet (DWT) coefficients using direct sequence spread spectrum (DS-SS) modulation technique. Here the impact of volumetric distortion sources is analyzed on the ability of analytical bounds in order to recover the watermark messages. In this context, the joint source-channel coding scheme has been employed to obtain the better control of the system robustness. This structure prevents the desynchronisation between encoder and decoder due to selective embedding. The experimental results obtained for Spread Spectrum (SS) transformed domain watermarking demonstrate the efficiency of the proposed system. This algorithmic architecture utilizes the existing allocated bandwidth in the data transmission channel in a more efficient manner.
△ Less
Submitted 11 July, 2012;
originally announced July 2012.
-
Multimedia Steganographic Scheme using Multiresolution Analysis
Authors:
Tirtha sankar Das,
Ayan K. Sau,
V. H. Mankar,
Subir K. Sarkar
Abstract:
Digital steganography or data hiding has emerged as a new area of research in connection to the communication in secured channel as well as intellectual property protection for multimedia signals. The redundancy in image representation can be exploited successfully to embed specified characteristic information with a good quality of imperceptibility. The hidden multimedia information will be commu…
▽ More
Digital steganography or data hiding has emerged as a new area of research in connection to the communication in secured channel as well as intellectual property protection for multimedia signals. The redundancy in image representation can be exploited successfully to embed specified characteristic information with a good quality of imperceptibility. The hidden multimedia information will be communicated to the authentic user through secured channel as a part of the data. This article deals with a transform domain, block-based and signal non-adaptive/adaptive technique for inserting multimedia signals into an RGB image. The robustness of the proposed method has been tested compared to the other transform domain techniques. Proposed algorithm also shows improvement in visual and statistical invisibility of the hidden information.
△ Less
Submitted 11 July, 2012;
originally announced July 2012.
-
Interactive Learning through Hands-on Practice using Electronic Mini - Lab (EML): a Case Study
Authors:
Vikas J Dongre,
Ramkrishna V Yenkar,
Vijay H Mankar
Abstract:
-- In this paper, a new approach to impart practical skill based technical education is presented in comprehensive manner. An Electronic Mini-Lab (EML) is devised containing basic design and test instruments with electronic components, ICs, connecting wires and battery. Using the EML, students perform various formal and informal digital and analog circuit practicals as well as design prototype of…
▽ More
-- In this paper, a new approach to impart practical skill based technical education is presented in comprehensive manner. An Electronic Mini-Lab (EML) is devised containing basic design and test instruments with electronic components, ICs, connecting wires and battery. Using the EML, students perform various formal and informal digital and analog circuit practicals as well as design prototype of projects. This gives them a hands-on experience, sense of belonging and sense of cooperation. The EML is useful for performing many practicals of various subjects. The EML also reduces the workload of college laboratories. Students have their own individual EML at their disposal anytime, which can be used to design hobby projects as a fun too. This will make them skilled engineers. This provides tremendous benefits in teaching learning process. It also boosted the interest, confidence of students and teachers. Incorporating active/ cooperative learning into traditional instruction can be a useful pedagogical tool to help students to perform practicals and project work any time anywhere. This concept is remarkably simple and cost effective but the dividends can be profound.
△ Less
Submitted 5 May, 2012;
originally announced May 2012.
-
Devnagari document segmentation using histogram approach
Authors:
Vikas J Dongre,
Vijay H Mankar
Abstract:
Document segmentation is one of the critical phases in machine recognition of any language. Correct segmentation of individual symbols decides the accuracy of character recognition technique. It is used to decompose image of a sequence of characters into sub images of individual symbols by segmenting lines and words. Devnagari is the most popular script in India. It is used for writing Hindi, Mara…
▽ More
Document segmentation is one of the critical phases in machine recognition of any language. Correct segmentation of individual symbols decides the accuracy of character recognition technique. It is used to decompose image of a sequence of characters into sub images of individual symbols by segmenting lines and words. Devnagari is the most popular script in India. It is used for writing Hindi, Marathi, Sanskrit and Nepali languages. Moreover, Hindi is the third most popular language in the world. Devnagari documents consist of vowels, consonants and various modifiers. Hence proper segmentation of Devnagari word is challenging. A simple histogram based approach to segment Devnagari documents is proposed in this paper. Various challenges in segmentation of Devnagari script are also discussed.
△ Less
Submitted 6 September, 2011;
originally announced September 2011.
-
A Review of Research on Devnagari Character Recognition
Authors:
V J Dongre,
V H Mankar
Abstract:
English Character Recognition (CR) has been extensively studied in the last half century and progressed to a level, sufficient to produce technology driven applications. But same is not the case for Indian languages which are complicated in terms of structure and computations. Rapidly growing computational power may enable the implementation of Indic CR methodologies. Digital document processing i…
▽ More
English Character Recognition (CR) has been extensively studied in the last half century and progressed to a level, sufficient to produce technology driven applications. But same is not the case for Indian languages which are complicated in terms of structure and computations. Rapidly growing computational power may enable the implementation of Indic CR methodologies. Digital document processing is gaining popularity for application to office and library automation, bank and postal services, publishing houses and communication technology. Devnagari being the national language of India, spoken by more than 500 million people, should be given special attention so that document retrieval and analysis of rich ancient and modern Indian literature can be effectively done. This article is intended to serve as a guide and update for the readers, working in the Devnagari Optical Character Recognition (DOCR) area. An overview of DOCR systems is presented and the available DOCR techniques are reviewed. The current status of DOCR is discussed and directions for future research are suggested.
△ Less
Submitted 12 January, 2011;
originally announced January 2011.