Kavita Rahane | Univresity of Pune (original) (raw)
Papers by Kavita Rahane
Department of Electrical and Information …, 2004
Broadband communication networks and multimedia data available in a digital format opened many ch... more Broadband communication networks and multimedia data available in a digital format opened many challenges and opportunities for innovation. Versatile and simple-to-use software and decreasing prices of digital devices have made it possible for consumers from all around the world to create and exchange multimedia data. Broadband Internet connections and near error-free transmission of data facilitate people to distribute large multimedia files and make identical digital copies of them. A perfect reproduction in digital domain have promoted the protection of intellectual ownership and the prevention of unauthorized tampering of multimedia data to become an important technological and research issue. Digital watermarking has been proposed as a new, alternative method to enforce intellectual property rights and protect digital media from tampering. Digital watermarking is defined as imperceptible, robust and secure communication of data related to the host signal, which includes embedding into and extraction from the host signal. The main challenge in digital audio watermarking and steganography is that if the perceptual transparency parameter is fixed, the design of a watermark system cannot obtain high robustness and a high watermark data rate at the same time. In this thesis, we address three research problems on audio watermarking: First, what is the highest watermark bit rate obtainable, under the perceptual transparency constraint, and how to approach the limit? Second, how can the detection performance of a watermarking system be improved using algorithms based on communications models for that system? Third, how can overall robustness to attacks to a watermark system be increased using attack characterization at the embedding side? An approach that combined theoretical consideration and experimental validation, including digital signal processing, psychoacoustic modeling and communications theory, is used in developing algorithms for audio watermarking and steganography. The main results of this study are the development of novel audio watermarking algorithms, with the state-of-the-art performance and an acceptable increase in computational complexity. The algorithms' performance is validated in the presence of the standard watermarking attacks. The main technical solutions include algorithms for embedding high data rate watermarks into the host audio signal, using channel models derived from communications theory for watermark transmission and the detection and modeling of attacks using attack characterization procedure. The thesis also includes a thorough review of the state-of-the-art literature in the digital audio watermarking.
International Journal of Research, 2016
In the sizably voluminous number of outgrowing commercial environment each and everything depends... more In the sizably voluminous number of outgrowing commercial environment each and everything depends on the other sources to transmit the data securely and maintain the data as well in the conventional medium. Portable nodes in military environments, for example, a front line or an antagonistic area are prone to experience the undergo of aberrant system network and frequent partitions. Disruption-tolerant network (DTN) innovations are getting to be fruitful results that sanction remote contrivance conveyed by officers to verbalize with one another and access the confidential data or secret data or summon dependably by abusing outside capacity nodes or storage nodes. Our project is not the unique one, but is an endeavor to have a precise scenario of what the terms “secure data retrieval for decentralized disruption tolerant network” is designated to be and its implementation as well on which we are currently working. As verbalized before, our proposed system can enhance the security of ...
Privacy being the main issue in social networking site. We all are users of such social networkin... more Privacy being the main issue in social networking site. We all are users of such social networking sites. Facebook, Twitter, LinkedIn, E-mail, and Blogging such site’s popularity is increasing day by day. Though, to protect the personal data of each user, these sites have their own privacy policies now it is necessity to have user level privacy policy. In this paper, we are trying to specify the problem regarding privacy and how privacy can also be achieved at user level.
Broadband communication networks and multimedia data available in a digital format opened many ch... more Broadband communication networks and multimedia data available in a digital format opened many challenges and opportunities for innovation. Versatile and simple-to-use software and decreasing prices of digital devices have made it possible for consumers from all around the world to create and exchange multimedia data. Broadband Internet connections and near error-free transmission of data facilitate people to distribute large multimedia files and make identical digital copies of them. A perfect reproduction in digital domain have promoted the protection of intellectual ownership and the prevention of unauthorized tampering of multimedia data to become an important technological and research issue.
Department of Electrical and Information …, 2004
Broadband communication networks and multimedia data available in a digital format opened many ch... more Broadband communication networks and multimedia data available in a digital format opened many challenges and opportunities for innovation. Versatile and simple-to-use software and decreasing prices of digital devices have made it possible for consumers from all around the world to create and exchange multimedia data. Broadband Internet connections and near error-free transmission of data facilitate people to distribute large multimedia files and make identical digital copies of them. A perfect reproduction in digital domain have promoted the protection of intellectual ownership and the prevention of unauthorized tampering of multimedia data to become an important technological and research issue. Digital watermarking has been proposed as a new, alternative method to enforce intellectual property rights and protect digital media from tampering. Digital watermarking is defined as imperceptible, robust and secure communication of data related to the host signal, which includes embedding into and extraction from the host signal. The main challenge in digital audio watermarking and steganography is that if the perceptual transparency parameter is fixed, the design of a watermark system cannot obtain high robustness and a high watermark data rate at the same time. In this thesis, we address three research problems on audio watermarking: First, what is the highest watermark bit rate obtainable, under the perceptual transparency constraint, and how to approach the limit? Second, how can the detection performance of a watermarking system be improved using algorithms based on communications models for that system? Third, how can overall robustness to attacks to a watermark system be increased using attack characterization at the embedding side? An approach that combined theoretical consideration and experimental validation, including digital signal processing, psychoacoustic modeling and communications theory, is used in developing algorithms for audio watermarking and steganography. The main results of this study are the development of novel audio watermarking algorithms, with the state-of-the-art performance and an acceptable increase in computational complexity. The algorithms' performance is validated in the presence of the standard watermarking attacks. The main technical solutions include algorithms for embedding high data rate watermarks into the host audio signal, using channel models derived from communications theory for watermark transmission and the detection and modeling of attacks using attack characterization procedure. The thesis also includes a thorough review of the state-of-the-art literature in the digital audio watermarking.
International Journal of Research, 2016
In the sizably voluminous number of outgrowing commercial environment each and everything depends... more In the sizably voluminous number of outgrowing commercial environment each and everything depends on the other sources to transmit the data securely and maintain the data as well in the conventional medium. Portable nodes in military environments, for example, a front line or an antagonistic area are prone to experience the undergo of aberrant system network and frequent partitions. Disruption-tolerant network (DTN) innovations are getting to be fruitful results that sanction remote contrivance conveyed by officers to verbalize with one another and access the confidential data or secret data or summon dependably by abusing outside capacity nodes or storage nodes. Our project is not the unique one, but is an endeavor to have a precise scenario of what the terms “secure data retrieval for decentralized disruption tolerant network” is designated to be and its implementation as well on which we are currently working. As verbalized before, our proposed system can enhance the security of ...
Privacy being the main issue in social networking site. We all are users of such social networkin... more Privacy being the main issue in social networking site. We all are users of such social networking sites. Facebook, Twitter, LinkedIn, E-mail, and Blogging such site’s popularity is increasing day by day. Though, to protect the personal data of each user, these sites have their own privacy policies now it is necessity to have user level privacy policy. In this paper, we are trying to specify the problem regarding privacy and how privacy can also be achieved at user level.
Broadband communication networks and multimedia data available in a digital format opened many ch... more Broadband communication networks and multimedia data available in a digital format opened many challenges and opportunities for innovation. Versatile and simple-to-use software and decreasing prices of digital devices have made it possible for consumers from all around the world to create and exchange multimedia data. Broadband Internet connections and near error-free transmission of data facilitate people to distribute large multimedia files and make identical digital copies of them. A perfect reproduction in digital domain have promoted the protection of intellectual ownership and the prevention of unauthorized tampering of multimedia data to become an important technological and research issue.