Upload
syed-bahauddin-alam
View
103
Download
0
Tags:
Embed Size (px)
Citation preview
MotivationCellular communication is almost ubiquitousIn the Contrary of 50 million cell phone user, only 19.2 million
bank accountsDissemination of Virtual Banking using existing infrastructure
and simplest mobile sets.
Implementation
Proposed Method Results and Analysis
Conclusion
Financial institutions these days greatly focus on transactions via electronic means, a techno-economic trend which very much advocates the idea of moving towards a cashless transaction based society. Due to the proliferation of communication technology, instead of conventional banking system, GSM based virtual banking are getting hugely accepted. However, regardless of nature of transactions, maintaining security is a major concern in this sector. Because of widespread use of cellular phones, offers an ease of implementation in conjunction with a high level of security. In the proposed scheme, we offer a newly dimensioned security protocol using Digital Watermarking technique.
Implementation
Instructions for the Preparation of Posters to be Presented in EUProW2011
Student’s Name01, Student’s Name02, and Student’s Name03
Supervisor: Dr. Shaikh Anowarul FattahDepartment of Electrical and Electronic Engineering
Bangladesh University of Engineering and Technology (BUET), Dhaka
Instructions for the Preparation of Posters to be Presented in EUProW2011
Student’s Name01, Student’s Name02, and Student’s Name03
Supervisor: Dr. Shaikh Anowarul FattahDepartment of Electrical and Electronic Engineering
Bangladesh University of Engineering and Technology (BUET), Dhaka
Introduction
Space for BUET Logo
Space for EUProW
Logo
Audio Watermarking
Future Work
Software Implementation
Time Domain Analysis
• LSB method
• Higher Level LSB methodFrequency Domain
• DCT Coefficient : Bit-by-Bit method
• DCT Coefficient : Replacement method
Miscellaneous
• Temporal masking method
• positional switching method
DOMAIN OF ANALYSIS
Full and Partially Exhaust Method
ReferencesMention key references if necessary (max. 4)
You may skip this section.
If you are writing references, you must follow IEEE standards for writing
references. Use smaller fonts for this section (24).
Image Watermarking
Text Watermarking
Performance Analysis
BER Approximation for Attacks
Error analysis for Image Watermarking
Java EnabledAuto Updated Secured Account
The proposed framework, which provides both user authentication and supervision, has been analyzed with respect to different watermarking schemes for prototype transaction information. Detailed performance analysis has been carried out to reach at important conclusions regarding the viability of digital watermarking for enhancing m-commerce.
Server Setup
Line spacing char used for position codes
Line spacing char used for position codes