1
Motivation Cellular communication is almost ubiquitous In the Contrary of 50 million cell phone user, only 19.2 million bank accounts Dissemination of Virtual Banking using existing infrastructure and simplest mobile sets. Implementation Proposed Method Results and Analysis Conclusion Financial institutions these days greatly focus on transactions via electronic means, a techno- economic trend which very much advocates the idea of moving towards a cashless transaction based society. Due to the proliferation of communication technology, instead of conventional banking system, GSM based virtual banking are getting hugely accepted. However, regardless of nature of transactions, maintaining security is a major concern in this sector. Because of widespread use of cellular phones, offers an ease of implementation in conjunction with a high level of security. In the proposed scheme, we offer a newly dimensioned security protocol using Digital Watermarking technique. Implementation Instructions for the Preparation of Posters to be Presented in EUProW2011 Student’s Name01, Student’s Name02, and Student’s Name03 Supervisor: Dr. Shaikh Anowarul Fattah Department of Electrical and Electronic Engineering Bangladesh University of Engineering and Technology (BUET), Dhaka Introduction Space for BUET Logo Space for EUProW Logo Audio Watermarking Future Work Software Implementation Time Domain Analysis LSB method Higher Level LSB method Frequency Domain DCT Coefficient : Bit-by-Bit method DCT Coefficient : Replacement method Miscellaneous Temporal masking method positional switching method DOMAIN OF ANALYSIS Full and Partially Exhaust Method References Mention key references if necessary (max. 4) You may skip this section. If you are writing references, you must follow IEEE standards for writing references. Use smaller fonts for this section (24). Image Watermarking Text Watermarking Performance Analysis BER Approximation for Attacks Error analysis for Image Watermarking Java Enabled Auto Updated Secured Account The proposed framework, which provides both user authentication and supervision, has been analyzed with respect to different watermarking schemes for prototype transaction information. Detailed performance analysis has been carried out to reach at important conclusions regarding the viability of digital watermarking for enhancing m-commerce. Server Setup Line spacing char used for position codes Line spacing char used for position codes

EEE Undergraduate Project Workshop (EUPROW) 2011

Embed Size (px)

Citation preview

Page 1: EEE Undergraduate Project Workshop (EUPROW) 2011

MotivationCellular communication is almost ubiquitousIn the Contrary of 50 million cell phone user, only 19.2 million

bank accountsDissemination of Virtual Banking using existing infrastructure

and simplest mobile sets.

Implementation

Proposed Method Results and Analysis

Conclusion

Financial institutions these days greatly focus on transactions via electronic means, a techno-economic trend which very much advocates the idea of moving towards a cashless transaction based society. Due to the proliferation of communication technology, instead of conventional banking system, GSM based virtual banking are getting hugely accepted. However, regardless of nature of transactions, maintaining security is a major concern in this sector. Because of widespread use of cellular phones, offers an ease of implementation in conjunction with a high level of security. In the proposed scheme, we offer a newly dimensioned security protocol using Digital Watermarking technique.

Implementation

Instructions for the Preparation of Posters to be Presented in EUProW2011

Student’s Name01, Student’s Name02, and Student’s Name03

Supervisor: Dr. Shaikh Anowarul FattahDepartment of Electrical and Electronic Engineering

Bangladesh University of Engineering and Technology (BUET), Dhaka

Instructions for the Preparation of Posters to be Presented in EUProW2011

Student’s Name01, Student’s Name02, and Student’s Name03

Supervisor: Dr. Shaikh Anowarul FattahDepartment of Electrical and Electronic Engineering

Bangladesh University of Engineering and Technology (BUET), Dhaka

Introduction

Space for BUET Logo

Space for EUProW

Logo

Audio Watermarking

Future Work

Software Implementation

Time Domain Analysis

• LSB method

• Higher Level LSB methodFrequency Domain

• DCT Coefficient : Bit-by-Bit method

• DCT Coefficient : Replacement method

Miscellaneous

• Temporal masking method

• positional switching method

DOMAIN OF ANALYSIS

Full and Partially Exhaust Method

ReferencesMention key references if necessary (max. 4)

You may skip this section.

If you are writing references, you must follow IEEE standards for writing

references. Use smaller fonts for this section (24).

Image Watermarking

Text Watermarking

Performance Analysis

BER Approximation for Attacks

Error analysis for Image Watermarking

Java EnabledAuto Updated Secured Account

The proposed framework, which provides both user authentication and supervision, has been analyzed with respect to different watermarking schemes for prototype transaction information. Detailed performance analysis has been carried out to reach at important conclusions regarding the viability of digital watermarking for enhancing m-commerce.

Server Setup

Line spacing char used for position codes

Line spacing char used for position codes