Figure - uploaded by Michael Agbaje
Content may be subject to copyright.
Figure1: Types of identity fraud. Source: Alexander (2015) 

Figure1: Types of identity fraud. Source: Alexander (2015) 

Source publication
Conference Paper
Full-text available
Cyber security is generally an extension of the traditional information technology (IT) security that is aimed at protecting systems, applications and data that exposed to a variety of forms of attack via the internet, ranging from data theft and espionage to corruption of data and denial of service attacks. There is a need for an increase in cyber...

Similar publications

Article
Full-text available
The development of information technology has led to a significant increase in the share of multimedia traffic in data networks. This has necessitated to solve the following information security tasks in relation to multimedia data: protection against leakage of confidential information, as well as identifying the source of the leak; ensuring the i...
Article
Full-text available
Portable Document Format (PDF) files have emerged as a ubiquitous and multi-faceted medium for the dissemination and interchange of information. The watermarking algorithms based on PDF document have spurred much research in academia due to their practical applications in copyright protection, trace-tracking and digital forensics. In this work, we...
Article
Full-text available
Traditional watermarking methods can remove a watermark from an image, making it possible to see the copyright information about the image owner or to estimate similarities using techniques such as bit error rate and normalized correlation. Deep learning is another examination field in AI, and is utilized to develop a deep network to extract object...
Article
Full-text available
Watermarking is the process of inserting concealed data into carrier data to authenticate the owner of the material. To achieve optimal performance, we present an intelligent system for watermarking that combines a meta-heuristic method with an embedding technique. The suggested work proposes a blind watermarking technique that embeds the watermark...
Article
Full-text available
Portable document format (PDF) files are widely used in file transmission, exchange, and circulation because of their platform independence, small size, good browsing quality, and the ability to place hyperlinks. However, their security issues are also more thorny. It is common to distribute printed PDF files to different groups and individuals aft...

Citations

... A modification of the Discrete Wavelet Transform (DWT) coefficient-based digital watermarking approach for online social networks is introduced by Thongkor et al. [56]. To protect cyberspace predominantly concentrating on information theft namely identity and credit card theft, thus cyber watermarking techniques are introduced by authors in [3]. ...
... Here, DTCWT provides more transform coefficients and it is most suitable for embedding the watermark. To achieve the maximum capacity as in [3], we also used Pseudo Zernike Moments. It is expressed as, for an order of 15, we can have 136 moments and from these 130 can be used. ...
Article
Full-text available
With the growing use of mobile devices and Online Social Networks (OSNs), sharing digital content, especially digital images is extremely high as well as popular. This made us convenient to handle the ongoing COVID-19 crisis which has brought about years of change in the sharing of digital content online. On the other hand, the digital image processing tools which are powerful enough to make the perfect image duplication compromises the privacy of the transmitted digital content. Therefore, content authentication, proof of ownership, and integrity of digital images are considered crucial problems in the world of digital that can be accomplished by employing a digital watermarking technique. On contrary, watermarking issues are to triumph trade-offs among imperceptibility, robustness, and payload. However, most existing systems are unable to handle the problem of tamper detection and recovery in case of intentional and unintentional attacks concerning these trade-offs. Also, the existing system fails to withstand the geometrical attacks. To resolve the above shortcomings, this proposed work offers a new multi-biometric based semi-fragile watermarking system using Dual-Tree Complex Wavelet Transform (DTCWT) and pseudo-Zernike moments (PZM) for content authentication of social media data. In this research work, the DTCWT-based coefficients are used for achieving maximum embedding capacity. The Rotation and noise invariance properties of Pseudo Zernike moments make the system attain the highest level of robustness when compared to conventional watermarking systems. To achieve authentication and proof of identity, the watermarks of about four numbers are used for embedding as a replacement for a single watermark image in traditional systems. Among four watermarks, three are the biometric images namely Logo or unique image of the user, fingerprint biometric of the owner, and the metadata of the original media to be transmitted. In addition, to achieve the tamper localization property, the Pseudo Zernike moments of the original cover image are obtained as a feature vector and also embedded as a watermark. To attain a better level of security, each watermark is converted into Zernike moments, Arnold scrambled image, and SHA outputs respectively. Then, to sustain the trade-off among the watermarking parameters, the optimal embedding location is determined. Moreover, the watermarked image is also signed by the owner’s other biometric namely digital signature, and converted into Public key matrix Pkm and embedded onto the higher frequency subband namely, HL of the 1-level DWT. The proposed system also accomplishes a multi-level authentication, among that the first level is attained by the decryption of the extracted multiple watermark images with the help of the appropriate decryption mechanism which is followed by the comparison of the authentication key which is extracted using the key which is regenerated at the receiver’s end. The simulation outcomes evident that the proposed system shows superior performance towards content authentication, to most remarkable intentional and unintentional attacks among the existing watermarking systems.
... These criminal acts associated to identity theft are indeed not brand-new offences; rather, they are existing offences that have been enhanced using or theft from stolen identities (Newman & McNally, 2005). Agbaje et al. (2015) identified different types of identity theft, with percentages for each type displayed in Figure 2: ...
Article
Full-text available
Cybercrimes are often defined as computer crimes or high-tech crimes. They are launched with the cause of harming different people's property, personal integrity, and life or stealing valuable items and information from other people. In Malaysia, different types of cybercrimes are hacking, cyber harassment, phishing, identity theft, credit card fraud, spam, cyber pornography, denial of service attacks, and virus dissemination. It was reported that around 13,000 cybercrime complaints were filed in 2019, costing about RM539 million in losses. In 2020, there were 17,000 cases reported. The number of cases grew to over 20,000 in 2021, with a total loss of RM560 million. There were 3,273 cases documented up to February 2022, amounting to RM114 million in losses. Following a sharp increase in reports of online crimes, cyber security remains one of Malaysia's top concerns. To prevent this from happening to us, we need to know how to recognize phishing, keep personal information safe, beware of public computers, use a credit card instead of a debit card, buy only from valid websites and avoid suspicious emails.
... • In spatial domain manner, inserts the watermark by directly changing the pixel value of an original image. Fig. 1 Applications of Watermarking [1] Content courtesy of Springer Nature, terms of use apply. Rights reserved. ...
Article
Full-text available
Due to developments in the Internet and communication technology, the world has become an international parish in a digital era. The number of bits is generated, replicated, and transferred through the internet or mobile phones in the blink of an eye. Digital watermarking is implemented to assure and provide data authentication, copyright protection to such type of transmission. This paper presents a robust and imperceptible watermarking technique that is achieved with the combination of discrete cosine transform (DCT) and the genetic algorithm for color images. In this paper, DCT transform is based on dividing the cover image into 8X8 blocks, and a genetic algorithm is employed here for answering the optimization problem of digital watermarking as it plays a major role in obtaining an optimized solution. So main advantage of the proposed work can be described as the selection of the best pixel group for embedding so the quality of the watermarked image is better. Due to better pixels group selection for embedding the data losses is less during watermarking and we achieve better results. The purpose of optimization is to maximize the watermarking results in the presented watermarking method. In this work, various images have been imperiled to test the quality measurement in terms of standard metrics such as Peak Signal to Noise Ratio (PSNR), Normalized Cross-Correlation (NCC). Proposed work is compared with existing approach DCT and decision tree induction ID3. Further performance evaluation for different color models such as Red, Green, and Blue (RGB), YCbCr, YIQ color spaces have been calculated. Results of the composing approach are found better than the existing approach in terms of PSNR. In the red plane, the PSNR value is increased by 12%, 18% in the green plane, and 14% in the blue plane for image Lena. The proposed scheme achieves good imperceptibility and robustness against many watermarking attacks too. It can be applied to digital repositories and libraries, ownership authentication, and optimizing the parameters of watermarking in terms of PSNR and NCC.
... In [14], steganography is identified as a branch of information hiding which hides the existence of the secret data in a cover medium. [14] In [15], the difference between Steganography, Watermarking and Cryptography was emphasized. It was stated that these tools employed similar ideas, but have different approaches and purposes in cyber security. ...
Article
Image steganography is the method of concealing information, which can be text, image, or video, under a cover image in a way that it is invisible to the human eyes. Payload capacity, security and robustness are the features of steganography. A high-quality image steganography ensures a large payload capacity, superior security, and robustness against adversarial attacks. Image steganography is considered to be reversible if the concealed information's original state can be restored with little or no loss in the pixel values and textures. The main goal of this paper is to look at some of the typical techniques and models that are used to build image steganography systems by adopting the Preview, Question, Read, Summarize (PQRS) method to explain how the payload capacity, security, and robustness of these models may be quantified for future research and recommend GAN-based deep learning methods for improving existing reversible image steganography models. Keywords: Image steganography, GAN-based models, Payload capacity, PSNR, Reversibility, SSIM
... In this method, a watermark is inserted into any multimedia content to secure it from unauthorized usage. Some probable applications of digital watermarking are broadcast monitoring, tamper detection, chip and hardware security, E-governance, copyright protection, fingerprinting, health care, digital cinema and content authentication are shown in Fig. 1 (Agbaje et al., 2015;. Security, capacity, robustness, imperceptibility and computational complexity are foremost characteristics of digital watermark (Singh et al., 2015). ...
Book
Full-text available
This edited book is comprised of original research that focuses on technological advancements for effective teaching with an emphasis on learning outcomes, ICT trends in higher education, sustainable developments and digital ecosystem in education, management and industries. The contents of the book are classified as; (i) Emerging ICT Trends in Education, Management and Innovations (ii) Digital Technologies for advancements in education, management and IT (iii) Emerging Technologies for Industries and Education, and (iv) ICT Technologies for Intelligent Applications. The book represents a useful tool for academics, researchers, industry professionals and policymakers to share and learn about the latest teaching and learning practices supported by ICT. It also covers innovative concepts applied in education, management and industries using ICT tools.
... The development of high-intensive computer networks and the acceptance of electronic management system in medical records system have made it possible for digital medical images to be shared across the globe essentially in services such as teleconsultation [1], telemedicine, tele-diagnosis and teleradiology [2], [3], [4], [5], [6]. Automatic diagnosis and understanding of a certain disease and minimizing the number of misdiagnosis has had an extensive social and economic impact. ...
Conference Paper
Full-text available
In this paper, we presents two watermarking schemes namely: Scheme I present an hybrid of discrete cosine transform (DCT) and discrete wavelet transform (DWT) watermarking technique while Scheme II presents a genetic programming (GP) based technique. Both of these schemes were experimented with 512x512 and 256x256 medical images and other standard images such as Lena, Barbara, Baboon, Flower, Brain etc. against state-of-the-art watermarking techniques. According to our results, shows better performance of the two main criteria use to check for any watermarking techniques (Imperceptivity and Robustness). The experimental results reveals that for imperceptivity, peak-signal-to-noise-ratio (PSNR) and structural similarity index (SSIM) shows better performance when compared against Arsalan's and Hurrah's approaches. Similarly, for robustness the parameters used are normalized correlation (NCC) and bit error rate (BER). According to results obtained, both schemes' parameters show high performance except for Scheme I BER with 0.0038. Finally, in terms of fragility both schemes provided better resistance to any signal processing attacks.
... The digital ownership of a watermark is an issue that has not been addressed in the present methods. In case of piracy of the digital media will be difficult to prove ownership of a digital watermark [1] . The dispute of ownership for digital media will define it is not physically owned. ...
Article
Full-text available
Digital watermarking is a digital data that can be embedded in digital documents, images, audio and video. This watermark technique uses the unique biometric data of individuals. The individuals biometric of eye, vein and fingerprint is embedded in the digital image. These unique data are fused and encrypted. The fusion of three biometric data is output as a digital image. The host image is processed for embedding the fusion image in it. The process of embedding image in another image is watermarking. It is also the domain of image processing. Generally it means hiding an image in the host image. It is a technique to secure the unique data of owner in an image to prove the ownership of the owner. Watermarking the unique features in a digital image establish that the digital image is belongs to the user whose biometric data watermarked. The watermarking process is robust and perceptual transparency. The unique biometric data will logically prove the ownership of digital media.
... Among that one of the most increasing threats is Identity theft. [1] Identity theft overview Identity theft refers acquiring personal data or identity of known or unknown person in order to gain benefits to convict another person. Where Identity thieves are constantly sprouting and discovering new ways to encompass the owner's information. ...
... With this information the author, the ownership or other maintained features of the manuscript may be demonstrated. [1] ...
Article
Cyber security is generally a conservatory of the conventional information system security that is aimed at protecting cyber threats, like cyber terrorism, cyber warfare, and cyber espionage to corrupt digital information. This leads to increase the researches in cyber security. This paper proposes the application of dual watermarking in cyber technology, focusing on forgery detection. The rest of the paper presents a brief overview of cyber security and the role of digital dual watermarking.
... Digital watermarking is one of the new, popular and efficient techniques for multimedia data protection. In this scheme, a document called watermark is embedded into the digital data to protect it from unauthorised use in various social applications such as copy protection, tamper detection, broadcast monitoring, content archiving, fingerprinting, healthcare, cyber watermarking and content authentication (Bender et al., 1996;Provos and Honeyman, 2003;Cheddad et al., 2010;Singh and Chadha, 2013;Tagare and Kuri, 2015;Agbaje et al., 2015;Singh et al., 2015a). In addition, digital watermarks are also used to protect state driver licenses by providing covert and machine readable layer of security to fight against various issues such as digital counterfeiting, fraud, identity theft, etc. (http://www.digitalwatermarkingalliance.org/faqs.asp). ...
... Digital watermarking is one of the new, popular and efficient techniques for multimedia data protection. In this scheme, a document called watermark is embedded into the digital data to protect it from unauthorised use in various social applications such as copy protection, tamper detection, broadcast monitoring, content archiving, fingerprinting, healthcare, cyber watermarking and content authentication (Bender et al., 1996;Provos and Honeyman, 2003;Cheddad et al., 2010;Singh and Chadha, 2013;Tagare and Kuri, 2015;Agbaje et al., 2015;Singh et al., 2015a). In addition, digital watermarks are also used to protect state driver licenses by providing covert and machine readable layer of security to fight against various issues such as digital counterfeiting, fraud, identity theft, etc. (http://www.digitalwatermarkingalliance.org/faqs.asp). ...