STUDY ON IMAGE BROADCAST USING WATERMARK AND SECURITY TECHNIQUES
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Image broadcast is existing in this paper by experimental outcomes. In this method, an unauthorized person is easily determine through piracy of an image. Watermark is appended into image at the time of sending an image. Embedding the information into a digital signal is called as watermark and it is used to verify authenticity or identity of its owner. The embedded message contains some encryption of data. Cryptography and Digital Signatures are mainly used to provide security. Whatever the message will be added to image as watermark is also be extracted from watermark image to overcome different types of attacks such as image-processing operations. Digital signature and encryption must be applied at message creation time to avoid tampering. Probability and strength have been satisfied by encryption and watermark.
Authors and Affiliations
SK. Sofia, , C. Rajendra,
13.5 MHz RFID(NFC) ANTENNA DESIGN FOR DEDICATED MOBILE APPLICATIONS WITH IMPROVED RESULTS
t—First part of the paper discusses about the latest trend within RFID is to use the technology for more advanced applications that can replace the magnet cards used today for payment and electronic key cards. Th...
Energy Enhancement in AOMDV
Mobile computing is evolving rapidly with advances in wireless communications and wireless networking protocols. To facilitate communication, most wireless network devices are portable and battery-powered, and th...
Optical Character Recognition Using Artificial Neural Network
— In this paper, an Optical Character recognition system based on Artificial Neural Networks (ANNs). The ANN is trained using the Back Propagation algorithm. In the proposed system, each typed English letter is rep...
Design and Implementation of Arithmetic Unit for GF(2m )
In Abstract algebra, a Finite field or Galois field (so named in honor of Évariste Galois) is a field that contains only finitely many elements. Finite fields are important in number theory, Algebraic geometry, Gal...
Intrusion Detection System for Database with Dynamic Threshold Value
In this paper, we propose an approach for database intrusion detection. Database management system are key component in the information field of most organization now days so security of DBMS has become more impo...