Digital Image Authentication System based on Digital Watermarking
IEEE explorer, Feb 7, 2013
In these days, people are using social networking sites for sharing their life moments as images.... more In these days, people are using social networking sites for sharing their life moments as images. And another side other users can access or even download those digital images. Faker can exploits by editing and modifying the original image. Modify images can then be upload and share. The illegal use of personal image comes under copyright law. This research paper introduces a prototype for Digital Image Authentication System (DIAS). This system can perform visible and invisible watermarking on image. DIAS is applicable for color and gray images. The input image could be of any size, and the resultant image size would be same as input image. DIAS identifies the ownership of digital image using Digital Watermarking. The Digital watermarking concept is used to hide and detect information from image. It is the best way to copyright protection of the user. By the use of digital watermarking, user can blame on faker for ownership. This is known as an Authentication System for ownership identification. The complete system consists of two functions, one for hiding information inside image and other for detecting information from image. In this approach, digital watermarking performed using Discrete Wavelet Transform (DWT) and analyzed its results.
Uploads
Papers by Manish Sharma
Privacy preserving data mining techniques are introduced with the aim of extract the relevant knowledge from the large amount of data while protecting the sensible information at the same time. In this paper we review on the various privacy preserving data mining techniques like data modification and secure multiparty computation based on the different aspects. We also analyze the comparative study of all techniques followed by the future research work.
Privacy preserving data mining techniques are introduced with the aim of extract the relevant knowledge from the large amount of data while protecting the sensible information at the same time. In this paper we review on the various privacy preserving data mining techniques like data modification and secure multiparty computation based on the different aspects. We also analyze the comparative study of all techniques followed by the future research work.