SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
Computer Engineering and Intelligent Systems                                                                www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.7, 2012




     A Study of Image Fingerprinting by Using Visual Cryptography
                         Santosh Choudhary,        Shrikrishan Yadav*,    Neeta Sen,    Gosiya Nasreen
                     Pacific College of Engineering, Pacific University, Udaipur-313001, Rajasthan, India
                                                 * E-mail of the corresponding author
Abstract
As digital media has made our life more colourful because of its advantages like easier to access, copy and distribute.
But as what we have seen, series of malice activities like copyright infringement, counterfeiting, piracy and
information distortion make damages to both the producers and the users of digital products. So we really need some
technology to protect the copyright, authenticity, integrity of the digital products and the intellectual property of the
users. There are many techniques such as Digital watermarking and Visual Cryptography both have been widely used
for protection of data either in text, video, sound or digital images form in modern network time. Digital
watermarking is an evolving field that requires continuous effort to find for the best possible method in protecting
multimedia content. But Visual Cryptography is a special encryption technique to hide information in images in such
a way that it can be decrypted by the human vision if the correct key image is used. Both techniques addresses the
growing concerns of theft and tampering of digital media through the use of advanced signal processing strategies to
embed copyright and authentication information within media content in their respective manner. In this paper we
have discussed image fingerprinting with the help of visual cryptography technique.
Keywords: Authentication, Digital Media, Digital Watermarking, Fingerprinting, Image, Piracy, Visual
Cryptography


1. Introduction
With the growth of the Internet, more and more information is being transmitted in digital format (image, audio,
video, etc.) now than ever before. However, the greatest drawback in transmission of digital information is its easy
weakness to have innumerable copies of the same nature and quality as that of the original. So, there is always the
chance of lack of authentication, ownership proof and copyright protection. Therefore, various cryptography
algorithms and embedding techniques have been established to solve this type’s problems that stress on copyright
marking. Some message is secretly inserted within the original digital message and that secret message is used to
emphasize copyright over the host digital message. But all such algorithms must satisfy a number of requirements to
maintain the quality and integrity of the resultant information. The watermarking and visual cryptography both
techniques are used to secure or protect or hide data from unauthorized users.
2. Digital Watermarking
Watermarking is the process of embedding information into a digital signal which may be used to verify its
authenticity or the identity of its owners, in the same manner as paper bearing a watermark for visible
identification. In digital watermarking, the signal may be audio, pictures, or video, in which a pattern of bits
inserted into a digital image, audio or video file that identifies the file's copyright information (author, rights,
etc.) If the signal is copied, then the information also is carried in the copy. A signal may carry several
different watermarks at the same time. Digital watermarking is also called data embedding and information
hiding. Digital




                                                               42
Computer Engineering and Intelligent Systems                                                                www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.7, 2012




                                     Figure 1. Block Diagram of Watermarking Technique


Watermarking technology is an emerging field in computer science, cryptography, signal processing and
communications. According to Human Perception there are two types of watermarking, visible and invisible.
In visible digital watermarking, the information is visible in the picture or video. Typically, the information is a text
or a logo, which identifies the owner of the media. The image on the right has a visible watermark. For example
when a television broadcaster adds its logo to the corner of transmitted video, this also is a visible watermark. The
logo of the broadcaster such as Zee, Sony, ESPN and National Geographic etc is mainly on the right top corner of the
television, which is visible to every user.


In invisible digital watermarking, information is added as digital data to audio, picture, or video, but it cannot be
professed as such. The watermark may be projected for widespread use and thus, is made easy to retrieve or, it may
be a form of steganography, where a party communicates a secret message embedded in the digital signal. In either
case, as in visible watermarking, the objective is to attach ownership or other descriptive information to the signal in
a way that is difficult to remove. It also is possible to use hidden embedded information as a means of covert
communication between individuals.
One application of watermarking is in copyright protection systems, which are intended to prevent or frighten
unauthorized copying of digital media. In this use, a copy device retrieves the watermark from the signal before
making a copy; the device makes a decision whether to copy or not, depending on the contents of the watermark.
Another application is in source tracing. A watermark is embedded into a digital signal at each point of distribution.
If a copy of the work is found later, then the watermark may be retrieved from the copy and the source of the
distribution is known. This technique reportedly has been used to detect the source of illegally copied movies.
Annotation of digital photographs with descriptive information is another application of invisible watermarking.
While some file formats for digital media may contain additional information called metadata, digital watermarking
is distinctive in that the data is carried right in the signal.




                                                            43
Computer Engineering and Intelligent Systems                                                               www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.7, 2012



2.1Elements of a Watermarking System
A watermarking system can be viewed as a communication system consisting of three main components: an
embedder, a communication channel and a detector. Watermark information is embedded into the signal itself,
instead of being placed in the header of a file or using encryption like in other security techniques, in such a
way that it is extractable by the detector. To be more specific, the watermark information is embedded within
the host signal before the watermarked signal is transmitted over the communication channel, so that the
watermark can be detected at the receiving end, that is, at the detector. A general digital watermark life-cycle has
different phases which are embedding, attacking, detection and retrieval functions. The information to be embedded
in a signal is called a digital watermark, although in some contexts the phrase digital watermark means the difference
between the watermarked signal and the cover signal. The signal where the watermark is to be embedded is called
the host signal. A watermarking system shown in fig. 2 is usually divided into three distinct steps, embedding, attack,
and detection. In embedding, an algorithm accepts the host and the data to be embedded, and produces a
watermarked signal.
Then the watermarked digital signal is transmitted or stored, usually transmitted to another person. If this person
makes a modification, this is called an attack. While the modification may not be malicious, the term attack arises
from copyright protection application, where pirates attempt to remove the digital watermark through modification.
There are many possible modifications, for example, Lossy compression of the data, cropping an image or video or
intentionally adding noise. Detection often called extraction is an algorithm which is applied to the attacked signal to
attempt to extract the watermark from it. If the signal was unmodified during transmission, then the watermark still is
present and it may be extracted. In robust digital watermarking applications, the extraction algorithm should be able
to produce the watermark correctly, even if the modifications were strong. In fragile digital watermarking, the
extraction algorithm should fail if any change is made to the signal. Thus the robust digital watermarking is better as
compare to fragile because the watermark can be extract even if the information is modified strongly by unauthorized
users.
Watermarking is always regarded as a subset of steganography. However, the message hidden in watermarking is not
the major information that we want to convey. On the converse, the information hidden in steganography is always
the most important. Because of invisibility, what is hidden in both watermarking and steganography is the existence
of the signal. However, for the cryptography, what is hidden is the content of information.




                                               Figure 2. General Watermarking Systems


                                                                44
Computer Engineering and Intelligent Systems                                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.7, 2012




3. Visual Cryptography
Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. It is a
new type of cryptography technique in which no cryptographic computations is needed as the decryption end. The
secret sharing was invented independently by Adi Shamir.
The cryptography was generalised to visual cryptography by Mony Naor and Adi Shamir in 1994. When the random
image contains truly random pixels it can be seen as a one-time pad system and will offer unbreakable encryption. In
the overlay animation you can observe the two layers sliding over each other until they are correctly aligned and the
hidden information appears. To try this, you can copy the example layers 1 and 2 given in fig. 3, and print them onto
a transparent sheet or thin paper.
Always use a program that displays the black and white pixels correctly and set the printer so that all pixels are
printed accurate. You can also copy and paste them on each other in a drawing program like paint and see the result
immediately, but make sure to select transparent drawing and align both layers exactly over each other. Therefore,
the protection of rightful ownership of digital data has become an important issue in recent years. Nowadays, many
researchers are working and have proposed many techniques to protect the intellectual property rights for digital
images or information. So both methods are used to hide a meaningful data, in a host image for the purpose of
copyright protection, integrity checking, and captioning.
It is a special encryption technique to hide information in images in such a way that it can be decrypted by the
human vision if the correct key image is used. Visual Cryptography uses the basic technique to hide
information in which it uses two transparent images. One image contains random pixels and the other image
contains the secret information. It is impossible to retrieve the secret information from one of the images. Both
transparent images and layers are required to reveal the information.


3.1 Implementation of Visual Cryptography when Information is in Image Form
It is easy to implement visual cryptography to secure data when it is in image form. In the visual cryptography, if the
information is in images form than it works like this. Each pixel of the images is divided into smaller blocks. There
are always the same number white (transparent) and black blocks. If a pixel is divided into two parts, there are one
white and one black block. If the pixel is divided into four equal parts, there are two white and two black blocks. The
example images from above uses pixels that are divided into four parts.
In the fig. 3 we can see that a pixel, divided into four parts, can have six different states. If a pixel on layer 1 has a
given state, the pixel on layer 2 may have one of two states: identical or inverted to the pixel of layer 1. If the pixel of
layer 2 is identical to layer 1, the overlaid pixel will be half black and half white. Such overlaid pixel is called grey or
empty. If the pixels of layer 1 and 2 are inverted or opposite, the overlaid version will be completely black. This is an
information pixel.


We can now create the two layers. One transparent image, layer 1, has pixels which all have a random state, one of
the six possible states. Layer 2 is identical to layer 1, except for the pixels that should be black (contain information)
when overlaid. These pixels have a state that is opposite to the same pixel in layer 1. If both images are overlaid, the
areas with identical states will look gray, and the areas with opposite states will be black. The system of pixel can
be applied in different ways. In our example, each pixel is divided into four blocks. However, you can also use pixels,
divided into two rectangle blocks, or even divided circles. Also, it doesn't matter if the pixel is divided horizontally
or vertically. There are many different pixel systems, some with better contrast, higher resolution or even with colour
pixels. The pixels size or colour and resolution can be used according the requirements of the condition or problem.
In fig.3 the outcomes 12 are given but the overlaid or combination of empty pixel and information pixel can be done
in many ways. If the pixel states of layer 1 are truly (crypto secure) random, both empty and information pixels of
layer 2 will also have completely random states. One cannot know if a pixel in layer 2 is used to create a grey or
black pixel, since we need the state of that pixel in layer 1 (which is random) to know the overlay result. If all

                                                            45
Computer Engineering and Intelligent Systems                                                                www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.7, 2012



requirements for true randomness are fulfilled, Visual Cryptography offers absolute secrecy according to the
Information Theory.


If Visual Cryptography is used for secure communications, the sender will distribute one or more random layers 1 in
advance to the receiver. If the sender has a message, he creates a layer 2 for a particular distributed layer 1 and sends
it to the receiver. The receiver aligns the two layers and the secret information is revealed, this without the need for
an encryption device, a computer or performing calculations by hand. The system is unbreakable, as long as both
layers don't fall in the wrong hands. When one of both layers is intercepted it's impossible to retrieve the encrypted
information.




                                   Figure 3. Two Image Layers Overlapping to Secure Data
3.2 Implementation of Visual Cryptography by using Fingerprinting
Fingerprinting of an image is a method by which the information related to the image and its owner can be kept

                                                            46
Computer Engineering and Intelligent Systems                                                                www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.7, 2012



hidden in the image (cover image) itself. A unique image identification number, customer id and name of the image
will be used as the fingerprint of each image buy-sell transaction. This unique fingerprint will be embedded into that
particular image. The fingerprint will be generated using a text to image conversion algorithm by which secret data
will be prepared. The novelty of the algorithm lies in the fingerprinting method. It is visually encrypted to enhance
the security. The fingerprint is divided into some shares of equal size which alone does not contain any significant
information about the fingerprint unless they are visually overlapped one above the other. The complete information
in the fingerprint is divided equally among all the shares.

It is visually encrypted to enhance the security. The fingerprint is divided into some shares of equal size which alone
does not contain any significant information about the fingerprint unless they are visually overlapped one above the
other. The complete information in the fingerprint is divided equally among all the shares. To serve the fingerprinting
purpose the shares are embedded into the image in different blocks in the frequency domain. A single cover image
will contain all the shares of the fingerprint. So whole information about the fingerprint is inside the cover image but
embedded into different spatial locations. This involves a new strategy of embedding multiple watermarks in the
same image. Each share can be seen as an independent watermark and will be embedded into a different block of the
image.

The method proposed here is supposed to be very robust. The fingerprint is secure against the general image
processing attacks like noise addition and image compression. The main advantage of using a visually encrypted
fingerprint is that there is no effect of the normal correlation of the fingerprint to the image. Blind detection of the
fingerprint to illegally detect it is not possible since the correlated fingerprint will appear as noise only. Even some
shares of the fingerprint get detected but without the successful detection of every share it is impossible to regenerate
the fingerprint. So no illegal person can detect the fingerprint without knowing the all the shares altogether.

Generation of fingerprint: The logos of organizations or some standard images have been used by the
watermarking fraternity worldwide. But these are not image and customer dependent, which is the basic need for a
fingerprint. So what we propose here to generate a unique fingerprint for every image. This fingerprint will contain
in information about the customer and the image itself in the form of text. This text will be converted into image
which will finally be used as a fingerprint.

Visual cryptography: This is a very popular strategy to encrypt the images. The image is divided into some number
of equally sized shares. Individual shares do not contain any information. They all appear as noise. The only way to
extract the original image information is to overlap over each other. We are going to visually encrypt our fingerprint
into 4 shares. These shares will be embedded into the image not the original fingerprint as it is done in all the
watermarking strategies.

Averaged Block based DCT Fingerprinting: This technique is far advanced and beneficial than the classical mid
band coefficients exchange scheme. Since the coefficients in which the watermarking information is entered are
unique in every image, so it is very difficult for the users to collude the fingerprint and its embedding location in the
image.
Multi-fingerprint Algorithm: The general watermarking techniques embed only one watermark into the image.
Some have watermarked the image using more than one watermark but in a sequential manner, i.e. next watermark is
embedded into the image in the coefficients returned by first watermarking steps. This is not effective way to do so,
since if one watermarking algorithm fails then the whole chain of watermarks is lost. Also the noise added to the
image is very high. But we propose the multi-fingerprint Algorithm in which different shares generated through
visual cryptography will be embedded into the image at different spatial location altogether.


3.2.1 Proposed Steps to Secure Information in Cover Image in Visual Cryptography with Fingerprint
Step1: Generate Watermarked Image by Using Visual Cryptographic Encryption
1. Start
2. Take a Cover Image

                                                           47
Computer Engineering and Intelligent Systems                                                           www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.7, 2012



3. Subdivision of Image into four parts LL, LR, UR, and UL (As shown in Fig. 3)
4. Apply DCT method using mid-band coefficient


Step 2: Generation of Fingerprint
1. Start
2. We take input data in form of text data for example consumer id, unique image no., image name etc
3. This secure information is embedded into cover image
4. Then we get watermarked secure image




                          Figure 4. Proposed Flow Chart for Visual Cryptography with Fingerprint



                                                           48
Computer Engineering and Intelligent Systems                                                            www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.7, 2012



4. Conclusion and Future Scope
The digital watermarking and visual cryptography methods are used to hide or protect information from
unauthorized users to maintain the privacy and originality. The field of digital watermarking is young and there
are some anticipated limitations, it has potential and some unique features which other alternatives lack. Also, it
will be fruitful if the connection between data hiding and cryptography is further investigated in future.
The information hiding in visual cryptography can be applied to many applications in real and cyber world. The
advantage is that the final decryption process is done by human visual system instead of complex computations, so it
is less complex to implement as compare digital watermarking. The techniques will have a significant effect on
defence, business, copyright protection and other fields where information needs to be protected at all costs from
attackers. Intelligent Watermarking Techniques will be of great value to undergraduate and postgraduate students in
many disciplines, including engineering and computer science. It is also targeted at researchers, scientists and
engineers.


References
S.P. Mohanty, et aI., "A Dual Watennarking Technique for Images", Proc. 7th ACM International Multimedia
Conference, ACM-MM'99, Part 2, pp. 49-51, Orlando, USA, Oct. 1999.
Mahmoud El-Gayyar, Watermarking Techniques        Spatial Domain    Digital Rights Seminar, Germany, may 2006
Naor, M. and Shamir, A. 1995. Visual Cryptography. Advances in Cryptography-Eurocrypt, 950: 1-12.
Shamir, A. 1979. How to Share a Secret. Communications of the ACM. 22: 612-613.
J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking. Morgan Kaufmann Publishers, 2002.
M. Kutter and F. Hartung, "Image watennarking techniques," to appear in Proceedings of the IEEE, Special Issue on
Identification and Protection of Multimedia Infonnation, 1999.
J. Cox, "Spread-spectrum techniques for image watennarking," to appear in Proceedings of the IEEE, Special Issue
on Identification and Protection of Multimedia Infonnation, 1999.
Yusnita Yusof and Othman O. Khalifa. "Digital Watennarking for Digital Images Using Wavelet Transfonnation"
appear in proceeding of the IEEE pp.665-669, April -2007 Eason, B. Noble, and I. N. Sneddon, “On certain integrals
of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp.
529–551, April 1955.
Akio Miyazaki and Akihiro Okamoto, “Analysis of watermarking systems in the frequency domain and its
applications to design a robust watermarking system”, IEEE Transaction, pages 1969-1972, 2001.
Tan Liang, Fang Zhi-jun, “An adaptive middle frequency embedded Digital watermarking algorithm based on DCT
domain”, IEEE Transaction, pages 382- 385, 2008.
Sandeep Katta, Recursive Information Hiding in Visual Cryptography Department of Computer Science, Oklahoma
State University Stillwater, OK 74078
Stinson, D. 1995. Cryptography Theory and Practice. CRC Press.
R. J. Hwang and C. C. Chang, "Hiding a picture in two pictures," Optical Engineering, vol. 40, no. 3, 2001, pp.
342-351.
M. Naor and A. Shamir, " Visual cryptography, " Eurocrypt’94, Lecture Notes in Computer Science, Springer- Verlag,
1994, pp.1-12.
N.Nikolaidis and I.Pitas, “Robust image watermarking in the spatial domain”, Signal Processing vo1.66, 1998,
pp.385-403.
Da-Chun Wu and Wen-Hsiang Tasi, “Image Hiding in Spatial Domain Using An Image Differencing Approach”,
Proc. Of 1998 Workshop on Computer Vision, Graphics, and Image Processing, Taipei, Taiwan, pp. 280-287, 1998.
R. Wolfgang and E.J. Delp, ”A Watermark for Digital Image,” IEEE int. Conf On Image Processing, Lausanne,

                                                        49
Computer Engineering and Intelligent Systems                                                            www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.7, 2012



Switzerland, September 1996, vol. 111, pp2 19-222.
Chiou-Ting Hsu and Ja-Ling Wu, “Multiresolution Watermarking for Digital Images”, IEEE Trans. Circuits and
System II, August 1998, vol. 45, no. 8
P.Y. Lin, J.S. Lee and C.C Chang, “Dual Digital Watermarking for Internet Media Based on Hybrid Strategies”, IEEE
Transactions on Circuits and Systems for Video Technology, vol. 19, pp. 1169-1177, 09.
C.C. Chang, Y.Z. Wang, C.S. Chan, “An Efficient Probability-Based t out of n Secret Image Sharing Scheme”,
Second International Conference on Future Generation Communication and Networking Symposia, FGCNS '08,
vol.3, pp.121-124, 2008.
V. Saxena, J.P Gupta, “Collusion Attack Resistant Watermarking Scheme for              Colored Images using DCT”,
IAENG International Journal of Computer Science, 34:2, IJCS-34-2-02.


Mrs Santosh Choudhary: received her B.E. degree in Computer Science and Engineering from Modi Institute of
Technology, India and M. Tech in Computer Science & Engineering. She is pursuing Ph.D degree in “Image
processing” from Pacific University, Udaipur. She has currently associate professor & HOD in Pacific College of
Engineering, Udaipur, India and having more than 5 year teaching experiences. She guided many M. Tech scholars
and presented more than 5 papers in International and National conferences. Her current research interests include
Image Processing, Fuzzy Logic, Wireless Sensor Network and Data Structure.


Shrikrishan Yadav: working as an Assistant Professor in Computer Science and Engineering Department in PAHER
University, Udaipur, India. He has completed B. E. in Computer Science and Engineering from Mohanlal Shukhadia
University, Udaipur and pursued M.Tech. in Information Communication from Gyan Vihar University, Jaipur. He has
more than three years of teaching experience. He is also published and presented 16 papers in International and
National journals and conferences. He is an associate member of Computer Society of India (CSI), a member of
International Association of Engineers (IAENG), International Association of Engineers and Scientists (IAEST),
International Association of Computer Science and Information Technology (IACSIT) and Universal Association of
Computer and Electronics Engineers (UACEE). His current research interest includes Cognitive Radio, Wireless
Sensor Networks, Artificial Intelligence, Information Communication, and Wireless Communication System.


Neeta Sen: received her B.Sc degree in Computer Science from Mohanlal Shukhadia University (MLSU), Udaipur
India and master degree in computer application form MLSU, Udaipur. She is pursuing Ph.D degree in “Digital
Watermarking” from Pacific University, Udaipur. She is currently working as Senior Lecturer in Pacific College of
Engineering, Udaipur, India and having more than 3 year teaching experiences. She presented and published more
than 3 papers in International and National conferences. Her current research interests include Digital Watermarking,
Networking, Compiler, Computer Architecture, and Software Engineering.


Gosiya Nasreen: : received her B. Tech. degree in Computer Science and Engineering from Rajasthan Technical
University (RTU), Kota, India and pursuing master degree in computer science and engineering form Pacific
University, Udaipur. She is currently working as Lecturer in Pacific College of Engineering, Udaipur, India and
having more than 1 year teaching experiences. She presented and published more than 3 papers in International
conferences. Her current research interests include Web Services, Operating System, Embedded System, and
Software Engineering.




                                                         50
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.

More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org


The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. Prospective authors of
IISTE journals can find the submission instruction on the following page:
http://www.iiste.org/Journals/

The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.

IISTE Knowledge Sharing Partners

EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

Weitere ähnliche Inhalte

Was ist angesagt?

0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000authority12
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar10e11a0545
 
Annotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting ApplicationsAnnotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting ApplicationsDavid Crowley
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Publishing House
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Journals
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for securityIJERA Editor
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Samarth Godara
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 

Was ist angesagt? (18)

0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
1709 1715
1709 17151709 1715
1709 1715
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Annotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting ApplicationsAnnotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting Applications
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
 
Ppt nc
Ppt ncPpt nc
Ppt nc
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for security
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
280 284
280 284280 284
280 284
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

Andere mochten auch

11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptographyAlexander Decker
 
Watermarking
WatermarkingWatermarking
WatermarkingNova Sari
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESIJTET Journal
 
Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesDebarko De
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual CryptographyAneeshGKumar
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
Visual cryptography for color images
Visual cryptography for color imagesVisual cryptography for color images
Visual cryptography for color imagesIIT Delhi
 

Andere mochten auch (13)

11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
 
dwm
dwmdwm
dwm
 
Watermarking
WatermarkingWatermarking
Watermarking
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful Shares
 
Robust watermarking technique sppt
Robust watermarking technique spptRobust watermarking technique sppt
Robust watermarking technique sppt
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Visual cryptography for color images
Visual cryptography for color imagesVisual cryptography for color images
Visual cryptography for color images
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 

Ähnlich wie A study of image fingerprinting by using visual cryptography

Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Journals
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueIRJET Journal
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYIRJET Journal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsYogeshIJTSRD
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
 
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...AIRCC Publishing Corporation
 
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ijcsit
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...IRJET Journal
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
 
Copyright protection for images on android phones
Copyright protection for images on android phonesCopyright protection for images on android phones
Copyright protection for images on android phoneseSAT Publishing House
 
Digital water marking
Digital water markingDigital water marking
Digital water markingMd Aktar
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
 

Ähnlich wie A study of image fingerprinting by using visual cryptography (20)

Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
1709 1715
1709 17151709 1715
1709 1715
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
 
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
Copyright protection for images on android phones
Copyright protection for images on android phonesCopyright protection for images on android phones
Copyright protection for images on android phones
 
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 

Mehr von Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mehr von Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Kürzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

A study of image fingerprinting by using visual cryptography

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.7, 2012 A Study of Image Fingerprinting by Using Visual Cryptography Santosh Choudhary, Shrikrishan Yadav*, Neeta Sen, Gosiya Nasreen Pacific College of Engineering, Pacific University, Udaipur-313001, Rajasthan, India * E-mail of the corresponding author Abstract As digital media has made our life more colourful because of its advantages like easier to access, copy and distribute. But as what we have seen, series of malice activities like copyright infringement, counterfeiting, piracy and information distortion make damages to both the producers and the users of digital products. So we really need some technology to protect the copyright, authenticity, integrity of the digital products and the intellectual property of the users. There are many techniques such as Digital watermarking and Visual Cryptography both have been widely used for protection of data either in text, video, sound or digital images form in modern network time. Digital watermarking is an evolving field that requires continuous effort to find for the best possible method in protecting multimedia content. But Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. Both techniques addresses the growing concerns of theft and tampering of digital media through the use of advanced signal processing strategies to embed copyright and authentication information within media content in their respective manner. In this paper we have discussed image fingerprinting with the help of visual cryptography technique. Keywords: Authentication, Digital Media, Digital Watermarking, Fingerprinting, Image, Piracy, Visual Cryptography 1. Introduction With the growth of the Internet, more and more information is being transmitted in digital format (image, audio, video, etc.) now than ever before. However, the greatest drawback in transmission of digital information is its easy weakness to have innumerable copies of the same nature and quality as that of the original. So, there is always the chance of lack of authentication, ownership proof and copyright protection. Therefore, various cryptography algorithms and embedding techniques have been established to solve this type’s problems that stress on copyright marking. Some message is secretly inserted within the original digital message and that secret message is used to emphasize copyright over the host digital message. But all such algorithms must satisfy a number of requirements to maintain the quality and integrity of the resultant information. The watermarking and visual cryptography both techniques are used to secure or protect or hide data from unauthorized users. 2. Digital Watermarking Watermarking is the process of embedding information into a digital signal which may be used to verify its authenticity or the identity of its owners, in the same manner as paper bearing a watermark for visible identification. In digital watermarking, the signal may be audio, pictures, or video, in which a pattern of bits inserted into a digital image, audio or video file that identifies the file's copyright information (author, rights, etc.) If the signal is copied, then the information also is carried in the copy. A signal may carry several different watermarks at the same time. Digital watermarking is also called data embedding and information hiding. Digital 42
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.7, 2012 Figure 1. Block Diagram of Watermarking Technique Watermarking technology is an emerging field in computer science, cryptography, signal processing and communications. According to Human Perception there are two types of watermarking, visible and invisible. In visible digital watermarking, the information is visible in the picture or video. Typically, the information is a text or a logo, which identifies the owner of the media. The image on the right has a visible watermark. For example when a television broadcaster adds its logo to the corner of transmitted video, this also is a visible watermark. The logo of the broadcaster such as Zee, Sony, ESPN and National Geographic etc is mainly on the right top corner of the television, which is visible to every user. In invisible digital watermarking, information is added as digital data to audio, picture, or video, but it cannot be professed as such. The watermark may be projected for widespread use and thus, is made easy to retrieve or, it may be a form of steganography, where a party communicates a secret message embedded in the digital signal. In either case, as in visible watermarking, the objective is to attach ownership or other descriptive information to the signal in a way that is difficult to remove. It also is possible to use hidden embedded information as a means of covert communication between individuals. One application of watermarking is in copyright protection systems, which are intended to prevent or frighten unauthorized copying of digital media. In this use, a copy device retrieves the watermark from the signal before making a copy; the device makes a decision whether to copy or not, depending on the contents of the watermark. Another application is in source tracing. A watermark is embedded into a digital signal at each point of distribution. If a copy of the work is found later, then the watermark may be retrieved from the copy and the source of the distribution is known. This technique reportedly has been used to detect the source of illegally copied movies. Annotation of digital photographs with descriptive information is another application of invisible watermarking. While some file formats for digital media may contain additional information called metadata, digital watermarking is distinctive in that the data is carried right in the signal. 43
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.7, 2012 2.1Elements of a Watermarking System A watermarking system can be viewed as a communication system consisting of three main components: an embedder, a communication channel and a detector. Watermark information is embedded into the signal itself, instead of being placed in the header of a file or using encryption like in other security techniques, in such a way that it is extractable by the detector. To be more specific, the watermark information is embedded within the host signal before the watermarked signal is transmitted over the communication channel, so that the watermark can be detected at the receiving end, that is, at the detector. A general digital watermark life-cycle has different phases which are embedding, attacking, detection and retrieval functions. The information to be embedded in a signal is called a digital watermark, although in some contexts the phrase digital watermark means the difference between the watermarked signal and the cover signal. The signal where the watermark is to be embedded is called the host signal. A watermarking system shown in fig. 2 is usually divided into three distinct steps, embedding, attack, and detection. In embedding, an algorithm accepts the host and the data to be embedded, and produces a watermarked signal. Then the watermarked digital signal is transmitted or stored, usually transmitted to another person. If this person makes a modification, this is called an attack. While the modification may not be malicious, the term attack arises from copyright protection application, where pirates attempt to remove the digital watermark through modification. There are many possible modifications, for example, Lossy compression of the data, cropping an image or video or intentionally adding noise. Detection often called extraction is an algorithm which is applied to the attacked signal to attempt to extract the watermark from it. If the signal was unmodified during transmission, then the watermark still is present and it may be extracted. In robust digital watermarking applications, the extraction algorithm should be able to produce the watermark correctly, even if the modifications were strong. In fragile digital watermarking, the extraction algorithm should fail if any change is made to the signal. Thus the robust digital watermarking is better as compare to fragile because the watermark can be extract even if the information is modified strongly by unauthorized users. Watermarking is always regarded as a subset of steganography. However, the message hidden in watermarking is not the major information that we want to convey. On the converse, the information hidden in steganography is always the most important. Because of invisibility, what is hidden in both watermarking and steganography is the existence of the signal. However, for the cryptography, what is hidden is the content of information. Figure 2. General Watermarking Systems 44
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.7, 2012 3. Visual Cryptography Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. It is a new type of cryptography technique in which no cryptographic computations is needed as the decryption end. The secret sharing was invented independently by Adi Shamir. The cryptography was generalised to visual cryptography by Mony Naor and Adi Shamir in 1994. When the random image contains truly random pixels it can be seen as a one-time pad system and will offer unbreakable encryption. In the overlay animation you can observe the two layers sliding over each other until they are correctly aligned and the hidden information appears. To try this, you can copy the example layers 1 and 2 given in fig. 3, and print them onto a transparent sheet or thin paper. Always use a program that displays the black and white pixels correctly and set the printer so that all pixels are printed accurate. You can also copy and paste them on each other in a drawing program like paint and see the result immediately, but make sure to select transparent drawing and align both layers exactly over each other. Therefore, the protection of rightful ownership of digital data has become an important issue in recent years. Nowadays, many researchers are working and have proposed many techniques to protect the intellectual property rights for digital images or information. So both methods are used to hide a meaningful data, in a host image for the purpose of copyright protection, integrity checking, and captioning. It is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. Visual Cryptography uses the basic technique to hide information in which it uses two transparent images. One image contains random pixels and the other image contains the secret information. It is impossible to retrieve the secret information from one of the images. Both transparent images and layers are required to reveal the information. 3.1 Implementation of Visual Cryptography when Information is in Image Form It is easy to implement visual cryptography to secure data when it is in image form. In the visual cryptography, if the information is in images form than it works like this. Each pixel of the images is divided into smaller blocks. There are always the same number white (transparent) and black blocks. If a pixel is divided into two parts, there are one white and one black block. If the pixel is divided into four equal parts, there are two white and two black blocks. The example images from above uses pixels that are divided into four parts. In the fig. 3 we can see that a pixel, divided into four parts, can have six different states. If a pixel on layer 1 has a given state, the pixel on layer 2 may have one of two states: identical or inverted to the pixel of layer 1. If the pixel of layer 2 is identical to layer 1, the overlaid pixel will be half black and half white. Such overlaid pixel is called grey or empty. If the pixels of layer 1 and 2 are inverted or opposite, the overlaid version will be completely black. This is an information pixel. We can now create the two layers. One transparent image, layer 1, has pixels which all have a random state, one of the six possible states. Layer 2 is identical to layer 1, except for the pixels that should be black (contain information) when overlaid. These pixels have a state that is opposite to the same pixel in layer 1. If both images are overlaid, the areas with identical states will look gray, and the areas with opposite states will be black. The system of pixel can be applied in different ways. In our example, each pixel is divided into four blocks. However, you can also use pixels, divided into two rectangle blocks, or even divided circles. Also, it doesn't matter if the pixel is divided horizontally or vertically. There are many different pixel systems, some with better contrast, higher resolution or even with colour pixels. The pixels size or colour and resolution can be used according the requirements of the condition or problem. In fig.3 the outcomes 12 are given but the overlaid or combination of empty pixel and information pixel can be done in many ways. If the pixel states of layer 1 are truly (crypto secure) random, both empty and information pixels of layer 2 will also have completely random states. One cannot know if a pixel in layer 2 is used to create a grey or black pixel, since we need the state of that pixel in layer 1 (which is random) to know the overlay result. If all 45
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.7, 2012 requirements for true randomness are fulfilled, Visual Cryptography offers absolute secrecy according to the Information Theory. If Visual Cryptography is used for secure communications, the sender will distribute one or more random layers 1 in advance to the receiver. If the sender has a message, he creates a layer 2 for a particular distributed layer 1 and sends it to the receiver. The receiver aligns the two layers and the secret information is revealed, this without the need for an encryption device, a computer or performing calculations by hand. The system is unbreakable, as long as both layers don't fall in the wrong hands. When one of both layers is intercepted it's impossible to retrieve the encrypted information. Figure 3. Two Image Layers Overlapping to Secure Data 3.2 Implementation of Visual Cryptography by using Fingerprinting Fingerprinting of an image is a method by which the information related to the image and its owner can be kept 46
  • 6. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.7, 2012 hidden in the image (cover image) itself. A unique image identification number, customer id and name of the image will be used as the fingerprint of each image buy-sell transaction. This unique fingerprint will be embedded into that particular image. The fingerprint will be generated using a text to image conversion algorithm by which secret data will be prepared. The novelty of the algorithm lies in the fingerprinting method. It is visually encrypted to enhance the security. The fingerprint is divided into some shares of equal size which alone does not contain any significant information about the fingerprint unless they are visually overlapped one above the other. The complete information in the fingerprint is divided equally among all the shares. It is visually encrypted to enhance the security. The fingerprint is divided into some shares of equal size which alone does not contain any significant information about the fingerprint unless they are visually overlapped one above the other. The complete information in the fingerprint is divided equally among all the shares. To serve the fingerprinting purpose the shares are embedded into the image in different blocks in the frequency domain. A single cover image will contain all the shares of the fingerprint. So whole information about the fingerprint is inside the cover image but embedded into different spatial locations. This involves a new strategy of embedding multiple watermarks in the same image. Each share can be seen as an independent watermark and will be embedded into a different block of the image. The method proposed here is supposed to be very robust. The fingerprint is secure against the general image processing attacks like noise addition and image compression. The main advantage of using a visually encrypted fingerprint is that there is no effect of the normal correlation of the fingerprint to the image. Blind detection of the fingerprint to illegally detect it is not possible since the correlated fingerprint will appear as noise only. Even some shares of the fingerprint get detected but without the successful detection of every share it is impossible to regenerate the fingerprint. So no illegal person can detect the fingerprint without knowing the all the shares altogether. Generation of fingerprint: The logos of organizations or some standard images have been used by the watermarking fraternity worldwide. But these are not image and customer dependent, which is the basic need for a fingerprint. So what we propose here to generate a unique fingerprint for every image. This fingerprint will contain in information about the customer and the image itself in the form of text. This text will be converted into image which will finally be used as a fingerprint. Visual cryptography: This is a very popular strategy to encrypt the images. The image is divided into some number of equally sized shares. Individual shares do not contain any information. They all appear as noise. The only way to extract the original image information is to overlap over each other. We are going to visually encrypt our fingerprint into 4 shares. These shares will be embedded into the image not the original fingerprint as it is done in all the watermarking strategies. Averaged Block based DCT Fingerprinting: This technique is far advanced and beneficial than the classical mid band coefficients exchange scheme. Since the coefficients in which the watermarking information is entered are unique in every image, so it is very difficult for the users to collude the fingerprint and its embedding location in the image. Multi-fingerprint Algorithm: The general watermarking techniques embed only one watermark into the image. Some have watermarked the image using more than one watermark but in a sequential manner, i.e. next watermark is embedded into the image in the coefficients returned by first watermarking steps. This is not effective way to do so, since if one watermarking algorithm fails then the whole chain of watermarks is lost. Also the noise added to the image is very high. But we propose the multi-fingerprint Algorithm in which different shares generated through visual cryptography will be embedded into the image at different spatial location altogether. 3.2.1 Proposed Steps to Secure Information in Cover Image in Visual Cryptography with Fingerprint Step1: Generate Watermarked Image by Using Visual Cryptographic Encryption 1. Start 2. Take a Cover Image 47
  • 7. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.7, 2012 3. Subdivision of Image into four parts LL, LR, UR, and UL (As shown in Fig. 3) 4. Apply DCT method using mid-band coefficient Step 2: Generation of Fingerprint 1. Start 2. We take input data in form of text data for example consumer id, unique image no., image name etc 3. This secure information is embedded into cover image 4. Then we get watermarked secure image Figure 4. Proposed Flow Chart for Visual Cryptography with Fingerprint 48
  • 8. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.7, 2012 4. Conclusion and Future Scope The digital watermarking and visual cryptography methods are used to hide or protect information from unauthorized users to maintain the privacy and originality. The field of digital watermarking is young and there are some anticipated limitations, it has potential and some unique features which other alternatives lack. Also, it will be fruitful if the connection between data hiding and cryptography is further investigated in future. The information hiding in visual cryptography can be applied to many applications in real and cyber world. The advantage is that the final decryption process is done by human visual system instead of complex computations, so it is less complex to implement as compare digital watermarking. The techniques will have a significant effect on defence, business, copyright protection and other fields where information needs to be protected at all costs from attackers. Intelligent Watermarking Techniques will be of great value to undergraduate and postgraduate students in many disciplines, including engineering and computer science. It is also targeted at researchers, scientists and engineers. References S.P. Mohanty, et aI., "A Dual Watennarking Technique for Images", Proc. 7th ACM International Multimedia Conference, ACM-MM'99, Part 2, pp. 49-51, Orlando, USA, Oct. 1999. Mahmoud El-Gayyar, Watermarking Techniques Spatial Domain Digital Rights Seminar, Germany, may 2006 Naor, M. and Shamir, A. 1995. Visual Cryptography. Advances in Cryptography-Eurocrypt, 950: 1-12. Shamir, A. 1979. How to Share a Secret. Communications of the ACM. 22: 612-613. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking. Morgan Kaufmann Publishers, 2002. M. Kutter and F. Hartung, "Image watennarking techniques," to appear in Proceedings of the IEEE, Special Issue on Identification and Protection of Multimedia Infonnation, 1999. J. Cox, "Spread-spectrum techniques for image watennarking," to appear in Proceedings of the IEEE, Special Issue on Identification and Protection of Multimedia Infonnation, 1999. Yusnita Yusof and Othman O. Khalifa. "Digital Watennarking for Digital Images Using Wavelet Transfonnation" appear in proceeding of the IEEE pp.665-669, April -2007 Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551, April 1955. Akio Miyazaki and Akihiro Okamoto, “Analysis of watermarking systems in the frequency domain and its applications to design a robust watermarking system”, IEEE Transaction, pages 1969-1972, 2001. Tan Liang, Fang Zhi-jun, “An adaptive middle frequency embedded Digital watermarking algorithm based on DCT domain”, IEEE Transaction, pages 382- 385, 2008. Sandeep Katta, Recursive Information Hiding in Visual Cryptography Department of Computer Science, Oklahoma State University Stillwater, OK 74078 Stinson, D. 1995. Cryptography Theory and Practice. CRC Press. R. J. Hwang and C. C. Chang, "Hiding a picture in two pictures," Optical Engineering, vol. 40, no. 3, 2001, pp. 342-351. M. Naor and A. Shamir, " Visual cryptography, " Eurocrypt’94, Lecture Notes in Computer Science, Springer- Verlag, 1994, pp.1-12. N.Nikolaidis and I.Pitas, “Robust image watermarking in the spatial domain”, Signal Processing vo1.66, 1998, pp.385-403. Da-Chun Wu and Wen-Hsiang Tasi, “Image Hiding in Spatial Domain Using An Image Differencing Approach”, Proc. Of 1998 Workshop on Computer Vision, Graphics, and Image Processing, Taipei, Taiwan, pp. 280-287, 1998. R. Wolfgang and E.J. Delp, ”A Watermark for Digital Image,” IEEE int. Conf On Image Processing, Lausanne, 49
  • 9. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.7, 2012 Switzerland, September 1996, vol. 111, pp2 19-222. Chiou-Ting Hsu and Ja-Ling Wu, “Multiresolution Watermarking for Digital Images”, IEEE Trans. Circuits and System II, August 1998, vol. 45, no. 8 P.Y. Lin, J.S. Lee and C.C Chang, “Dual Digital Watermarking for Internet Media Based on Hybrid Strategies”, IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, pp. 1169-1177, 09. C.C. Chang, Y.Z. Wang, C.S. Chan, “An Efficient Probability-Based t out of n Secret Image Sharing Scheme”, Second International Conference on Future Generation Communication and Networking Symposia, FGCNS '08, vol.3, pp.121-124, 2008. V. Saxena, J.P Gupta, “Collusion Attack Resistant Watermarking Scheme for Colored Images using DCT”, IAENG International Journal of Computer Science, 34:2, IJCS-34-2-02. Mrs Santosh Choudhary: received her B.E. degree in Computer Science and Engineering from Modi Institute of Technology, India and M. Tech in Computer Science & Engineering. She is pursuing Ph.D degree in “Image processing” from Pacific University, Udaipur. She has currently associate professor & HOD in Pacific College of Engineering, Udaipur, India and having more than 5 year teaching experiences. She guided many M. Tech scholars and presented more than 5 papers in International and National conferences. Her current research interests include Image Processing, Fuzzy Logic, Wireless Sensor Network and Data Structure. Shrikrishan Yadav: working as an Assistant Professor in Computer Science and Engineering Department in PAHER University, Udaipur, India. He has completed B. E. in Computer Science and Engineering from Mohanlal Shukhadia University, Udaipur and pursued M.Tech. in Information Communication from Gyan Vihar University, Jaipur. He has more than three years of teaching experience. He is also published and presented 16 papers in International and National journals and conferences. He is an associate member of Computer Society of India (CSI), a member of International Association of Engineers (IAENG), International Association of Engineers and Scientists (IAEST), International Association of Computer Science and Information Technology (IACSIT) and Universal Association of Computer and Electronics Engineers (UACEE). His current research interest includes Cognitive Radio, Wireless Sensor Networks, Artificial Intelligence, Information Communication, and Wireless Communication System. Neeta Sen: received her B.Sc degree in Computer Science from Mohanlal Shukhadia University (MLSU), Udaipur India and master degree in computer application form MLSU, Udaipur. She is pursuing Ph.D degree in “Digital Watermarking” from Pacific University, Udaipur. She is currently working as Senior Lecturer in Pacific College of Engineering, Udaipur, India and having more than 3 year teaching experiences. She presented and published more than 3 papers in International and National conferences. Her current research interests include Digital Watermarking, Networking, Compiler, Computer Architecture, and Software Engineering. Gosiya Nasreen: : received her B. Tech. degree in Computer Science and Engineering from Rajasthan Technical University (RTU), Kota, India and pursuing master degree in computer science and engineering form Pacific University, Udaipur. She is currently working as Lecturer in Pacific College of Engineering, Udaipur, India and having more than 1 year teaching experiences. She presented and published more than 3 papers in International conferences. Her current research interests include Web Services, Operating System, Embedded System, and Software Engineering. 50
  • 10. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/Journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar