CFP last date
20 May 2024
Reseach Article

Article:Invisible Digital Watermarking Through Encryption

by Avishek Raychoudhury, Tuhin Utsab Paul, Samir Kumar Bandyopadhyay
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 8
Year of Publication: 2010
Authors: Avishek Raychoudhury, Tuhin Utsab Paul, Samir Kumar Bandyopadhyay
10.5120/849-1187

Avishek Raychoudhury, Tuhin Utsab Paul, Samir Kumar Bandyopadhyay . Article:Invisible Digital Watermarking Through Encryption. International Journal of Computer Applications. 4, 8 ( August 2010), 18-20. DOI=10.5120/849-1187

@article{ 10.5120/849-1187,
author = { Avishek Raychoudhury, Tuhin Utsab Paul, Samir Kumar Bandyopadhyay },
title = { Article:Invisible Digital Watermarking Through Encryption },
journal = { International Journal of Computer Applications },
issue_date = { August 2010 },
volume = { 4 },
number = { 8 },
month = { August },
year = { 2010 },
issn = { 0975-8887 },
pages = { 18-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume4/number8/849-1187/ },
doi = { 10.5120/849-1187 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:52:31.901532+05:30
%A Avishek Raychoudhury
%A Tuhin Utsab Paul
%A Samir Kumar Bandyopadhyay
%T Article:Invisible Digital Watermarking Through Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 4
%N 8
%P 18-20
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A technique for hiding the data of images has been proposed in this paper. At the source, the image that is to be hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be of any size, which will be adjusted by our resize function thereby, removing the size constraint. Secondly, for the security of transmission over network, only the final encrypted image i.e. cover image and target image is sent over the network. This image is easily decoded at the receiver end. Results are encouraging from practical point of view.

References
  1. Dobsicek, M., Extended steganographic system. In: 8th Intl. Student Conf. on Electrical Engineering, FEE CTU 2004, Poster 04.
  2. 2. Yusuk Lim, Changsheng Xu and David Dagan Feng, “Web based Image Authentication Using Invisible Fragile Watermark”, 2001, Pan-Sydney Area Workshop on Visual Information Processing (VIP2001), Sydney, Australia, Page(s): 31 - 34
  3. 3. Min Wu, Member, IEEE, and Bede Liu, Fellow, IEEE, “Data Hiding in Binary Image for Authentication and Annotation”, IEEE Trans. Image Processing, volume 6, Issue 4, Aug. 2004 Page(s): 528 - 538
  4. 4. Rehab H. Alwan, Fadhil J. Kadhim, and Ahmad T. Al-Taani, “Data Embedding Based on Better Use of Bits in Image Pixels”, International Journal of Signal Processing Vol 2, No. 2, 2005, Page(s): 104 - 107
  5. 5. Nameer N. EL-Emam "Hiding a large amount of data with high security using steganography algorithm", Journal of Computer Science. April 2007, Page(s): 223 – 232
  6. S.K.Bandyopadhyay, Debnath Bhattacharyya, Swarnendu Mukherjee, Debashis Ganguly, PoulumiDas, "A Secure Scheme for Image Transformation", August 2008, IEEE SNPD, Page(s): 490 – 493
  7. G. Sahoo, R. K. Tiwari, "Designing an Embedded Algorithm for Data Hiding using Steganographic
Index Terms

Computer Science
Information Sciences

Keywords

Data image Hiding Security Encryption Introduction