A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Watermarking Is Not Cryptography
[chapter]
2006
Lecture Notes in Computer Science
We note that the fields of communications and cryptography are quite distinct and while communications systems often combine technologies from the two fields, a layered architecture is applied that requires ...
We believe that the fundamental role of watermarking is the reliable embedding and detection of information and should therefore be considered a form of communications. ...
Since much of the motivation for watermarking is driven by security concerns, it is not surprising that analogies have been made between watermarking and cryptography. ...
doi:10.1007/11922841_1
fatcat:eiuxm2jzcjbezluohlxxb57vaq
Halftone Image Watermarking based on Visual Cryptography
2012
International Journal of Computer Applications
At the time of watermark embedding verification share is generated and at the time of watermark extraction master share is generated using (2, 2) visual cryptography scheme. ...
The scheme does not embed the watermark directly on the halftone image instead watermark will be divided into the parts called as shares. ...
The scheme is based on visual cryptography and watermark is embedded as a share, which does not reveal complete information about the original watermark, hence it will reduce the chances of watermarking ...
doi:10.5120/5805-8010
fatcat:x3v4yqz2qfgardgoarn2s6xuiu
A Review on Secret Image Protection using Reversible Watermarking
2017
IJARCCE
A cryptography technique provides security to image and watermark provides authentication to images. ...
In this paper we are going to proposed a technique in which first the secret image is encrypted using a key image, then encrypted image is watermarked using the watermark image, then it is passed through ...
The order of the operations is important; if the order is not followed then the original image will not be obtained. ...
doi:10.17148/ijarcce.2017.6135
fatcat:zepqkqq22zfv3dsyktwoolgwzq
Image Security using Digital Image Watermarking and Visual Cryptography Techniques
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
The secret key is generated from the watermark image with the help of visual cryptography to claim the ownership of images. ...
The digital watermarking is employed in the protection of digital information. ...
However, the cover image is not required, the secret key is enough for the blind watermark technique. ...
doi:10.35940/ijitee.d1798.029420
fatcat:vhvjg7feergo5fb5bbypi74mja
A Theoretical Approach to Secure Medical Images by Combining Cryptography and Watermarking Techniques
2020
Engineering and Scientific International Journal
This paper provides a road map in constructing new algorithm by combining cryptography and watermarking technique for secure transaction of medical. ...
Telemedicine is that the remote delivery of healthcare services over the telecommunication infrastructure. ...
However the embedded watermark is not robust against attacks like lossy compression. ...
doi:10.30726/esij/v7.i3.2020.73014
fatcat:ghvvnzxarvhilfwsu6qxg542fa
Privacy and Ownership Protection Digital Data Techniques: Comparison and Survey
2016
Indian Journal of Science and Technology
This paper reviews various recent advancement made in the field of DHT particularly the cryptography, steganography and digital watermarking. ...
Findings: The various digital data hiding techniques have their own unique features and processing methods for hiding or maintaining the secrecy of the original information but watermarking is emerging ...
Cryptography and watermarking techniques are almost related techniques, but in watermarking encryption is not always present. ...
doi:10.17485/ijst/2015/v8i1/106904
fatcat:zplz5ypbubhzxnvcekjaseno5i
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
2007
Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)
This paper proposes a scheme to hide multiple watermarks in transparencies of visual cryptography. On one hand, the main properties of the traditional visual cryptography are still maintained. ...
On the other hand, not only the encrypted image can be visible when stacking the transparencies, but also two extra watermarks can be extracted with simple computations. ...
In visual cryptography, it is desirable to embed data in encrypted transparencies to protect them. In this paper, we focus on embedding two different watermarks transparencies in visual cryptography. ...
doi:10.1109/iihmsp.2007.4457550
dblp:conf/iih-msp/LuoPL07
fatcat:tk77e3rszrdp7jwqokzvmuebxq
Combined Analysis of Visual Cryptography using SVD Technique and Frequency Domain Watermarking Technique
2015
International Journal of Engineering Research and
In this paper Frequency Domain (FD) watermarking technique is used to prevent distorts attacks in the VC scheme. ...
The proposed method deals with the visual cryptography using a new combined technique called SVD technique with frequency domain watermarking technique. ...
Shares generation using Visual cryptography
CONCLUSION Here the combined analysis of visual cryptography and the watermarking technique is done. ...
doi:10.17577/ijertv4is050361
fatcat:rgnvbnnoyncqloknmunwhoctpe
Importance and Techniques of Information Hiding : A Review
English
2014
International Journal of Computer Trends and Technology
English
Information or data is very crucial resource to us. Thus securing the information becomes all the more necessary. ...
The communication media through which we send data does not provide data security, so other methods of securing data are required. Information hiding plays a very crucial role today. ...
Digital watermarking is a passive protection tool. It just marks the data, but does not degrade it nor controls access to data [5].One application of digital watermarking is source tracking. ...
doi:10.14445/22312803/ijctt-v9p149
fatcat:d2sgdjm3wveo5d6ilmmoba4bfu
Performance Evaluation of watermarking Schemes to Decide Meaningful Number of Shares
2017
IRA-International Journal of Technology & Engineering (ISSN 2455-4480)
Digital watermarking using visual cryptography provides improved security<br />for encrypting secret images.</p> ...
<br />Then only the hiding watermark is embedded into the original image and the secret<br />watermark is reserved for watermark extracting by the owner. ...
Robustness means the watermark pattern is not easy to detect and remove illegally. ...
doi:10.21013/jte.icsesd201709
fatcat:orsti2el2bdd7irwug73qpqzqm
Enhance Security for Image Encryption and Decryption by Applying Hybrid Techniques Using MATLAB
English
2015
International Journal of Innovative Research in Computer and Communication Engineering
English
Cryptography, Steganography and Digital watermarking are widely used for Image Encryption and Textual Data Encryption and also we have various classification of these techniques. ...
paper we study of Hybrid Cryptographic Encryption Techniques and also use of other encryption techniques to enhance their level of security and also study of their combination of Hybrid Techniques which is ...
Ravinder Kumar for assisting with data collection and stimulus preparation of the Hybrid Cryptographic Technique with Digital watermarking studies and it"s coding, and also thankful of my friend Kanak ...
doi:10.15680/ijircce.2015.0307009
fatcat:srsvxndmwvgjndpb4hhiakjnte
Review on secured data capabilities of cryptography, steganography, and watermarking domain
2020
Indonesian Journal of Electrical Engineering and Computer Science
This paper concludes that cryptography techniques could be utilized with steganography and watermarking in secured data domain to enhance the security mechanisms.</span> ...
The main objective of this study is explore the capabilities of secured data that used widely by researchers. ...
This paper introduced a comparison study between cryptography, steganography, and watermarking techniques that are widely used to ensure information is secured. ...
doi:10.11591/ijeecs.v17.i2.pp1053-1058
fatcat:zug25t23hffk5f53wb2ev6rede
Securing Digital Images Using visual Cryptography
2016
INTERNATIONAL JOURNAL OF EMERGING TRENDS IN SCIENCE AND TECHNOLOGY
Cryptography in the study of mathematical techniques related aspects of information security such as confidentialities, data security, entity authentication, but it is not only the means of providing information ...
is a new technique which provides information security which user simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. ...
Visual cryptography does not need any special decryption algorithm, the secret image can be decrypted by necked eyes. ...
doi:10.18535/ijetst/v2i12.05
fatcat:duvh2huctfaa3fwhtfqkkuicjq
Digital Signature and Watermark Methods For Image Authentication using Cryptography Analysis
2011
Signal & Image Processing An International Journal
A digital watermark and signature method for image authentication using cryptography analysis is proposed. The digital signature created for the original image and apply watermark. ...
The encryption is used to securely transmit data in open networks for the encryption of an image using public key and decrypt that image using private key. ...
Methodologies
Digital signature and Watermarking Digital signature is a sort of Cryptography. Cryptography means keeping communications private. ...
doi:10.5121/sipij.2011.2214
fatcat:zgmjzgcqxvhu5f4ottlsvcfcky
A Robust Visual Cryptography Technique for Photographic Grayscale Images Using Block Optimization and Blind Invisible Watermarking
2012
Journal of clean energy technologies
Index Terms-Blind invisible watermarking, block preparation, host image, shares, visual cryptography. ...
Also we have addressed the issue of preventing cheating attacks in the proposed Visual Cryptography Scheme by invisibly watermarking the shares onto Host Images. ...
With visible watermarking of images, a secondary image (the watermark) is embedded in a primary image in such that it is perceptible to a human observer, whereas the embedded data is not detectable in ...
doi:10.7763/ijcte.2012.v4.469
fatcat:ra7jr6g23bhgljghit4jovtebi
« Previous
Showing results 1 — 15 out of 4,989 results