Filters








4,989 Hits in 3.3 sec

Watermarking Is Not Cryptography [chapter]

Ingemar J. Cox, Gwenaël Doërr, Teddy Furon
2006 Lecture Notes in Computer Science  
We note that the fields of communications and cryptography are quite distinct and while communications systems often combine technologies from the two fields, a layered architecture is applied that requires  ...  We believe that the fundamental role of watermarking is the reliable embedding and detection of information and should therefore be considered a form of communications.  ...  Since much of the motivation for watermarking is driven by security concerns, it is not surprising that analogies have been made between watermarking and cryptography.  ... 
doi:10.1007/11922841_1 fatcat:eiuxm2jzcjbezluohlxxb57vaq

Halftone Image Watermarking based on Visual Cryptography

Jaishri Chourasia, M. B. Potdar, Abdul Jhummarwala, Keyur Parmar
2012 International Journal of Computer Applications  
At the time of watermark embedding verification share is generated and at the time of watermark extraction master share is generated using (2, 2) visual cryptography scheme.  ...  The scheme does not embed the watermark directly on the halftone image instead watermark will be divided into the parts called as shares.  ...  The scheme is based on visual cryptography and watermark is embedded as a share, which does not reveal complete information about the original watermark, hence it will reduce the chances of watermarking  ... 
doi:10.5120/5805-8010 fatcat:x3v4yqz2qfgardgoarn2s6xuiu

A Review on Secret Image Protection using Reversible Watermarking

Samrudhi S. Mamarde, Dr. Siddharth A. Ladhake
2017 IJARCCE  
A cryptography technique provides security to image and watermark provides authentication to images.  ...  In this paper we are going to proposed a technique in which first the secret image is encrypted using a key image, then encrypted image is watermarked using the watermark image, then it is passed through  ...  The order of the operations is important; if the order is not followed then the original image will not be obtained.  ... 
doi:10.17148/ijarcce.2017.6135 fatcat:zepqkqq22zfv3dsyktwoolgwzq

Image Security using Digital Image Watermarking and Visual Cryptography Techniques

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
The secret key is generated from the watermark image with the help of visual cryptography to claim the ownership of images.  ...  The digital watermarking is employed in the protection of digital information.  ...  However, the cover image is not required, the secret key is enough for the blind watermark technique.  ... 
doi:10.35940/ijitee.d1798.029420 fatcat:vhvjg7feergo5fb5bbypi74mja

A Theoretical Approach to Secure Medical Images by Combining Cryptography and Watermarking Techniques

K. Anusudha
2020 Engineering and Scientific International Journal  
This paper provides a road map in constructing new algorithm by combining cryptography and watermarking technique for secure transaction of medical.  ...  Telemedicine is that the remote delivery of healthcare services over the telecommunication infrastructure.  ...  However the embedded watermark is not robust against attacks like lossy compression.  ... 
doi:10.30726/esij/v7.i3.2020.73014 fatcat:ghvvnzxarvhilfwsu6qxg542fa

Privacy and Ownership Protection Digital Data Techniques: Comparison and Survey

H. Thakur, G. Singh
2016 Indian Journal of Science and Technology  
This paper reviews various recent advancement made in the field of DHT particularly the cryptography, steganography and digital watermarking.  ...  Findings: The various digital data hiding techniques have their own unique features and processing methods for hiding or maintaining the secrecy of the original information but watermarking is emerging  ...  Cryptography and watermarking techniques are almost related techniques, but in watermarking encryption is not always present.  ... 
doi:10.17485/ijst/2015/v8i1/106904 fatcat:zplz5ypbubhzxnvcekjaseno5i

Hiding Multiple Watermarks in Transparencies of Visual Cryptography

Hao Luo, Jeng-Shyang Pan
2007 Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)  
This paper proposes a scheme to hide multiple watermarks in transparencies of visual cryptography. On one hand, the main properties of the traditional visual cryptography are still maintained.  ...  On the other hand, not only the encrypted image can be visible when stacking the transparencies, but also two extra watermarks can be extracted with simple computations.  ...  In visual cryptography, it is desirable to embed data in encrypted transparencies to protect them. In this paper, we focus on embedding two different watermarks transparencies in visual cryptography.  ... 
doi:10.1109/iihmsp.2007.4457550 dblp:conf/iih-msp/LuoPL07 fatcat:tk77e3rszrdp7jwqokzvmuebxq

Combined Analysis of Visual Cryptography using SVD Technique and Frequency Domain Watermarking Technique

Madhusudhana B S, Mrs. Sapna P J
2015 International Journal of Engineering Research and  
In this paper Frequency Domain (FD) watermarking technique is used to prevent distorts attacks in the VC scheme.  ...  The proposed method deals with the visual cryptography using a new combined technique called SVD technique with frequency domain watermarking technique.  ...  Shares generation using Visual cryptography CONCLUSION Here the combined analysis of visual cryptography and the watermarking technique is done.  ... 
doi:10.17577/ijertv4is050361 fatcat:rgnvbnnoyncqloknmunwhoctpe

Importance and Techniques of Information Hiding : A Review
English

Richa Gupta, Sunny Gupta, Anuradha Singhal
2014 International Journal of Computer Trends and Technology  
Information or data is very crucial resource to us. Thus securing the information becomes all the more necessary.  ...  The communication media through which we send data does not provide data security, so other methods of securing data are required. Information hiding plays a very crucial role today.  ...  Digital watermarking is a passive protection tool. It just marks the data, but does not degrade it nor controls access to data [5].One application of digital watermarking is source tracking.  ... 
doi:10.14445/22312803/ijctt-v9p149 fatcat:d2sgdjm3wveo5d6ilmmoba4bfu

Performance Evaluation of watermarking Schemes to Decide Meaningful Number of Shares

Jitendra Saturwar, D.N. Chaudhari
2017 IRA-International Journal of Technology & Engineering (ISSN 2455-4480)  
Digital watermarking using visual cryptography provides improved security<br />for encrypting secret images.</p>  ...  <br />Then only the hiding watermark is embedded into the original image and the secret<br />watermark is reserved for watermark extracting by the owner.  ...  Robustness means the watermark pattern is not easy to detect and remove illegally.  ... 
doi:10.21013/jte.icsesd201709 fatcat:orsti2el2bdd7irwug73qpqzqm

Enhance Security for Image Encryption and Decryption by Applying Hybrid Techniques Using MATLAB
English

Jai Singh, Kamil Hasan,
2015 International Journal of Innovative Research in Computer and Communication Engineering  
Cryptography, Steganography and Digital watermarking are widely used for Image Encryption and Textual Data Encryption and also we have various classification of these techniques.  ...  paper we study of Hybrid Cryptographic Encryption Techniques and also use of other encryption techniques to enhance their level of security and also study of their combination of Hybrid Techniques which is  ...  Ravinder Kumar for assisting with data collection and stimulus preparation of the Hybrid Cryptographic Technique with Digital watermarking studies and it"s coding, and also thankful of my friend Kanak  ... 
doi:10.15680/ijircce.2015.0307009 fatcat:srsvxndmwvgjndpb4hhiakjnte

Review on secured data capabilities of cryptography, steganography, and watermarking domain

Farah Qasim Ahmed Al-Yousuf, Roshidi Din
2020 Indonesian Journal of Electrical Engineering and Computer Science  
This paper concludes that cryptography techniques could be utilized with steganography and watermarking in secured data domain to enhance the security mechanisms.</span>  ...  The main objective of this study is explore the capabilities of secured data that used widely by researchers.  ...  This paper introduced a comparison study between cryptography, steganography, and watermarking techniques that are widely used to ensure information is secured.  ... 
doi:10.11591/ijeecs.v17.i2.pp1053-1058 fatcat:zug25t23hffk5f53wb2ev6rede

Securing Digital Images Using visual Cryptography

Kirti P. Sahare, Prof. S. A. Murab, Prof. M. V. Sarode, Prof. M. G. Ghonge
2016 INTERNATIONAL JOURNAL OF EMERGING TRENDS IN SCIENCE AND TECHNOLOGY  
Cryptography in the study of mathematical techniques related aspects of information security such as confidentialities, data security, entity authentication, but it is not only the means of providing information  ...  is a new technique which provides information security which user simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography.  ...  Visual cryptography does not need any special decryption algorithm, the secret image can be decrypted by necked eyes.  ... 
doi:10.18535/ijetst/v2i12.05 fatcat:duvh2huctfaa3fwhtfqkkuicjq

Digital Signature and Watermark Methods For Image Authentication using Cryptography Analysis

M Sreerama Murty, D Veeraiah, A Srinivas Rao
2011 Signal & Image Processing An International Journal  
A digital watermark and signature method for image authentication using cryptography analysis is proposed. The digital signature created for the original image and apply watermark.  ...  The encryption is used to securely transmit data in open networks for the encryption of an image using public key and decrypt that image using private key.  ...  Methodologies Digital signature and Watermarking Digital signature is a sort of Cryptography. Cryptography means keeping communications private.  ... 
doi:10.5121/sipij.2011.2214 fatcat:zgmjzgcqxvhu5f4ottlsvcfcky

A Robust Visual Cryptography Technique for Photographic Grayscale Images Using Block Optimization and Blind Invisible Watermarking

Ayan Banerjee, Sreya Banerjee
2012 Journal of clean energy technologies  
Index Terms-Blind invisible watermarking, block preparation, host image, shares, visual cryptography.  ...  Also we have addressed the issue of preventing cheating attacks in the proposed Visual Cryptography Scheme by invisibly watermarking the shares onto Host Images.  ...  With visible watermarking of images, a secondary image (the watermark) is embedded in a primary image in such that it is perceptible to a human observer, whereas the embedded data is not detectable in  ... 
doi:10.7763/ijcte.2012.v4.469 fatcat:ra7jr6g23bhgljghit4jovtebi
« Previous Showing results 1 — 15 out of 4,989 results