A New Fragile Approach for Optimization in Invisible Image Watermarking by Using Symmetric Key Algorithms  

Abstract

In the information technology and communication, the most important factor has been the security of information and one of the methods is watermarking. The Watermarking aims to validate the host and the undeniable identity of the legal owner. In this paper, we will concentrate on hidden watermarks. At one time, it deals with two different images in BMP to hide information. The message will be dividing evenly in both images to maximize the security of image watermarking. It utilizes the LSB manipulation method and the images addresses used as key are also encrypted for performance improvement with existing Symmetric key algorithms. There are two options to choose either DES or AES algorithm to get optimized output. We are using spatial domain for hiding actual information inside images. This paper gives a brief idea about the new image watermarking approach that make use of LSB algorithm for embedding the data into the bit map images (.bmp) which is implemented through the Microsoft .NET framework.  

Authors and Affiliations

Vandana Tehlani,

Keywords

Related Articles

Analysis of Power Utilization and different Routing Protocols in Mobile Ad Hoc Network (MANET)

Mobile ad hoc network (MANET) is composed of a collection of mobile nodes which are movable. Therefore, dynamic topology, unstable links, limited energy capacity and absence of fixed infrastructure are special features f...

A Survey on Windows Component Loading Vulnerabilities

Dynamic loading is a mechanism by which a computer program can, at run time, load a library memory, retrieve the addresses of functions and variables contained in library, execute those functions, and unload the library...

Development of High Availability Framework for the chassis of Advanced TCA (ATCA) in CDMA Networks 

Advanced Telecommunication Computing Architecture (ATCA) is a high speed chassis based architecture, specifically designed to give telecommunication services. The increasing complexities require more and better val...

The Content Summarization system 

The documents that are published in the internet are represented in the chronological sequence. Any interesting part of this document is called as topic. Topic is the sentence which captures the attention of the re...

SECURE MULTICAST COMMUNICATION USING GROUP BASED MULTICAST HIERARCHY  

Secure multicast communication is a significant requirement in emerging applications in adhoc environments like military or public emergency network applications. Membership dynamism is a major challenge in providi...

Download PDF file
  • EP ID EP87822
  • DOI -
  • Views 145
  • Downloads 0

How To Cite

Vandana Tehlani, (2012). A New Fragile Approach for Optimization in Invisible Image Watermarking by Using Symmetric Key Algorithms  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(5), 167-171. https://europub.co.uk/articles/-A-87822