A New Fragile Approach for Optimization in Invisible Image Watermarking by Using Symmetric Key Algorithms
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 5
Abstract
In the information technology and communication, the most important factor has been the security of information and one of the methods is watermarking. The Watermarking aims to validate the host and the undeniable identity of the legal owner. In this paper, we will concentrate on hidden watermarks. At one time, it deals with two different images in BMP to hide information. The message will be dividing evenly in both images to maximize the security of image watermarking. It utilizes the LSB manipulation method and the images addresses used as key are also encrypted for performance improvement with existing Symmetric key algorithms. There are two options to choose either DES or AES algorithm to get optimized output. We are using spatial domain for hiding actual information inside images. This paper gives a brief idea about the new image watermarking approach that make use of LSB algorithm for embedding the data into the bit map images (.bmp) which is implemented through the Microsoft .NET framework.
Authors and Affiliations
Vandana Tehlani,
Design and implementation of low power 16 bit ALU with clock gating
The ALU is one of the most frequently accessed modules in a CPU and is utilized during most instruction executions. Hence the power consumption of the ALU is a major concern.In this paper a low power 16 bit ALU is...
Cloud based Intra-College Communication Information System using Mobile Clients
we have seen over the years that the process of notice boards, important notification about academics has been carried out manually almost across all educational institutions. The process is not only time consuming...
Additional Band width Design with Adaptive Orthogonal Frequency Division multiplexing
With the advent of new high data rate wireless applications, as well as growth of existing wireless services, demand for additional band width is rapidly increasing. A cognitive radio (CR) node is a radio device...
Development of High Availability Framework for the chassis of Advanced TCA (ATCA) in CDMA Networks
Advanced Telecommunication Computing Architecture (ATCA) is a high speed chassis based architecture, specifically designed to give telecommunication services. The increasing complexities require more and better val...
Improving the Efficiency of Ranked keyword Search over Cloud Data
In this paper we define and solve the effective yet secure ranked keyword search over encrypted cloud data. We used order preserving symmetric encryption to protect the cloud data. Even though there are lots of searching...