A New Fragile Approach for Optimization in Invisible Image Watermarking by Using Symmetric Key Algorithms  

Abstract

In the information technology and communication, the most important factor has been the security of information and one of the methods is watermarking. The Watermarking aims to validate the host and the undeniable identity of the legal owner. In this paper, we will concentrate on hidden watermarks. At one time, it deals with two different images in BMP to hide information. The message will be dividing evenly in both images to maximize the security of image watermarking. It utilizes the LSB manipulation method and the images addresses used as key are also encrypted for performance improvement with existing Symmetric key algorithms. There are two options to choose either DES or AES algorithm to get optimized output. We are using spatial domain for hiding actual information inside images. This paper gives a brief idea about the new image watermarking approach that make use of LSB algorithm for embedding the data into the bit map images (.bmp) which is implemented through the Microsoft .NET framework.  

Authors and Affiliations

Vandana Tehlani,

Keywords

Related Articles

The Comparative Study of DCT and DWT in Blind Detection Based Digital Watermarking  

Digital Watermarking is one of the data hiding technique, has been popular in today for providing copyright protection. Fundamentally, to implement a digital watermarking, there are two approaches, pixel modificati...

DATA SECURITY USING CRYPTOGRAPHY AND STEGNOGRAPHY 

Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic tec...

MEDICAL IMAGING FOR THE SEGMENTATION OF ABDOMINAL ORGANS USING PARALLELIZATION AND ORIENTED ACTIVE APPEARANCE MODELS 

mage segmentation plays an important role in medical imaging.Still; several challenges have to be recovered. The major issue deals with segmentation time concerned with each organ. More than five minutes is need...

Various Security Threats and Issues in Wireless Networks: A Survey  

-In rapid change of wireless transmission, the organizations are need to understand the range of security threats endemic to wireless technologies, including eavesdropping, wireless denial-of-service (DOS) attack...

A Survey on Access Control of Cloud Data  

t-Among the emerging technologies, cloud computing provides a flexible, on-demand computing infrastructure for a number of applications. Cloud computing is about moving computing from the single desktop pc/data c...

Download PDF file
  • EP ID EP87822
  • DOI -
  • Views 123
  • Downloads 0

How To Cite

Vandana Tehlani, (2012). A New Fragile Approach for Optimization in Invisible Image Watermarking by Using Symmetric Key Algorithms  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(5), 167-171. https://europub.co.uk/articles/-A-87822