A Zero-Watermarking algorithm on multiple occurrences of letters for text tampering detection
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 5
Abstract
Electronic publishing has gained importance with the widespread use of Internet. It involves transmission of digital data in bulk from one place to another. It brings various threats to the data in form of illegal copying, redistribution of copyright contents and forgery. Watermarking provides authentication and copyright protection to the multimedia contents over the Internet. This paper presents a zero- watermarking technique that uses multiple occurrences of letters in a word for generation of watermark. This work will help in tampering detection in the text documents.
Authors and Affiliations
Sukhpreet Kaur , Geetanjali babbar
Nondestructive and Noncontact Dielectric Measurement Methods for Transformer Oil Using Free-space Microwave Measurement System in 19 – 25 GHz Frequency Range
Nondestructive, noncontact and real time evaluation of ielectric properties of low-loss liquids are important for applications such as service-aged transformer oil, biomedical, remote sensing and design of radar absorbi...
TRACING REAL TIME LOCATION OF A FRIEND IN MOBILE SYSTEM
The application of this project is to track a number of people even in crowded natural environments. A system of this sort would be useful in a number of applications, such as human-computer interaction, surveillance, an...
AN EFFICIENT APPROACH FOR ROUTING IN WIRELESS AD HOC NETWORK USING ARTIFICIAL INTELLIGENCE
MANETs are the set of small, low infrastructure communication setup that operates by consuming the energy of batteries. Thus, it is very much important for MANETs to perform efficiently. For efficient transmission, routi...
Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform
Digital images are used everywhere and it is easy to manipulate and edit because of availability of various image processing and editing software. In a copy-move image forgery, a part of an image is copied and then paste...
Spam Classification using new kernel function in Support Vector Machine
Due to the increase in internet users, there is a rapid growth in spam e-mails. In recent years, kernel function have received major attention, particularly due to the increased popularity of Support Vector Machine. It i...