Watermarking in E-commerce
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 6
Abstract
A major challenge for E-commerce and content-based businesses is the possibility of altering identity documents or other digital data. This paper shows a watermark-based approach to protect digital identity documents against a Print-Scan (PS) attack. We propose a secure ID card authentication system based on watermarking. For authentication purposes, a user/customer is asked to upload a scanned picture of a passport or ID card through the internet to fulfill a transaction online. To provide security in online ID card submission, we need to robustly encode personal information of ID card’s holder into the card itself, and then extract the hidden information correctly in a decoder after the PS operation. The PS operation imposes several distortions, such as geometric, rotation, and histogram distortion, on the watermark location, which may cause the loss of information in the watermark. An online secure authentication system needs to first eliminate the distortion of the PS operation before decoding the hidden data. This study proposes five preprocessing blocks to remove the distortions of the PS operation: filtering, localization, binarization, undoing rotation, and cropping. Experimental results with 100 ID cards showed that the proposed online ID card authentication system has an average accuracy of 99% in detecting hidden information inside ID cards after the PS process. The innovations of this study are the implementation of an online watermark-based authentication system which uses a scanned ID card picture without any added frames around the watermark location, unlike previous systems.
Authors and Affiliations
Peyman Rahmati, Andy Adler, Thomas Tran
Developing a Real-Time Web Questionnaire System for Interactive Presentations
Conducting presentations with bi-directional communication requires extended presentation systems, e.g., having sophisticated expressions and gathering real-time feedback. We aim to develop an interactive presentation sy...
Design of Efficient Pipelined Router Architecture for 3D Network on Chip
As a relevant communication structure for integrated circuits, Network-on-Chip (NoC) architecture has attracted a range of research topics. Compared to conventional bus technology, NoC provides higher scalability and enh...
KASP: A Cognitive-Affective Methodology for Designing Serious Learning Games
Many research studies agree on the existence of a close link between emotion and cognition. Actually, much research has demonstrated that students with learning disabilities (LD) experience emotional distress related to...
Analysis of Guess and Determined Attack on Non Linear Modified SNOW 2.0 Using One LFSR
stream ciphers encrypt the data bit by bit. In this research a new model of stream cipher SNOW 2.0 has been proposed i.e. Non linear modified SNOW 2.0 using one Linear Feedback Shift Register (LFSR) with the embedding of...
Implementation of Machine Learning Model to Predict Heart Failure Disease
In the current era, Heart Failure (HF) is one of the common diseases that can lead to dangerous situation. Every year almost 26 million of patients are affecting with this kind of disease. From the heart consultant and s...