Watermarking Using LSB Shifting to Document Protection
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 12
Abstract
The original signature or document. The application demonstrates that it can be used to protect a document or signature from fraud by an authorize person. Criminal can be considered as Harmful act or omission against the public which the State wishes to prevent and which, upon con eviction, is punishable by fine, imprisonment, and/or death. No conduct constitutes a crime unless it is declared criminal in the laws of the country. Some crimes (such as theft or criminal damage) may also be civil wrongs (torts) for which the victim(s) may claim damages in compensation. Criminals may be happened in every sector and in daily life. Criminal acts may be in the form of copy right fraud and signature forgery. In this work we try to solve or prevent those criminals. By using watermarking technique, the work proposed to introduce new technique to protect document originality quickly and accurately. Watermarking was carried out by inserting an image or text into signature image in order to protect. The work shows that file size produced by integrating the two same files but on different file stored and also produce different file size. Moreover Testing shows that steganography of image file with JPEG format and file image hidden with JPEG format which produced other small size of file from file steganography storage such as BMP and PNG formats.
Authors and Affiliations
Wasilah Wasilah, Suhendro Y. Irianto, Dona Yuliawati
PERFORMANCE AND ANALYSIS OF REED-SOLOMAN CODES FOR EFFICIENT COMMUNICATION SYSTE
In wireless communication systems reducing bit/frame/symbol error rate is critical. If bit error rates are high then in wireless communication system our aim is to minimize error by employing various coding methods on th...
DIGITAL IMAGE ANALYSIS BASED ON AUTOMATED COUNTING CLUSTERED SOYBEAN SEEDS
- Â This paper investigates the use of digital image analysis techniques for developing for counting clustered soya bean seeds. Images are extracted from source WWW.21food.com). As manual counting have several issues suc...
Improvement inEnergy Efficiency of Wireless Sensor Network
Clustering in wireless sensor network is important to increase the lifetime of sensor network. LEACH protocol is one of the clustering routing protocols in wireless sensor networks. In LEACH each node has the equal proba...
Algorithm of Ontology Similarity Measure Based on Similarity Kernel Learning
Ontology, as a structured conceptual model of knowledge representation and storage, has widely been used in biomedical and pharmaceutical research. The nature of the ontology application is to get the similarity between...
Secure Dynamic Resource Provisioning Cost by Optimized Placement of Virtual Machines in Cloud Computing
Cloud computing provides pay-as-you-go computing resources and accessing services are offered from data centers all over the world as the cloud. Consumers may find that cloud computing allows them to reduce the cost of i...