Watermarking Using LSB Shifting to Document Protection
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 12
Abstract
The original signature or document. The application demonstrates that it can be used to protect a document or signature from fraud by an authorize person. Criminal can be considered as Harmful act or omission against the public which the State wishes to prevent and which, upon con eviction, is punishable by fine, imprisonment, and/or death. No conduct constitutes a crime unless it is declared criminal in the laws of the country. Some crimes (such as theft or criminal damage) may also be civil wrongs (torts) for which the victim(s) may claim damages in compensation. Criminals may be happened in every sector and in daily life. Criminal acts may be in the form of copy right fraud and signature forgery. In this work we try to solve or prevent those criminals. By using watermarking technique, the work proposed to introduce new technique to protect document originality quickly and accurately. Watermarking was carried out by inserting an image or text into signature image in order to protect. The work shows that file size produced by integrating the two same files but on different file stored and also produce different file size. Moreover Testing shows that steganography of image file with JPEG format and file image hidden with JPEG format which produced other small size of file from file steganography storage such as BMP and PNG formats.
Authors and Affiliations
Wasilah Wasilah, Suhendro Y. Irianto, Dona Yuliawati
PERFORMANCE ANALYSIS OF OPEN SOURCE STORAGE CLOUDS IN CLOUD COMPUTING
Cloud computing is one of the latest research area that helps in storing the information permanently on the servers and manages the different resources for the requested users to provide on-demand services. In order to c...
A Simulated Novel Approach for Identifying Black Hole Attack in AODV based MANET
Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. Due to unique characteristics of MANETS, it creates a number of consequential challenges to its secu...
Conceptual Overlapping Clustering for Effective Selection of Parental Rice Varieties
The process of rice breeding involves producing new rice varieties as a cross of parental rice varieties followed by rigorous testing and examination phase for purity, productivity and resistivity to regional climatic co...
Trigger and Database Security
Database Security is a growing concern evidenced by an increase in the number of reported incidencesof loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronical...
Identification of Biomarkers for Obesity associated with Diabetes using Sequence Mining Techniques
The advancements in the field of information technology are moving ahead in the discipline of medicine empowering the researchers with superior tools. By taking the advantage of Information Technology, today's researcher...