Watermarking Using LSB Shifting to Document Protection
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 12
Abstract
The original signature or document. The application demonstrates that it can be used to protect a document or signature from fraud by an authorize person. Criminal can be considered as Harmful act or omission against the public which the State wishes to prevent and which, upon con eviction, is punishable by fine, imprisonment, and/or death. No conduct constitutes a crime unless it is declared criminal in the laws of the country. Some crimes (such as theft or criminal damage) may also be civil wrongs (torts) for which the victim(s) may claim damages in compensation. Criminals may be happened in every sector and in daily life. Criminal acts may be in the form of copy right fraud and signature forgery. In this work we try to solve or prevent those criminals. By using watermarking technique, the work proposed to introduce new technique to protect document originality quickly and accurately. Watermarking was carried out by inserting an image or text into signature image in order to protect. The work shows that file size produced by integrating the two same files but on different file stored and also produce different file size. Moreover Testing shows that steganography of image file with JPEG format and file image hidden with JPEG format which produced other small size of file from file steganography storage such as BMP and PNG formats.
Authors and Affiliations
Wasilah Wasilah, Suhendro Y. Irianto, Dona Yuliawati
MVICS: a Repository and Search Tool towards Holistic Semantic-Based Precise Component Selection
Driven by the continuous expansions of software applications and the increases in component varieties and sizes, the so-called component mismatch problem has become a more severe hurdle for component selection and integr...
Modeling Concern Spaces Using Multi Dimensional Separation of Concerns
For software products, the specifications, the requirements even the variables, the code or the software modules are subject to be labelled with key-terms, or described using attributes or specific values. The purpose of...
Exploring Problems and Solutions in estimating Testing Effort for Non Functional Requirement.
Importance of testing has been realized in literature now, although late, but has been realized. Testing of Non Functional Requirement still remains unattended by the Software engineering Community. It is still being giv...
An Extended Recommendation System using Data Mining Implemented for Smart Phones
In this paper we introduce a recommendation system that attempts to solve some of the issues of classical recommendation systems: the need for huge amounts of data to be able to extract meaningful patterns, or for dire...
A Survey of Mining Association Rules Using Constraints
As we all know that association rule is used to find out the rules that are associated with the items present in the database that satisfy user specified support and confidence. There are many algorithms for mining assoc...