0% found this document useful (0 votes)
55 views

1 KKWIEER, Nashik Dv&Da

The document discusses various techniques for hiding messages within digital signals and images, including steganography, digital watermarking, and least significant bit (LSB) encoding. It proposes a new authentication scheme that embeds an invisible watermark into photos using LSB encoding to satisfy requirements for robustness, invisibility, undetectability, and security. The scheme aims to improve on existing systems by making the hidden data harder to detect and modify.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

1 KKWIEER, Nashik Dv&Da

The document discusses various techniques for hiding messages within digital signals and images, including steganography, digital watermarking, and least significant bit (LSB) encoding. It proposes a new authentication scheme that embeds an invisible watermark into photos using LSB encoding to satisfy requirements for robustness, invisibility, undetectability, and security. The scheme aims to improve on existing systems by making the hidden data harder to detect and modify.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Document

Verification &
Authentication

KKWIEER,Nashik

DV&DA

Steganography
STEGANOS

covered

GRAPHIE

writing

The art and science of writing hidden


messages in such a way that no one, apart
from the sender and intended recipient,
suspects the existence of the message
KKWIEER,Nashik

DV&DA

Digital Watermarking
Digital watermarking is the process of

embedding information into a digital signal .


Watermark

Embedding
procedure

Original Image

KKWIEER,Nashik

DV&DA

Watermarked
Image

Types of watermark
Robust Watermark
Fragile Watermark
Visible Watermark
Invisible Watermarking

KKWIEER,Nashik

DV&DA

Existing system
Acquire parameter
- Details of document owner.
Convert

-Computation of row , column , & values.


Hide
-Identification of the pixel in original image.
-Hiding of data.
-Restore the pixel.

KKWIEER,Nashik

DV&DA

Drawbacks Of Existing System


Easy to detect stereographic image.
Sometimes difficult to detect the pixels.
Easy to modify the hidden data.
Doesnt satisfy security requirement.

KKWIEER,Nashik

DV&DA

Proposed system

KKWIEER,Nashik

DV&DA

Paramet
er
Aquisiti
on

Holder

Conver
t
HIDING

KKWIEER,Nashik DV&DA

Modules
Registration
Generate Unique Keys and Parameters
Create Image Card and Save to Database
Image Card Viewer
Apply Image Card Verification

KKWIEER,Nashik

DV&DA

LSB Algorithm
Replaces least significant bits with the

message to be encoded
Most popular technique when dealing with

images
Simple, but susceptible to lossy compression

and image manipulation

KKWIEER,Nashik

DV&DA

10

LSB - Example
A sample raster data for 3 pixels (9 bytes)
may be:

00100111 11101001
11001000
00100111 11001000
11101001
11001000 00100111
00100111
11101000 11001000
11101011
00100110 1100100 11101000
11001000 00100111 11101011
KKWIEER,Nashik

DV&DA

Inserting
the binary
value for
A
(10000001
)
changes
3 bits
11

Benefits
Transparency
Robustness
Security
Capacity
Reversibility
Possibility of verification

KKWIEER,Nashik

DV&DA

12

Applications
Owner identification

KKWIEER,Nashik

DV&DA

13

Conclusion
This authentication scheme embeds the

invisible watermark into the photo.


It satisfies
- robustness
- Invisibility
-Undetectability
-Security requirements.

KKWIEER,Nashik

DV&DA

14

References
[1] AlaaH.Al-Hamami and SaadA.Al-Ani, Faculty of Information
Technology, Amman Al-Ahliyya University, Amman, Jordan A New
Approach for
Authentication TechniqueJournal of Computer Science 1 (1): 103106, 2005 ISSN 1549-3636 Science Publications, 2005
[2] ManjitThapa, Dr.Sandeep Kumar Sood, A.P Meenakshi Sharma
Digital Image Watermarking Technique Based on Different
Attacks. (IJACSA)
International Journal of Advanced Computer Science and
Applications, Vol. 2, No. 4, 2011
[3] Er. Deepak Aggarwal, Er. Kanwalvir Singh Dhindsa Effect of
Embedding Watermark on Compression of the DigitalImages
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 2, FEBRUARY 2010,
ISSN 2151-9617
KKWIEER,Nashik

DV&DA

15

You might also like