International Journal of Advanced and Applied Sciences
Int. j. adv. appl. sci.
EISSN: 2313-3724
Print ISSN: 2313-626X
Volume 4, Issue 10 (October 2017), Pages: 160-164
Review Paper
Title: Watermarking implementation on digital images and electronic signatures
Author(s): Ahmad Abdul Qadir AlRababah *
Affiliation(s):
Faculty of Computing and Information Technology in Rabigh, King Abdulaziz University, Rabigh 21911, Saudi Arabia
https://doi.org/10.21833/ijaas.2017.010.022
Full Text - PDF XML
Abstract:
For successful business, information technology is becoming increasingly important. After all, with the help of its information system, each company organizes all internal processes, interacts with external partners, contractors and customers, government agencies. About the provision of information security a lot has already been written, but in this article the authors pay attention to one of the methods that can be used to protect against committing malicious acts directed against the company from within. The proposed method perfectly copes with the internal threat, however, as well as with the external one. The main task in this manuscript is to create a method for countering counterfeits of digital photos, and describes the algorithm for protecting the image.
© 2017 The Authors. Published by IASE.
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords: Digital images, Digital signature, Digital steganography, Digital watermarks
Article History: Received 19 June 2017, Received in revised form 7 September 2017, Accepted 11 September 2017
Digital Object Identifier:
https://doi.org/10.21833/ijaas.2017.010.022
Citation:
AlRababah AAQ (2017). Watermarking implementation on digital images and electronic signatures. International Journal of Advanced and Applied Sciences, 4(10): 160-164
Permanent Link:
http://www.science-gate.com/IJAAS/V4I10/AlRababah.html
References (19)
- Aljumah A and Ahamad T (2016). A novel approach for detecting DDoS using artificial neural networks. International Journal of Computer Science and Network Security, 16(12): 132-138.
- AlRababah AA (2015). Lempel-Ziv implementation for a compression system model with sliding window buffer. International Journal of Advanced Computer Science and Applications, 6(10): 101-104.
- AlRababah AA (2016). Embedded architecture for object tracking using Kalman filter. Journal of Computer Science, 12(5): 241-245. https://doi.org/10.3844/jcssp.2016.241.245
- AlRababah AA (2017a). On the associative memory utilization in English- Arabic natural language processing. International Journal of Advanced and Applied Sciences, 4(8): 14-18. https://doi.org/10.21833/ijaas.2017.08.003
- AlRababah AA (2017b). A new model of information systems efficiency based on key performance indicator (KPI). International Journal of Advanced Computer Science and Applications, 8(3): 80-83.
- AlRababah AA and Biswas R (2008). Rough vague sets in an approximation space. International Journal of Computational Cognition, 6 (4): 60-63.
- Arunmozhi SA and Venkataramani Y (2011). A new defense scheme against DDoS attack in mobile Ad Hoc networks. In: Meghanathan N, Kaushik BK, and Nagamalai D (Eds.), Advanced Computing, CCSIT 2011. Communications in Computer and Information Science: 133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17881-8_21
- Chen PY and Lin HJ (2006). A DWT based approach for image steganography. International Journal of Applied Science and Engineering, 4(3): 275-290.
- Langelaar GC and Lagendijk RL (2001). Optimal differential energy watermarking of DCT encoded images and video. IEEE Transactions on Image Processing, 10(1): 148-158. https://doi.org/10.1109/83.892451 PMid:18249605
- Ling H, Lu Z, and Zou F (2004a). New real-time watermarking algorithm for compressed video in VLC domain. In the International Conference on Image Processing, IEEE, Singapore, Singapore, 4: 2171-2174. https://doi.org/10.1109/ICIP.2004.1421526
- Ling H, Lu Z, and Zou F (2004b). Improved differential energy watermarking (IDEW) algorithm for DCT encoded image and video. In the 7th International Conference on Signal Processing, IEEE, Beijing, China, 3: 2326-2329. https://doi.org/10.1109/ICOSP.2004.1442246
- Lu CS and Liao HYM (2001). Video object-based watermarking: a rotation and flipping resilient scheme. In the International Conference on Image Processing, IEEE, Thessaloniki, Greece, 2: 483-486. https://doi.org/10.1109/ICIP.2001.958533
- Mansouri A, Aznaveh AM, Torkamani-Azar F, and Kurugollu F (2010). A low complexity video watermarking in H. 264 compressed domain. IEEE Transactions on Information Forensics and Security, 5(4): 649-657. https://doi.org/10.1109/TIFS.2010.2076280
- Redwan H and Kim KH (2008). Survey of security requirements, attacks and network integration in wireless mesh networks. In the New Technologies, Mobility and Security, IEEE, Tangier, Morocco: 1-5. https://doi.org/10.1109/NTMS.2008.ECP.94
- Setyawan I and Lagendijk RL (2001). Low-bit-rate video watermarking using temporally extended differential energy watermarking (DEW) algorithm. In: Wong P and Delp EJ (Eds.), Security and watermarking of multimedia contents: 73-84. Society of Photo-Optical Instrumentation Engineers (SPIE), Bellingham, Washington, USA.
- Sharma P, Sharma N, and Singh R (2012). A secure intrusion detection system against DDOS attack in wireless mobile Ad-hoc network. International Journal of Computer Applications, 41(21): 16-21. https://doi.org/10.5120/5824-8064
- Sun T, Jiang X, Shi S, Lin Z, and Fu G (2009). A Novel Self-adaptation differential energy video watermarking scheme in copyright protection. Journal of Multimedia, 4(3):153-160. https://doi.org/10.4304/jmm.4.3.153-160
- Wang L, Ling H, and Lu Z (2012). Real-time compressed-domain video watermarking resistance to geometric distortions. IEEE Multi Media, 19(1): 70-79. https://doi.org/10.1109/MMUL.2011.76
- Wu D, Kong W, Yang B, and Niu X (2009). A fast SVD based video watermarking algorithm compatible with MPEG2 Standard. Soft Computing-A Fusion of Foundations, Methodologies and Applications, 13(4): 375-382.