International Journal of Advanced and Applied Sciences

Int. j. adv. appl. sci.

EISSN: 2313-3724

Print ISSN: 2313-626X

Volume 4, Issue 10  (October 2017), Pages:  160-164


Review Paper

Title: Watermarking implementation on digital images and electronic signatures

Author(s): Ahmad Abdul Qadir AlRababah *

Affiliation(s):

Faculty of Computing and Information Technology in Rabigh, King Abdulaziz University, Rabigh 21911, Saudi Arabia

https://doi.org/10.21833/ijaas.2017.010.022

Full Text - PDF          XML

Abstract:

For successful business, information technology is becoming increasingly important. After all, with the help of its information system, each company organizes all internal processes, interacts with external partners, contractors and customers, government agencies. About the provision of information security a lot has already been written, but in this article the authors pay attention to one of the methods that can be used to protect against committing malicious acts directed against the company from within. The proposed method perfectly copes with the internal threat, however, as well as with the external one. The main task in this manuscript is to create a method for countering counterfeits of digital photos, and describes the algorithm for protecting the image. 

© 2017 The Authors. Published by IASE.

This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

Keywords: Digital images, Digital signature, Digital steganography, Digital watermarks

Article History: Received 19 June 2017, Received in revised form 7 September 2017, Accepted 11 September 2017

Digital Object Identifier: 

https://doi.org/10.21833/ijaas.2017.010.022

Citation:

AlRababah AAQ (2017). Watermarking implementation on digital images and electronic signatures. International Journal of Advanced and Applied Sciences, 4(10): 160-164

Permanent Link:

http://www.science-gate.com/IJAAS/V4I10/AlRababah.html


References (19)

  1. Aljumah A and Ahamad T (2016). A novel approach for detecting DDoS using artificial neural networks. International Journal of Computer Science and Network Security, 16(12): 132-138. 
  2. AlRababah AA (2015). Lempel-Ziv implementation for a compression system model with sliding window buffer. International Journal of Advanced Computer Science and Applications, 6(10): 101-104.     
  3. AlRababah AA (2016). Embedded architecture for object tracking using Kalman filter. Journal of Computer Science, 12(5): 241-245. https://doi.org/10.3844/jcssp.2016.241.245 
  4. AlRababah AA (2017a). On the associative memory utilization in English- Arabic natural language processing. International Journal of Advanced and Applied Sciences, 4(8): 14-18. https://doi.org/10.21833/ijaas.2017.08.003 
  5. AlRababah AA (2017b). A new model of information systems efficiency based on key performance indicator (KPI). International Journal of Advanced Computer Science and Applications, 8(3): 80-83.     
  6. AlRababah AA and Biswas R (2008). Rough vague sets in an approximation space. International Journal of Computational Cognition, 6 (4): 60-63.     
  7. Arunmozhi SA and Venkataramani Y (2011). A new defense scheme against DDoS attack in mobile Ad Hoc networks. In: Meghanathan N, Kaushik BK, and Nagamalai D (Eds.), Advanced Computing, CCSIT 2011. Communications in Computer and Information Science: 133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17881-8_21 
  8. Chen PY and Lin HJ (2006). A DWT based approach for image steganography. International Journal of Applied Science and Engineering, 4(3): 275-290.     
  9. Langelaar GC and Lagendijk RL (2001). Optimal differential energy watermarking of DCT encoded images and video. IEEE Transactions on Image Processing, 10(1): 148-158. https://doi.org/10.1109/83.892451  PMid:18249605 
  10. Ling H, Lu Z, and Zou F (2004a). New real-time watermarking algorithm for compressed video in VLC domain. In the International Conference on Image Processing, IEEE, Singapore, Singapore, 4: 2171-2174. https://doi.org/10.1109/ICIP.2004.1421526 
  11. Ling H, Lu Z, and Zou F (2004b). Improved differential energy watermarking (IDEW) algorithm for DCT encoded image and video. In the 7th International Conference on Signal Processing, IEEE, Beijing, China, 3: 2326-2329. https://doi.org/10.1109/ICOSP.2004.1442246     
  12. Lu CS and Liao HYM (2001). Video object-based watermarking: a rotation and flipping resilient scheme. In the International Conference on Image Processing, IEEE, Thessaloniki, Greece, 2: 483-486. https://doi.org/10.1109/ICIP.2001.958533 
  13. Mansouri A, Aznaveh AM, Torkamani-Azar F, and Kurugollu F (2010). A low complexity video watermarking in H. 264 compressed domain. IEEE Transactions on Information Forensics and Security, 5(4): 649-657. https://doi.org/10.1109/TIFS.2010.2076280 
  14. Redwan H and Kim KH (2008). Survey of security requirements, attacks and network integration in wireless mesh networks. In the New Technologies, Mobility and Security, IEEE, Tangier, Morocco: 1-5. https://doi.org/10.1109/NTMS.2008.ECP.94     
  15. Setyawan I and Lagendijk RL (2001). Low-bit-rate video watermarking using temporally extended differential energy watermarking (DEW) algorithm. In: Wong P and Delp EJ (Eds.), Security and watermarking of multimedia contents: 73-84. Society of Photo-Optical Instrumentation Engineers (SPIE), Bellingham, Washington, USA.     
  16. Sharma P, Sharma N, and Singh R (2012). A secure intrusion detection system against DDOS attack in wireless mobile Ad-hoc network. International Journal of Computer Applications, 41(21): 16-21. https://doi.org/10.5120/5824-8064 
  17. Sun T, Jiang X, Shi S, Lin Z, and Fu G (2009). A Novel Self-adaptation differential energy video watermarking scheme in copyright protection. Journal of Multimedia, 4(3):153-160. https://doi.org/10.4304/jmm.4.3.153-160 
  18. Wang L, Ling H, and Lu Z (2012). Real-time compressed-domain video watermarking resistance to geometric distortions. IEEE Multi Media, 19(1): 70-79. https://doi.org/10.1109/MMUL.2011.76 
  19. Wu D, Kong W, Yang B, and Niu X (2009). A fast SVD based video watermarking algorithm compatible with MPEG2 Standard. Soft Computing-A Fusion of Foundations, Methodologies and Applications, 13(4): 375-382.