SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 8
Survey of Proposed Technique for Image Authentication with
LDPC
Imran khan 1
, Asst. Prof K.Suresh2
, Asst.Prof Miss Ranjana Batham3
(Electronics & Communication, RGPV/ All Saints Engineering Institute, Bhopal)
(Electronics & Communication, RGPV / All Saints Engineering Institute, Bhopal
( Head of the Electronics & Communication, RGPV/ All Saints Engineering Institute, Bhopal
I. INTRODUCTION
In today’s world, digital images are being widely
used in numerous applications such as military,
intelligence, surveillance, Digital image processing
deals with manipulation of digital images through a
digital computer. It is a subfield of signals and
systems but focus particularly on imagesThe input
of that system is a digital image and the system
process that image using efficient algorithms, and
gives an image as an output. The most common
example is Adobe Photoshop. It is one of the
widely used application for processing digital
images. JPEG is the most widely used formats that
store the digital images using digital cameras and
software tools [2]. Nothing to check the difference
of an image is original or being manipulated.
Data authentication is sensitive to single bit change
in the original data while image authentication is to
be content sensitive process .these including JPEG
compression which is lossy compression, as some
data is loss in the end. then result will be changes
in a bits that are acceptable. the authentication
system tolerable to such changes while it is
necessary for the system to remain sensitive to
malicious manipulations. Every organization who is
related are disturb with the photo tampering. For
example, digital images, videos, and audio are use
as perfect proof in medicals. civil, criminal , and
security cases. In such cases, this is very important.
Digital image technique uses many computer
algorithms to process digital images [4]. The result
of this process show can be either images form or a
setting of characteristics or properties of the
original images. digital image processing have been
generally use in intelligent systems, robotics,
remote sensing, medical imaging, photography and
forensics.Digital image process directly contacts to
RESEARCH ARTICLE OPEN ACCESS
Abstract:
For Image Authentication Problem using Encryption Technique and LDPC Source Coding is necessary in Content
Delivery via unsecure medium, Like Peer-To-Peer (P2P) File Sharing. These transferring Digital Files from one Computer to
another. Images are the Most Important Utility of our life. They are used in many applications. There are Two Main Goals of
Image Security: Image Encryption and Authentication. More different encoded versions of the original image available.In
addition, unsecure medium might tamper with the contents.. We propose an efficient, accurate, reliable process using
encryption and LDPC source coding for the image authentication problem. The key idea is to provide a Slepian-Wolf encoded
as authentication data which is encrypted using cryptography key before ready to send. The key used for encryption is usually
independent of the Plain-Image. This can be decoded with side information of an authentic image.
Keywords — Image digest, image authentication, Image Security, Digital Image Processing, LDPC Source code
International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 9
image, which is keep more image points. These
image points are pixels, that shows the exact
position of the points in the image, and intensity
values. A colorful image keep highest dimensional
information which is a gray image, as red, green
and blue values are used in different type of
combinations to again produce different colors of
the image in the real world.
The main purpose of digital image processing is
represent through human beings to obtain an high
quality or descriptive characteristics of the original
image [2].
Sensory systems cannot discriminate between a
human subject and the background without the
implementation of an intelligent algorithm. We
shall classify attacks into two types:-
A. Passive Attacks
Passive attacks not involve at the time of
modifications or changes to the original message
contents. These are distribute into two
subcategories:
1. Release of Message Content
It is known that when we send a confidential
message to our friend through email; then only
she/he be able to access it. Otherwise the content of
message is released against our wishes to someone
else.
2. Traffic Analysis
Passive attacker could attempt to figure out similar
betweenMessages to come up in some sorting
pattern they show her/him some hints at the time of
communication that is taking place. Traffic analysis
attacks provide some analyzing message at the time
of some attempt.
B. Active Attacks
Active attacks are related on change in the original
message contents in particular pattern or false
message at the time of creation.. These attacks
Classified into three subparts:-
1. Interruption
When an unauthorized entity prevent to an
authorized entity. For Example, an authorized user
Z might an authorized user X and message send to
user Y. User Y believe that the message
necessarily came from user X [2,6]. In masquerade
attacks, another kind of active attacks are also
embedding. As an instance, this attack involve to
known about the user`s authentication sequence (e.g.
user ID and password).
2. Modification
Modification means to the change in message data.
II. Multimedia Information
In this digital seanario, increasing more in
communication networks, and growing passion of
the general public for new information technologies
cause to huge growth of multimedia document
traffic (image, text, audio, video, etc.). This is now
very necessary in this seanario that protect and
control of the changing data is major problem..
Digital images, multimedia documents can be
duplicated, easily edit use easily for another work.
and delet very easily. In this concern, it is important
to copyright protection sysytem start for this
missuse, [6,9]. Watermarking seems to be the
alternative best solution for protection against
duplication, and authentication of content.
II. RELATED WORK
In year 2010, E Kee et. al. proposed a method [29]
that specify how to exploit for image authentication
of the pattern and storage of an embedded image
summary. The creation of a concise is a series of
filtering operations, contrast alteration, and
confining. We provide model parameters and these
parameters differ extremely between camera
producer and photo-analyze software. We also
specify how this signature can be linked with
encoding information from the essential high
resolution image to further show the signature’s
disnctiveness.
Past method for image authentication decline into
three groups: watermarking, forensics, and
complex hashing. In digital forensics, the user find
out the authenticity of entire picture by analyzing
the received content [5- 6]. Incurably, information
International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 10
about original, we cannot finally confirm the purity
of the received content because content not related
to the original may pass forensic investigates.
Watermarking is other choice for image
authentication. A semi-fragile watermark is fixed
into the host signal waveform without intuitive
misinterpretation. Users can confirm authenticity by
obtain the watermark from the acquired content.
The system designs become insure that the
watermark keeps lossy compression, intensely,
watermarking authentication is not in reversible
suitable with before encoded contents; i.e., unused
content cannot be authenticated. Fixed watermarks
capable to required bit rate increase when shrink a
media file.
Alike Yao et. al. [12] refined an authentication
techniques depend on complex hashing, which is
influenced by cryptographic hashing [13]. Within
this technique, the user reviews the sincerity of the
received content from the original one from this
small amount of data imitative. Various image
authentication systems based on hash function
obtain robustness across lossy compression by
using compression consistent appearance; these
compressions-influenced features are designed for
particular compression design but decline under
another coding design or probable image processing.
Robustness is increased using more refined features;
any fixed point has the lack that an attacker
understood the null space of the projection can
revise the image not effect the authenticate data.
Using pseudorandom projections keeps the null
space a private. these features calculated also in a
nonlinear presence. Appearance robust across
rotation, prune, resisting, or translation has been
apply on the Radon transform [23- 24], other
process include features necessary for human
visual system [28].
Continuation and compression of authentication
data have not been affected from intensity. More
way use course Continuation. Such as, Fridrich et al.
Use 1-bit quantization for random projection
consents the relation-based schemes can be treated
as 1-bit quantization of coefficients variance.
Venkatesan et al. [21] first use regard error-
correcting coding to reduce the image
authentication data size. This scheme projects the
binary and vectors both images into syndrome bits
which is an error-correcting code and directly
equality the syndrome bits to decide the authenticity.
The way of Sun et al. uses organized Hamming
codes to Retrieve the binary feature vectors parity
check bits as the authenticate data [30]. These
parity check bits are joining with the binary
character vector of the received image to remove
the errors show by image processing, just as
compression. Our unique ideas make update with
the knowledge of statistical methods and distributed
source coding. Activate by our access,
So, after analyzing all research work, it is found
that still this research area has a huge space of
normal and efficient technology for image
authentication. Thus, in this discourse work we
proposed a work for image authentication occupy
on the encoding-decoding approach of low density
parity check methods with cryptography. The
proposed approach insures that the original image
received at receiver side is un-tampered.
III. CONCLUSIONS
Within the paper, we analyzes the existing work
complete in the similar area and proposed a
innovative image validation scheme that distinct
appropriate encoding variations of an image from
diversify versions based on allocate authorize
coding and static methods. A two-phase loss
channel represents the static dependency between
the source and the target pics. Diversify decline are
retrieve by using a static image and real
compression noise is affected to be preservative
white Gaussian noise.
IV. PROPOSED SCHEME
The proposed method uses distributed source
coding of image authentication system. of a
Slepian–Wolf contain the authenticate data as in
figure1, a random seed, and a signature of the
image projection. The final image is typed as an
output of the two-state lossy channel. The user
capture the final image using the equal projection
International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 11
and side information and try to decoded the
Slepian–Wolf bit stream uses the information. If the
decoding prcess fails, i.e., the reconstructed image
projection hash value not match the signature,
decoder claims verification it is tampered; or, the
side information is verify using hypothesis testing.
Fig. 1: Encryption Process with Secret Key
REFERENCES
1. Fridrich, D. Soukal, J.Luk´a˘s,“Detection of
copy move forgery in digital images,” in
Proceedings of Digital Forensic Research
Workshop, 2003 August.
2. Popescu and H. Farid,“Exposing digital
forgeries by detecting duplicated image
regions”, Tech. Rep. TR2004-515,
Department of Computer Science,
Dartmouth College, 2004.
3. Z. Lin, R. Wang, X. Tang, H.-V. Shum,
“Detecting doctored images using camera
response normality and consistency”, in
Computer Vision and Pattern Recognition,
(San Diego, CA), 2005.
4. M. Johnson, H. Farid,“Exposing digital
forgeries in complex lighting environments”,
IEEE Transactions on Information
Forensics and Security 3(2), 2007, pp. 450–
461. (2002) The IEEE website. [Online].
Available: http://www.ieee.org/
5. Luk´a˘s, J. Fridrich, M. Goljan, “Digital
camera identification from sensor noise”,
IEEE Transactions on Information Security
and Forensics 1(2), 2006, pp. 205– 214.
6. Gallager, R. G.,“Low Density Parity Check
Codes, Monograph”, M.I.T. Press, 1963.
7. H. Farid,“Image forgery detection”, IEEE
Signal Process. Mag., Vol. 26, No. 2, Mar
2009, pp. 16–25.
8. Popescu, H. Farid,“Exposing digital
forgeries in color filter array interpolated
images”, IEEE Trans. Signal Process., Vol.
53, No. 10, Oct. 2005, pp. 3948–3959.
9. J. Cox, J. Kilian, T. Leighton, and T.
Shamoon,“Secure sprectrum watermarking
for images, audio and video”, in Proc. I
Conf. Image Process., Lausanne,
Switzerland, 1996, Sep.
10. ] R. B. Wolfgang, E. J. Delp,“A watermark
for digital images”, in Proc. IEEE Int. Conf.
Image Process., Lausanne,
Switzerland,1996, Sep.
11. Yao-Chung Lin, David Varodayan,“Image
Authentication Using Distributed Source
Coding”, In IEEE Transactions on Image
Processing, Vol. 21, No. 1, January 2012,
pp. 273- 283
12. W. Diffie, M. E. Hellman,“New directions in
cryptography”, IEEE Trans. Inf. Theory,
Vol. IT-22, No. 6, Jan. 1976, pp. 644–654.
13. C.-Y. Lin, S.-F. Chang,“Generating robust
digital signature for image/video
authentication”, in ACM Multimedia:
International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 12
Multimedia and Security Workshop, Bristol,
U.K., Sep. 1998, pp. 49–54.
14. M. Schlauweg, D. Pröfrock, E. Müller,
“JPEG2000-based secure image
authentication”, in Workshop on
Multimedia and Security, 2006, Geneva,
Switzerland, pp. 62–67.
15. M. Schneider, S.-F. Chang,“A robust
content based digital signature for image
authentication”, in Proc. IEEE Int. Conf.
Image Process., Vol. 3, Sep. 1996, pp. 227–
230.
16. Fridrich, “Robust bit extraction from
images”, in Int. Conf. Multimedia
Computing and Syst., Vol. 2, Jul. 1999, pp.
536–540.
17. D.-C. Lou, J.-L. Liu,“Fault resilient and
compression tolerant digital signature for
image authentication”, IEEE Trans.
Consumer Electronics, Vol. 46, No. 1, Feb.
2000, pp. 31–39.
18. L. Xie, G. R. Arce, R. F.
Graveman,“Approximate image message
authentication codes”, IEEE Trans.
Multimedia, Vol. 3, No. 2, Jun. 2001, pp.
242–252.
19. Qiu, J., Wang, P.: An image encryption and
authentication scheme. In: 2011 Seventh
International Conference on Computational
Intelligence and Security (CIS), December
3-4, pp. 784–787. IEEE (2011)
20. H. Zhang, H. Zhang, Q. Li, and X.
Niu,“Predigest Watson’s visual model as
perceptual hashing method”, in Int.
Conf.Convergence and Hybrid Inf. Technol.,
2008, Nov, Vol. 2, pp. 617–620.
21. R.Venkatesan, S.-M.Koon,M.H. Jakubowski,
P.Moulin, “Robust image hashing”, Proc.
IEEE Int. Conf. Image Process., Vol. 3,
2000, pp. 664–666.
22. F. Lefebvre, J. Czyz, B. Macq,“A robust soft
hash algorithm for digital image signature”,
in Int. Conf.Multimedia and Expo, 2003,
Baltimore, MD.
23. H.-L. Zhang, C.-Q. Xiong, G.-Z.
Geng,“Content based image hashing robust
to geometric transformations”, in Proc. Int.
Symp. Electronic Commerce and Security,
2009, May, Vol. 2, pp. 105108.
24. Swaminathan, Y. Mao, M. Wu,“Robust and
secure image hashing”, IEEE Trans. Inf.
Forensics and Security, Vol. 1, No. 2, Jun.
2006, pp. 215–230.
25. C. De Roover, C. DeVleeschouwer, F.
Lefebvre, B.Macq, “Robust video hashing
based on radial projections of key frames”,
IEEE Trans. Signal Process., Vol. 53, No.
10, Oct. 2005, pp. 4020–4037.
26. Ghoshal, N., Mandal, J.K.: A Bit Level
Image Authentication/Secrete Message
Transmission Technique (BLIA/SMTT),
Association for the Advancement of
Modelling & Simulation Technique in
International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 13
Enterprises (AMSE). AMSE Journal of
Signal Processing and Pattern
Recognition 51(4), 1–13 (2008)
27. MONGA, B. L. EVANS,“PERCEPTUAL IMAGE
HASHING VIA FEATURE POINTS: PERFORMANCE
EVALUATION AND TRADEOFFS”, IEEE TRANS.
IMAGE PROCESS., VOL. 15, NO. 11, NOV. 2006,
PP. 3452– 3465.
28. AI-Gindy, A.: A Fragile Invertible
Watermarking Technique for the
Authentication of Medical Images, pp. 191–
195. IEEE (2011)
29. E Kee, H Farid,“Digital Image
Authentication from Thumbnails”, in SPIE
Symposium on Electronic Imaging, San
Jose, CA, 2010.
30. M. Tagliasacchi, G. Valenzise, S.
Tubaro,“Hash-based identification of
sparse image tampering”, IEEE Trans.
Image Process., Vol. 18, No. 11, pp. 2491–
2504, Nov. 2009.

More Related Content

What's hot

Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerTELKOMNIKA JOURNAL
 
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...AIRCC Publishing Corporation
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESijsptm
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationIJNSA Journal
 
Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...iosrjce
 
Automatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using DialogAutomatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using Dialogiosrjce
 
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT IJECEIAES
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Journals
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
 
State of art of mobile forensics
State of art of mobile forensicsState of art of mobile forensics
State of art of mobile forensicsSTO STRATEGY
 
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYFEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
 
IRJET- Email Framework for Blinds using Speech Recognition
IRJET- Email Framework for Blinds using Speech RecognitionIRJET- Email Framework for Blinds using Speech Recognition
IRJET- Email Framework for Blinds using Speech RecognitionIRJET Journal
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
 
76 s201913
76 s20191376 s201913
76 s201913IJRAT
 

What's hot (20)

Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
 
395 401
395 401395 401
395 401
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
 
Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...
 
Automatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using DialogAutomatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using Dialog
 
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...
 
State of art of mobile forensics
State of art of mobile forensicsState of art of mobile forensics
State of art of mobile forensics
 
IOT connected with e-learning
IOT connected with e-learningIOT connected with e-learning
IOT connected with e-learning
 
Ijariie1186
Ijariie1186Ijariie1186
Ijariie1186
 
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYFEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
 
IRJET- Email Framework for Blinds using Speech Recognition
IRJET- Email Framework for Blinds using Speech RecognitionIRJET- Email Framework for Blinds using Speech Recognition
IRJET- Email Framework for Blinds using Speech Recognition
 
Ict topic 3
Ict topic 3Ict topic 3
Ict topic 3
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
 
76 s201913
76 s20191376 s201913
76 s201913
 

Viewers also liked

Viewers also liked (6)

FWK_2501_2016
FWK_2501_2016FWK_2501_2016
FWK_2501_2016
 
How to Use Basecamp
How to Use BasecampHow to Use Basecamp
How to Use Basecamp
 
CV
CVCV
CV
 
Tarea tic codigos
Tarea tic codigosTarea tic codigos
Tarea tic codigos
 
A day with internet
A day with internetA day with internet
A day with internet
 
Vmcc socialbakers-fb-advertising-quarterly-report
Vmcc socialbakers-fb-advertising-quarterly-reportVmcc socialbakers-fb-advertising-quarterly-report
Vmcc socialbakers-fb-advertising-quarterly-report
 

Similar to [IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranjana Batham

Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsIJCSIS Research Publications
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...idescitation
 
Evaluation Of Proposed Design And Necessary Corrective Action
Evaluation Of Proposed Design And Necessary Corrective ActionEvaluation Of Proposed Design And Necessary Corrective Action
Evaluation Of Proposed Design And Necessary Corrective ActionSandra Arveseth
 
An efficient lossless medical image
An efficient lossless medical imageAn efficient lossless medical image
An efficient lossless medical imagecaijjournal
 
AHP validated literature review of forgery type dependent passive image forge...
AHP validated literature review of forgery type dependent passive image forge...AHP validated literature review of forgery type dependent passive image forge...
AHP validated literature review of forgery type dependent passive image forge...IJECEIAES
 
Rey.survey watermarking auth_images.2002
Rey.survey watermarking auth_images.2002Rey.survey watermarking auth_images.2002
Rey.survey watermarking auth_images.2002vadnalasravi
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd Iaetsd
 
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesAdvanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
 
DIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine TransformDIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine Transformiosrjce
 
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...IJITCA Journal
 
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...IJITCA Journal
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518IJRAT
 
An Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryAn Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryIRJET Journal
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...IRJET Journal
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...CSCJournals
 
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domainsipij
 
A Review on Various Forgery Detection Techniques
A Review on Various Forgery Detection TechniquesA Review on Various Forgery Detection Techniques
A Review on Various Forgery Detection Techniquesijtsrd
 

Similar to [IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranjana Batham (20)

Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart Credentials
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
 
Evaluation Of Proposed Design And Necessary Corrective Action
Evaluation Of Proposed Design And Necessary Corrective ActionEvaluation Of Proposed Design And Necessary Corrective Action
Evaluation Of Proposed Design And Necessary Corrective Action
 
An efficient lossless medical image
An efficient lossless medical imageAn efficient lossless medical image
An efficient lossless medical image
 
AHP validated literature review of forgery type dependent passive image forge...
AHP validated literature review of forgery type dependent passive image forge...AHP validated literature review of forgery type dependent passive image forge...
AHP validated literature review of forgery type dependent passive image forge...
 
Rey.survey watermarking auth_images.2002
Rey.survey watermarking auth_images.2002Rey.survey watermarking auth_images.2002
Rey.survey watermarking auth_images.2002
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure image
 
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesAdvanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
 
B017250715
B017250715B017250715
B017250715
 
DIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine TransformDIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine Transform
 
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
 
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518
 
An Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryAn Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation Recovery
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
 
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domain
 
A Review on Various Forgery Detection Techniques
A Review on Various Forgery Detection TechniquesA Review on Various Forgery Detection Techniques
A Review on Various Forgery Detection Techniques
 

More from IJET - International Journal of Engineering and Techniques

More from IJET - International Journal of Engineering and Techniques (20)

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
Ijet v5 i6p18
Ijet v5 i6p18Ijet v5 i6p18
Ijet v5 i6p18
 
Ijet v5 i6p17
Ijet v5 i6p17Ijet v5 i6p17
Ijet v5 i6p17
 
Ijet v5 i6p16
Ijet v5 i6p16Ijet v5 i6p16
Ijet v5 i6p16
 
Ijet v5 i6p15
Ijet v5 i6p15Ijet v5 i6p15
Ijet v5 i6p15
 
Ijet v5 i6p14
Ijet v5 i6p14Ijet v5 i6p14
Ijet v5 i6p14
 
Ijet v5 i6p13
Ijet v5 i6p13Ijet v5 i6p13
Ijet v5 i6p13
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p12
 
Ijet v5 i6p11
Ijet v5 i6p11Ijet v5 i6p11
Ijet v5 i6p11
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
Ijet v5 i6p2
Ijet v5 i6p2Ijet v5 i6p2
Ijet v5 i6p2
 
IJET-V3I2P24
IJET-V3I2P24IJET-V3I2P24
IJET-V3I2P24
 
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P23
 
IJET-V3I2P22
IJET-V3I2P22IJET-V3I2P22
IJET-V3I2P22
 
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21
IJET-V3I2P21
 
IJET-V3I2P20
IJET-V3I2P20IJET-V3I2P20
IJET-V3I2P20
 
IJET-V3I2P19
IJET-V3I2P19IJET-V3I2P19
IJET-V3I2P19
 
IJET-V3I2P18
IJET-V3I2P18IJET-V3I2P18
IJET-V3I2P18
 
IJET-V3I2P17
IJET-V3I2P17IJET-V3I2P17
IJET-V3I2P17
 

Recently uploaded

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranjana Batham

  • 1. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 8 Survey of Proposed Technique for Image Authentication with LDPC Imran khan 1 , Asst. Prof K.Suresh2 , Asst.Prof Miss Ranjana Batham3 (Electronics & Communication, RGPV/ All Saints Engineering Institute, Bhopal) (Electronics & Communication, RGPV / All Saints Engineering Institute, Bhopal ( Head of the Electronics & Communication, RGPV/ All Saints Engineering Institute, Bhopal I. INTRODUCTION In today’s world, digital images are being widely used in numerous applications such as military, intelligence, surveillance, Digital image processing deals with manipulation of digital images through a digital computer. It is a subfield of signals and systems but focus particularly on imagesThe input of that system is a digital image and the system process that image using efficient algorithms, and gives an image as an output. The most common example is Adobe Photoshop. It is one of the widely used application for processing digital images. JPEG is the most widely used formats that store the digital images using digital cameras and software tools [2]. Nothing to check the difference of an image is original or being manipulated. Data authentication is sensitive to single bit change in the original data while image authentication is to be content sensitive process .these including JPEG compression which is lossy compression, as some data is loss in the end. then result will be changes in a bits that are acceptable. the authentication system tolerable to such changes while it is necessary for the system to remain sensitive to malicious manipulations. Every organization who is related are disturb with the photo tampering. For example, digital images, videos, and audio are use as perfect proof in medicals. civil, criminal , and security cases. In such cases, this is very important. Digital image technique uses many computer algorithms to process digital images [4]. The result of this process show can be either images form or a setting of characteristics or properties of the original images. digital image processing have been generally use in intelligent systems, robotics, remote sensing, medical imaging, photography and forensics.Digital image process directly contacts to RESEARCH ARTICLE OPEN ACCESS Abstract: For Image Authentication Problem using Encryption Technique and LDPC Source Coding is necessary in Content Delivery via unsecure medium, Like Peer-To-Peer (P2P) File Sharing. These transferring Digital Files from one Computer to another. Images are the Most Important Utility of our life. They are used in many applications. There are Two Main Goals of Image Security: Image Encryption and Authentication. More different encoded versions of the original image available.In addition, unsecure medium might tamper with the contents.. We propose an efficient, accurate, reliable process using encryption and LDPC source coding for the image authentication problem. The key idea is to provide a Slepian-Wolf encoded as authentication data which is encrypted using cryptography key before ready to send. The key used for encryption is usually independent of the Plain-Image. This can be decoded with side information of an authentic image. Keywords — Image digest, image authentication, Image Security, Digital Image Processing, LDPC Source code
  • 2. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 9 image, which is keep more image points. These image points are pixels, that shows the exact position of the points in the image, and intensity values. A colorful image keep highest dimensional information which is a gray image, as red, green and blue values are used in different type of combinations to again produce different colors of the image in the real world. The main purpose of digital image processing is represent through human beings to obtain an high quality or descriptive characteristics of the original image [2]. Sensory systems cannot discriminate between a human subject and the background without the implementation of an intelligent algorithm. We shall classify attacks into two types:- A. Passive Attacks Passive attacks not involve at the time of modifications or changes to the original message contents. These are distribute into two subcategories: 1. Release of Message Content It is known that when we send a confidential message to our friend through email; then only she/he be able to access it. Otherwise the content of message is released against our wishes to someone else. 2. Traffic Analysis Passive attacker could attempt to figure out similar betweenMessages to come up in some sorting pattern they show her/him some hints at the time of communication that is taking place. Traffic analysis attacks provide some analyzing message at the time of some attempt. B. Active Attacks Active attacks are related on change in the original message contents in particular pattern or false message at the time of creation.. These attacks Classified into three subparts:- 1. Interruption When an unauthorized entity prevent to an authorized entity. For Example, an authorized user Z might an authorized user X and message send to user Y. User Y believe that the message necessarily came from user X [2,6]. In masquerade attacks, another kind of active attacks are also embedding. As an instance, this attack involve to known about the user`s authentication sequence (e.g. user ID and password). 2. Modification Modification means to the change in message data. II. Multimedia Information In this digital seanario, increasing more in communication networks, and growing passion of the general public for new information technologies cause to huge growth of multimedia document traffic (image, text, audio, video, etc.). This is now very necessary in this seanario that protect and control of the changing data is major problem.. Digital images, multimedia documents can be duplicated, easily edit use easily for another work. and delet very easily. In this concern, it is important to copyright protection sysytem start for this missuse, [6,9]. Watermarking seems to be the alternative best solution for protection against duplication, and authentication of content. II. RELATED WORK In year 2010, E Kee et. al. proposed a method [29] that specify how to exploit for image authentication of the pattern and storage of an embedded image summary. The creation of a concise is a series of filtering operations, contrast alteration, and confining. We provide model parameters and these parameters differ extremely between camera producer and photo-analyze software. We also specify how this signature can be linked with encoding information from the essential high resolution image to further show the signature’s disnctiveness. Past method for image authentication decline into three groups: watermarking, forensics, and complex hashing. In digital forensics, the user find out the authenticity of entire picture by analyzing the received content [5- 6]. Incurably, information
  • 3. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 10 about original, we cannot finally confirm the purity of the received content because content not related to the original may pass forensic investigates. Watermarking is other choice for image authentication. A semi-fragile watermark is fixed into the host signal waveform without intuitive misinterpretation. Users can confirm authenticity by obtain the watermark from the acquired content. The system designs become insure that the watermark keeps lossy compression, intensely, watermarking authentication is not in reversible suitable with before encoded contents; i.e., unused content cannot be authenticated. Fixed watermarks capable to required bit rate increase when shrink a media file. Alike Yao et. al. [12] refined an authentication techniques depend on complex hashing, which is influenced by cryptographic hashing [13]. Within this technique, the user reviews the sincerity of the received content from the original one from this small amount of data imitative. Various image authentication systems based on hash function obtain robustness across lossy compression by using compression consistent appearance; these compressions-influenced features are designed for particular compression design but decline under another coding design or probable image processing. Robustness is increased using more refined features; any fixed point has the lack that an attacker understood the null space of the projection can revise the image not effect the authenticate data. Using pseudorandom projections keeps the null space a private. these features calculated also in a nonlinear presence. Appearance robust across rotation, prune, resisting, or translation has been apply on the Radon transform [23- 24], other process include features necessary for human visual system [28]. Continuation and compression of authentication data have not been affected from intensity. More way use course Continuation. Such as, Fridrich et al. Use 1-bit quantization for random projection consents the relation-based schemes can be treated as 1-bit quantization of coefficients variance. Venkatesan et al. [21] first use regard error- correcting coding to reduce the image authentication data size. This scheme projects the binary and vectors both images into syndrome bits which is an error-correcting code and directly equality the syndrome bits to decide the authenticity. The way of Sun et al. uses organized Hamming codes to Retrieve the binary feature vectors parity check bits as the authenticate data [30]. These parity check bits are joining with the binary character vector of the received image to remove the errors show by image processing, just as compression. Our unique ideas make update with the knowledge of statistical methods and distributed source coding. Activate by our access, So, after analyzing all research work, it is found that still this research area has a huge space of normal and efficient technology for image authentication. Thus, in this discourse work we proposed a work for image authentication occupy on the encoding-decoding approach of low density parity check methods with cryptography. The proposed approach insures that the original image received at receiver side is un-tampered. III. CONCLUSIONS Within the paper, we analyzes the existing work complete in the similar area and proposed a innovative image validation scheme that distinct appropriate encoding variations of an image from diversify versions based on allocate authorize coding and static methods. A two-phase loss channel represents the static dependency between the source and the target pics. Diversify decline are retrieve by using a static image and real compression noise is affected to be preservative white Gaussian noise. IV. PROPOSED SCHEME The proposed method uses distributed source coding of image authentication system. of a Slepian–Wolf contain the authenticate data as in figure1, a random seed, and a signature of the image projection. The final image is typed as an output of the two-state lossy channel. The user capture the final image using the equal projection
  • 4. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 11 and side information and try to decoded the Slepian–Wolf bit stream uses the information. If the decoding prcess fails, i.e., the reconstructed image projection hash value not match the signature, decoder claims verification it is tampered; or, the side information is verify using hypothesis testing. Fig. 1: Encryption Process with Secret Key REFERENCES 1. Fridrich, D. Soukal, J.Luk´a˘s,“Detection of copy move forgery in digital images,” in Proceedings of Digital Forensic Research Workshop, 2003 August. 2. Popescu and H. Farid,“Exposing digital forgeries by detecting duplicated image regions”, Tech. Rep. TR2004-515, Department of Computer Science, Dartmouth College, 2004. 3. Z. Lin, R. Wang, X. Tang, H.-V. Shum, “Detecting doctored images using camera response normality and consistency”, in Computer Vision and Pattern Recognition, (San Diego, CA), 2005. 4. M. Johnson, H. Farid,“Exposing digital forgeries in complex lighting environments”, IEEE Transactions on Information Forensics and Security 3(2), 2007, pp. 450– 461. (2002) The IEEE website. [Online]. Available: http://www.ieee.org/ 5. Luk´a˘s, J. Fridrich, M. Goljan, “Digital camera identification from sensor noise”, IEEE Transactions on Information Security and Forensics 1(2), 2006, pp. 205– 214. 6. Gallager, R. G.,“Low Density Parity Check Codes, Monograph”, M.I.T. Press, 1963. 7. H. Farid,“Image forgery detection”, IEEE Signal Process. Mag., Vol. 26, No. 2, Mar 2009, pp. 16–25. 8. Popescu, H. Farid,“Exposing digital forgeries in color filter array interpolated images”, IEEE Trans. Signal Process., Vol. 53, No. 10, Oct. 2005, pp. 3948–3959. 9. J. Cox, J. Kilian, T. Leighton, and T. Shamoon,“Secure sprectrum watermarking for images, audio and video”, in Proc. I Conf. Image Process., Lausanne, Switzerland, 1996, Sep. 10. ] R. B. Wolfgang, E. J. Delp,“A watermark for digital images”, in Proc. IEEE Int. Conf. Image Process., Lausanne, Switzerland,1996, Sep. 11. Yao-Chung Lin, David Varodayan,“Image Authentication Using Distributed Source Coding”, In IEEE Transactions on Image Processing, Vol. 21, No. 1, January 2012, pp. 273- 283 12. W. Diffie, M. E. Hellman,“New directions in cryptography”, IEEE Trans. Inf. Theory, Vol. IT-22, No. 6, Jan. 1976, pp. 644–654. 13. C.-Y. Lin, S.-F. Chang,“Generating robust digital signature for image/video authentication”, in ACM Multimedia:
  • 5. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 12 Multimedia and Security Workshop, Bristol, U.K., Sep. 1998, pp. 49–54. 14. M. Schlauweg, D. Pröfrock, E. Müller, “JPEG2000-based secure image authentication”, in Workshop on Multimedia and Security, 2006, Geneva, Switzerland, pp. 62–67. 15. M. Schneider, S.-F. Chang,“A robust content based digital signature for image authentication”, in Proc. IEEE Int. Conf. Image Process., Vol. 3, Sep. 1996, pp. 227– 230. 16. Fridrich, “Robust bit extraction from images”, in Int. Conf. Multimedia Computing and Syst., Vol. 2, Jul. 1999, pp. 536–540. 17. D.-C. Lou, J.-L. Liu,“Fault resilient and compression tolerant digital signature for image authentication”, IEEE Trans. Consumer Electronics, Vol. 46, No. 1, Feb. 2000, pp. 31–39. 18. L. Xie, G. R. Arce, R. F. Graveman,“Approximate image message authentication codes”, IEEE Trans. Multimedia, Vol. 3, No. 2, Jun. 2001, pp. 242–252. 19. Qiu, J., Wang, P.: An image encryption and authentication scheme. In: 2011 Seventh International Conference on Computational Intelligence and Security (CIS), December 3-4, pp. 784–787. IEEE (2011) 20. H. Zhang, H. Zhang, Q. Li, and X. Niu,“Predigest Watson’s visual model as perceptual hashing method”, in Int. Conf.Convergence and Hybrid Inf. Technol., 2008, Nov, Vol. 2, pp. 617–620. 21. R.Venkatesan, S.-M.Koon,M.H. Jakubowski, P.Moulin, “Robust image hashing”, Proc. IEEE Int. Conf. Image Process., Vol. 3, 2000, pp. 664–666. 22. F. Lefebvre, J. Czyz, B. Macq,“A robust soft hash algorithm for digital image signature”, in Int. Conf.Multimedia and Expo, 2003, Baltimore, MD. 23. H.-L. Zhang, C.-Q. Xiong, G.-Z. Geng,“Content based image hashing robust to geometric transformations”, in Proc. Int. Symp. Electronic Commerce and Security, 2009, May, Vol. 2, pp. 105108. 24. Swaminathan, Y. Mao, M. Wu,“Robust and secure image hashing”, IEEE Trans. Inf. Forensics and Security, Vol. 1, No. 2, Jun. 2006, pp. 215–230. 25. C. De Roover, C. DeVleeschouwer, F. Lefebvre, B.Macq, “Robust video hashing based on radial projections of key frames”, IEEE Trans. Signal Process., Vol. 53, No. 10, Oct. 2005, pp. 4020–4037. 26. Ghoshal, N., Mandal, J.K.: A Bit Level Image Authentication/Secrete Message Transmission Technique (BLIA/SMTT), Association for the Advancement of Modelling & Simulation Technique in
  • 6. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015 ISSN: 2395-1303 http://www.ijetjournal.org Page 13 Enterprises (AMSE). AMSE Journal of Signal Processing and Pattern Recognition 51(4), 1–13 (2008) 27. MONGA, B. L. EVANS,“PERCEPTUAL IMAGE HASHING VIA FEATURE POINTS: PERFORMANCE EVALUATION AND TRADEOFFS”, IEEE TRANS. IMAGE PROCESS., VOL. 15, NO. 11, NOV. 2006, PP. 3452– 3465. 28. AI-Gindy, A.: A Fragile Invertible Watermarking Technique for the Authentication of Medical Images, pp. 191– 195. IEEE (2011) 29. E Kee, H Farid,“Digital Image Authentication from Thumbnails”, in SPIE Symposium on Electronic Imaging, San Jose, CA, 2010. 30. M. Tagliasacchi, G. Valenzise, S. Tubaro,“Hash-based identification of sparse image tampering”, IEEE Trans. Image Process., Vol. 18, No. 11, pp. 2491– 2504, Nov. 2009.