SlideShare a Scribd company logo
1 of 5
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 3, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 630
Study, analysis and formulation of a new method for integrity protection
of digital data from unauthorized access
Leena Goyal1
Dr. Bright Keswani2
1
M. Tech scholar 2
Associate Professor & Head
1
Computer science and Engg 2
Department of Computer Applications
1, 2
Suresh Gyan Vihar University, Jaipur, India
Abstract—Digital watermarking provides authentication,
validation and copyright protection for multimedia contents
over the internet. Text is the most widely used means of
communication in addition to image, audio and video. So it
needs to be protected. Text watermarking techniques that
have been developed in past protects the text from illegal
copying, imitation, and prevents copyright violations. In this
paper, we have proposed an algorithm that ensures the
integrity and confidentiality of the document. In this
technique watermark is created based on the contents of the
document and embeds it without changing the contents of
the document and also encrypts the text to provide
confidentiality. To authenticate and prove the integrity of
the document the watermark can be easily extracted and
verified for tampering
Keywords: Confidentiality, Integrity, encryption, shuffling,
substitution, text watermarking, substitution, tampering.
I. INTRODUCTION
Digital watermarking is the means for providing
authentication and copyright protection for digital contents
over the internet. Digital watermarking is a technique for
inserting information into an image or text or audio, which
can be later extracted for various purposes including
identification and authentication. In the embedding process,
the watermark may be encoded into the cover data using a
specific key. This key is used to encrypt the watermark as an
additional protection level. The output of the embedding
process, the watermarked image, is then transmitted to the
recipient.
A digital watermarking generally involves three steps:
generating and embedding of the watermark, attacking and
detecting (Figure 1). The watermarking can be done by
various algorithms, the algorithm works on the document,
generating and embedding the watermark. In attacking the
attacker chooses to change some content or add some
content in the document or may even try to remove the
watermark. This is detected in the extracting stage where the
algorithm is applied on the attacked document to extracted
and check for any modification in the watermark.
Embedding Attacking Detection
Function on text function
Fig. 1: Steps of Digital Watermarking
Nowadays text is the most widely used means of
communication in addition to image, audio and video. The
major content of websites, newspapers, e-books, research
papers etc. is in the text format so the text needs to be fully
protected.
A text, being the simplest mode of communication
and information exchange, brings various challenges when it
comes to copyright protection and authentication. Text is
easier to copy, reproduce and tamper as compared with
images, audio and video. Text being a specialized medium
requires specialized copyright protection and authentication
solutions. Text document watermarking is the process of
inserting digital watermark into text document which posses
unique information about document owner. Due to text
document watermarking re-distribution, recopying is
prevented and copy recognition and copyright security is
achieved.
In many ways the text can be attacked, but
generally an attack is the indiscriminate insertion, deletion
or reordering of words and sentences to and from the text.
The existing text watermarking algorithms are not good to
provide confidentiality and integrity of document. In this
paper we have proposed a method to provide confidentiality
to text documents by encrypting the data and also prove the
integrity of document by easily extracting the watermarked
text image and verifying with the original text image.
II. DIGITAL WATERMARKING
A digital watermark can be visible (perceptible) or
invisible (imperceptible) In the case of visible
watermarking, watermarks are embedded in such a way that
they are visible when the content is viewed. Invisible
watermarks cannot be seen with the naked eye but they can
be recovered with an appropriate decoding algorithm.
The process of watermarking involves 4 steps
a) Watermark Generation b) Watermark Insertion c)
Watermark Detection d) Watermark Extraction
In the first process there are two possibilities one is
direct some unique digital signal as watermark is inserted
and another is unique watermark is generated using certain
technique.
In the second process as watermark is generated it
is inserted in original digital signal by some insertion
process at certain position.
In the third process user over the internet, third
parties, illegal authorities, attacker etc just identify or detect
that digital document contains watermark or not.
Fourth process is performed at recipient side it
extract watermark from digital document by using reverse
process of inserting watermark.
Based on the type of document to be watermarked,
watermarking can be classified as:
 Image Watermarking
Study, analysis and formulation of a new method for integrity protection of digital data from unauthorized access
(IJSRD/Vol. 1/Issue 3/2013/0058)
All rights reserved by www.ijsrd.com
631
 Video Watermarking
 Audio Watermarking
 Text Watermarking
Watermarking can be again robust or fragile. In
robust watermarking technique, the modification to the
watermarked content will not affect the watermark. But
fragile watermarking is a technique in which watermark gets
destroyed when watermarked content is modified or
tampered with.
Based on processing method used, watermarking can be
classified as:
 Spatial-domain techniques
 Transform-domain techniques
Watermarking in spatial-domain is straightforward.
Spatial domain watermarking are also the first watermarking
schemes that were investigated by researchers. Transform-
domain watermarking techniques have the convenience of
allowing us more direct understanding of the content of
cover data. This ease in understanding the content is
exploited in many ways.
On the basis of necessary data for extraction,
watermarks can be divided in to two categories:
a. Blind
b. Informed
In blind watermarking original document is not
required during watermark detection process. But in
informed, original document is required during watermark
extraction process.
The different issues that arise in the study of digital
watermarking techniques are:
Capacity: It is the minimum amount of data that
can be embedded in a given signal. To find the optimum
way to embed and the later extract this information.
Robustness: How the data can be embedded and
retrieved securely so that it would survive attacks at
removal?
Transparency: How the data can be embedded such
that it does not degrade the underlying content?
Security: How do we know that the information
embedded has not been tampered, forged or removed?
Cryptography only provides security by encryption
and decryption. But encryption cannot help the seller to
monitor how a legitimate customer handles the content after
decryption.
Hence we can say that there is no protection after
decryption. Unlike cryptography, watermarks can protect
content even after they are decoded. Cryptography cannot
prevent illegal replication of the digital content.
Cryptography is only about protecting the content of the
messages. Digital watermarking technique is an effective
method to solve these problems. Watermarks are inseparable
from the cover in which they are embedded. So besides
content protection, they provide many other applications
like copyright protection, robustness and integrity etc.
III. PROTECTING DIGITAL DATA
The main security properties for digital data are
confidentiality and integrity.
Confidentiality is a guarantee that data has not been
disclosed to an unauthorized party. Threats to confidentiality
include the direct release of sensitive data values,
approximate disclosures, and leaks resulting from inferences
and outside knowledge. One way to provide confidentiality
is to enforce access controls, which permit or deny access to
data items.
Another way to provide confidentiality is through
encryption, often used to protect data on insecure networks
or storage devices. In the proposed work we have not only
included watermark in form of image but we have encrypted
the image file before sending it to provide confidentiality.
Integrity is a guarantee that data has not been
modified from its original state by an unauthorized party.
This requires both that data come from an original source,
and that it be unaltered from its original state. Data
authenticity is a closely related term, but does not always
include freshness: a guarantee that a message or data item is
current, and is not being re-used outside its original context.
Threats to data integrity include tampering, message replay,
and accidental data loss. Tampering can include
modification or deletion of existing data, or insertion of new
data items. In the proposed algorithm we send encrypted
image file of text data and at the receiver side if any
modifications or alterations are made then the watermark
can easily be extracted and verified for tampering to prove
integrity.
IV. PREVIOUS WORK
Document involving plain text transferring and sharing over
the Internet has become popular and has become essential
over the last two decades. Text watermarking is one of the
most difficult types of watermarking.
There exist different types of text watermarking
techniques. In line shifting technique even lines are slightly
shifted up or down as a watermark in text document so that
normal human eyes cannot detect the difference. Odd lines
are use at the time of decoding as a reference.
In word shifting each line made by number of
words. So that even group of words is shifted left or right as
a watermark so that normal human eyes cannot detect the
difference. Odd group of words is used as reference to
calculate the distance at the time of decoding.
Feature of any specific character is changed in your
document. Then it is detected by comparing with original
document and watermarked document in feature coding.
In text document some of the expression change
will not change the meaning of the document, so this is used
as watermark in technique based on not important content
In original text document specific words selected
then it is replaced by its synonyms or acronyms such that
meaning of that document should be same. Then resultant
document is watermarked one in Synonyms or acronyms
based technique
Example: in original text document contains “This
is big city” replace in watermarked document by “This is
mega city” or “This is not a small city”.
In font size coding character font size is increased
by 0.5 in watermarked document otherwise keep document
as it is. In font coding, Microsoft word has many types of
fonts some of them are same means its effect is not
Study, analysis and formulation of a new method for integrity protection of digital data from unauthorized access
(IJSRD/Vol. 1/Issue 3/2013/0058)
All rights reserved by www.ijsrd.com
632
identified easily. Such fonts are used as watermarking.
Example: “Arial” and “Tunga”.
Key based technique uses object based
environment in which each text string is referred as different
object. Each object has its own properties and attributes. So
watermark is generated using key and embedded based on
properties of object like z-ordering of text object.
Normally text document composed of characters,
words, sentences. A sentence has different syntactic
structure. In Syntactic approach to insert watermark, apply
syntactic transformations on text document.
Text constitutes verbs, nouns, objectives,
prepositions, word spelling, synonyms, acronyms, sentence
structure, and grammar rules and so on. Such semantics are
used to insert watermark in Semantic approach.
DWTC technique is based on web documents.
Watermark embedded into web document and by using this
technique invisibleness and robustness improved.
There are several algorithms on text digital
watermarking and each algorithm is efficient and improved
in its own way. The algorithms are based on image,
semantic, syntax, structure. Text watermarking
incorporating text and image is most common and widely
used. The first one to propose such a method using text
image was Brassil, et al [6]. Later Maxemchuk, et al [7]-[8]
and Low, et al. [9] further analyzed this work and both
worked individually on these methods.
Ding Huang and Hong Yan [10] were the first to
propose a work based on inter-word space statistics and
without changing the content of the text document. The
work is efficient and still used today for references. Their
work involved changing the space between the words over a
number of lines and forming a pattern in the form of a sine
wave. The characteristics of their work included that sine
wave varies gradually and such variation cannot be noticed
by the human eyes. Sine wave’s periodic symmetry makes it
easy and reliable for decoding. Young-Won Kim, [11] et al
proposed their work based on word classification and inter-
word space statistics.
Works including text-image based to fully protect
the document were proposed [12] and where a signature was
embedded to ensure the authenticity [13]. Recently a work
has been proposed which not only protects the document but
ensure the authenticity by encrypting the text which
involves cryptography. [14] Algorithms based on secret
message being embedded in the text document also have
been put forwarded. [15] Xingming, et al’s works included
noun-verb basis for text watermarking [16], which uses
nouns and verbs in a sentence parsed with a parser grammar
using semantic. There are also work which based on the
synonym, the watermark is the certain words which are
replaced with their synonyms [17] There are also works
based on the occurrence of punctuation marks and double
letter words and the frequency of them.
A robust text watermarking algorithm using combined
image and text watermark to fully protect the text document
is proposed as in [1]. A method is proposed by Chu-Hsing
Lin to protect the integrity of text documents by computing
character’s skeletons [20]. They investigated binary type
documents protection by extracting skeletons of characters
in a document. By the proposed method one can verify the
integrity of text documents and a tampered document can be
easily detected.
V. PROBLEM FORMULATION
A work is proposed in [19] that uses combined image and
text watermark and encryption to protect the text document.
The watermark is logically embedded in the text and the text
is encrypted. Later the text is decrypted and then the
watermark is extracted to prove authenticity.
Disadvantage of this method:
1.) We have to encrypt and decrypt both image & text for
confidentiality while transmitting over the network.
2.) If we are able to get image then we can easily get
information about the text.
3.) Doesn’t provide confidentiality properly.
An algorithm is proposed in [18], generates a
watermark which modifies the inter-word space based on
the content of the document. The value being too small
remains unnoticeable to the human eyes which increases the
robustness. The watermark can be extracted to ensure the
authenticity and the integrity of the document. The contents
of the document are same after watermarking which ensures
one of the advantages of this algorithm.
Disadvantages of this method
1) Text is not encrypted so there is lack of security and
confidentiality
2) Only one keyword is selected and two types of shifting
is used for creating watermark so it does not give
robustness
VI. PROPOSED METHOD
We have proposed an algorithm that ensures the integrity
and confidentiality of the document. In this technique
watermark is created based on the contents of the document
and embeds it without changing the contents of the
document and also encrypts the text to provide
confidentiality. To authenticate and prove the integrity of
the document the watermark can be easily extracted and
verified for tampering.
The proposed method is based on selecting three
most frequent keywords and according to the occurrence of
keywords in the document we decide shuffling and
substitution.
Algorithm
 Create an equivalent image of the text file (image1).
 Select three most frequent words as keywords.
 Now start scanning of the file word by word and
compare each word with the keywords:
 If(selected word == keyword1)
 Apply shuffle method
 If(selected word == keyword2)
 Apply shuffle method
 If(selected word == keyword3)
 Apply shuffle method
 Else
 Apply shuffle method1
Study, analysis and formulation of a new method for integrity protection of digital data from unauthorized access
(IJSRD/Vol. 1/Issue 3/2013/0058)
All rights reserved by www.ijsrd.com
633
4.) Now we have a new image from image1 (image2)
5.) These results the encrypted watermarked image.
Shuffling Method
 Firstly we calculate the length of keyword found.
 Then we proceed towards another keyword from the
most frequent ones.
 Now according to the length of first keyword we apply
substitution technique.
 Substitution technique is applied between the frequent
keywords found in the file and this will continue upto
the end of file.
 Substitution is done just by adding the length of those
keywords with the remaining text.
 By doing this we get the encrypted form of text.
Shuffling method 1
 After applying the shuffle method we have to calculate
the average length from most frequent words.
 So now again we have to apply substitution method
with this average length of keywords.
 So again we apply the substitution method from this
average length for the entire file.
 There is a slight difference between both shuffling
methods, in shuffling method 1 we are applying
substitution on the entire file according to the average
length but in other substitution is applied between the
keywords.
Substitution technique
 Substitution has been done on the basis of keyword
 Length
 In the substitution technique we are taking keyword 1
as a start point and keyword 2 as an ending point.
 In between these keywords we are adding each
character with the length of keyword and then changing
into character value.
 When in between words are completed then we apply
the same process of selecting start and end points.
 The whole process will continue up to the end of file.
 Then after we get the encrypted file of text by
substitution.
Advantages
 Encryption provides confidentiality
 Either if one has the image file he is not able to retrieve
the text.
 We can send this image over the network without
further encryption.
VII. RESULT
MAT LAB simulations are performed on the text file and its
equivalent image file is generated. Now according to our
work we applied some substitution algorithm and there after
we get an encrypted form of that particular text file. Then
again we convert the encrypted text file into image form.
This encrypted form of image would be used to send
through network and if this image is altered or change by
any intruder then we can easily check by our work. So this
proposed work provides the feature of integrity in the text
documents through image. Our algorithm depends upon the
keywords which we have chosen from the text file. All the
integrity would be given by these keywords only. The larger
the frequency of keywords means the higher integrity
algorithm provide.
VIII. CONCLUSION
This paper provides an overview on the different features of
digital watermarking, the various applications and its use in
various fields. Text is the most widely used means of
communication and we have proposed an algorithm that
ensures the integrity of the document. A new technique is
put forward which creates a watermark based on the content
of the document and embeds it without changing the content
of the document. As the keyword used for the algorithm is
randomly chosen from a list of words it improves the
robustness of this algorithm. Further the alternative shifting
adds to the security and imperceptibility without adding any
complexity. To authenticate and prove the integrity of the
document, the watermark can be easily extracted and
verified for tampering.
REFERENCES
[1]. Z. Jalil, A. M. Mirza ,“Text Watermarking Using
Combined Image-plus- Text Watermark” , IEEE, 2010.
[2]. Z. Xiao-hua1,M. Hong-yun,L. Fang, “A New Kind of
Efficient Fragile Watermarking Technique“,Acta
ElectronicaSinica, 2004.
[3]. X.. Zhou,W. Zhao, Z. Wang, L. Pan,”Security Theory
and Attack Anlysis for Text watermarking”, IEEE,
2009.
[4]. Z. Jalil, A. M. Mirza ,“An Invisible Text Watermarking
Algorithm Using Image Watermark” ,Innovations In
Computing Science and Software Engineering, 2010.
[5]. M. Chandra, S. Pandey, R. Chaudhary, “Digital
Watermarking Techniques for Protecting Digital
Images”, IEEE, 2010.
[6]. J. T. Brassil, S. Low, N. F. Maxemchuk, and L.
O’Gorman, “Electronic Marking and Identification
Techniques to Discourage Document Copying”, IEEE
Journal on Selected Areas in Communications, vol. 13,
no. 8, October 1995, pp. 1495-1504.
[7]. N. F. Maxemchuk, “Electronic Document Distribution”,
AT&T Technical Journal, September 1994, pp. 73-80.
[8]. N. F. Maxemchuk and S. Low, “Marking Text
Documents,” Proceedings of the IEEE International
Conference on Image Processing, Washington, DC,
Oct. 26-29, 1997, pg. 13-16.
[9]. S. H. Low, N. F. Maxemchuk, and A. M. Lapone,
“Document Identification for Copyright Protection
Using Centroid Detection”, IEEE Transactions on
Communications, Mar. 1998, vol. 46, no.3, pg 372-381.
[10]. D. Huang and H. Yan, “Interword distance changes
represented by sine waves for Watermarking text
images”, IEEE Trans. Circuits and Systems for Video
Technology, Vol.11, No.12, pg.1237-1245, Dec 2001.
[11]. Young-Won Kim , Kyung-Ae Moon, and Il-Seok Oh,
“A Text Watermarking Algorithm based on Word
Classification and Inter-word Space Statistics” ,
Study, analysis and formulation of a new method for integrity protection of digital data from unauthorized access
(IJSRD/Vol. 1/Issue 3/2013/0058)
All rights reserved by www.ijsrd.com
634
Proceedings of the Seventh International Conference on
Document Analysis and Recognition, IEEE, 2003
[12]. Z. Jalil, A. M. Mirza ,“Text Watermarking Using
Combined Image-plus- Text Watermark” , IEEE, 2010
[13]. Z. Jalil, A. M. Mirza ,“An Invisible Text Watermarking
Algorithm Using Image Watermark”, Innovations in
Computing Science and Software Engineering, 2010.
[14]. Jaseena K.U., Anita John, “Text Watermarking using
Combined Image and Text for Authentication and
Protection”, International Journal of Computer
Applications ,Volume 20 No.4, April 2011
[15]. Sanjay Jadhav, Viddhulata Mohite, “A Data Hiding
Techniques Based on Length of English Text Using
DES and Attacks”, International Journal of Research in
Computer Science , Volume 2 Issue 4 ,2012, pg. 23-29
[16]. U. Topkara, M. Topkara, M. J. Atallah, “The Hiding
Virtues of Ambiguity: Quantifiably Resilient
Watermarking of Natural Language Text through
Synonym Substitutions”, Proceedings of ACM
Multimedia and Security Conference, Geneva, 2006
[17]. Xingming Sun, Alex Jessey Asiimwe, “Noun-Verb
Based Technique of Text Watermarking Using
Recursive Decent Semantic Net Parsers”, Proceedings
of ICNC (3), Springer Press, August 2005, Vol 3612,
pg: 958-961
[18]. Nikita Pandey*, Sayani Nandy*, Shelly Sinha
Choudhury** “Alternative shift algorithm for digital
watermarking on text” International Journal of
Scientific and Research Publications, Volume 2, Issue
10, October 2012 1 ISSN 2250-3153
[19]. Jaseena K.U Anita John “Text Watermarking using
Combined Image and Text for Authentication and
Protection” International Journal of Computer
Applications (0975 – 8887) Volume 20– No.4, April
2011
[20]. Chu-Hsing Lin, Jue-Sam Chou, Yu-Wen Chen
“Integrity Protection of Document Assets by
Computing Skeletons” IEEE 2007

More Related Content

What's hot

Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Publishing House
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingCSCJournals
 
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward SecurityCost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security1crore projects
 
Cryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCSCJournals
 
An Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking TechniqueAn Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking TechniqueCSCJournals
 
76 s201913
76 s20191376 s201913
76 s201913IJRAT
 
Paper id 2120145
Paper id 2120145Paper id 2120145
Paper id 2120145IJRAT
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudIJSRD
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
 
Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...eSAT Journals
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 

What's hot (18)

[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
 
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward SecurityCost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 
Cryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking Algorithm
 
An Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking TechniqueAn Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking Technique
 
76 s201913
76 s20191376 s201913
76 s201913
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Paper id 2120145
Paper id 2120145Paper id 2120145
Paper id 2120145
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
 
Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 

Viewers also liked

Leveranciersbijeenkomst tmlo 26062015
Leveranciersbijeenkomst tmlo 26062015Leveranciersbijeenkomst tmlo 26062015
Leveranciersbijeenkomst tmlo 26062015KING
 
Wplyw internetu na polska gospodarke - Lilianna golinowska_Furtak - eHandel 2011
Wplyw internetu na polska gospodarke - Lilianna golinowska_Furtak - eHandel 2011Wplyw internetu na polska gospodarke - Lilianna golinowska_Furtak - eHandel 2011
Wplyw internetu na polska gospodarke - Lilianna golinowska_Furtak - eHandel 2011ekomercyjnie
 
Workinprogress zaakgericht werken_3decentralisaties
Workinprogress zaakgericht werken_3decentralisatiesWorkinprogress zaakgericht werken_3decentralisaties
Workinprogress zaakgericht werken_3decentralisatiesKING
 
zaakgericht frank herik
zaakgericht frank herikzaakgericht frank herik
zaakgericht frank herikFrank Herik
 
Een digitale overheid: betere service, meer gemak
Een digitale overheid: betere service, meer gemakEen digitale overheid: betere service, meer gemak
Een digitale overheid: betere service, meer gemakVereniging SOD
 
De kracht van waardevolle informatie 2007
De kracht van waardevolle informatie 2007De kracht van waardevolle informatie 2007
De kracht van waardevolle informatie 2007Vereniging SOD
 
DigiD audits op gemeentelijke websites
DigiD audits op gemeentelijke websitesDigiD audits op gemeentelijke websites
DigiD audits op gemeentelijke websiteskinggemeenten
 

Viewers also liked (7)

Leveranciersbijeenkomst tmlo 26062015
Leveranciersbijeenkomst tmlo 26062015Leveranciersbijeenkomst tmlo 26062015
Leveranciersbijeenkomst tmlo 26062015
 
Wplyw internetu na polska gospodarke - Lilianna golinowska_Furtak - eHandel 2011
Wplyw internetu na polska gospodarke - Lilianna golinowska_Furtak - eHandel 2011Wplyw internetu na polska gospodarke - Lilianna golinowska_Furtak - eHandel 2011
Wplyw internetu na polska gospodarke - Lilianna golinowska_Furtak - eHandel 2011
 
Workinprogress zaakgericht werken_3decentralisaties
Workinprogress zaakgericht werken_3decentralisatiesWorkinprogress zaakgericht werken_3decentralisaties
Workinprogress zaakgericht werken_3decentralisaties
 
zaakgericht frank herik
zaakgericht frank herikzaakgericht frank herik
zaakgericht frank herik
 
Een digitale overheid: betere service, meer gemak
Een digitale overheid: betere service, meer gemakEen digitale overheid: betere service, meer gemak
Een digitale overheid: betere service, meer gemak
 
De kracht van waardevolle informatie 2007
De kracht van waardevolle informatie 2007De kracht van waardevolle informatie 2007
De kracht van waardevolle informatie 2007
 
DigiD audits op gemeentelijke websites
DigiD audits op gemeentelijke websitesDigiD audits op gemeentelijke websites
DigiD audits op gemeentelijke websites
 

Similar to Study, analysis and formulation of a new method for integrity protection of digital data from unauthorized access

STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
 
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...AIRCC Publishing Corporation
 
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ijcsit
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarkingijsrd.com
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsYogeshIJTSRD
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar10e11a0545
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueIRJET Journal
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Journals
 
Review on Quantum Watermarking Techniques
Review on Quantum Watermarking TechniquesReview on Quantum Watermarking Techniques
Review on Quantum Watermarking TechniquesIRJET Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 

Similar to Study, analysis and formulation of a new method for integrity protection of digital data from unauthorized access (20)

1709 1715
1709 17151709 1715
1709 1715
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))
 
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
 
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarking
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
Review on Quantum Watermarking Techniques
Review on Quantum Watermarking TechniquesReview on Quantum Watermarking Techniques
Review on Quantum Watermarking Techniques
 
Dz31840846
Dz31840846Dz31840846
Dz31840846
 
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
F1803023843
F1803023843F1803023843
F1803023843
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 

Recently uploaded (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 

Study, analysis and formulation of a new method for integrity protection of digital data from unauthorized access

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 3, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 630 Study, analysis and formulation of a new method for integrity protection of digital data from unauthorized access Leena Goyal1 Dr. Bright Keswani2 1 M. Tech scholar 2 Associate Professor & Head 1 Computer science and Engg 2 Department of Computer Applications 1, 2 Suresh Gyan Vihar University, Jaipur, India Abstract—Digital watermarking provides authentication, validation and copyright protection for multimedia contents over the internet. Text is the most widely used means of communication in addition to image, audio and video. So it needs to be protected. Text watermarking techniques that have been developed in past protects the text from illegal copying, imitation, and prevents copyright violations. In this paper, we have proposed an algorithm that ensures the integrity and confidentiality of the document. In this technique watermark is created based on the contents of the document and embeds it without changing the contents of the document and also encrypts the text to provide confidentiality. To authenticate and prove the integrity of the document the watermark can be easily extracted and verified for tampering Keywords: Confidentiality, Integrity, encryption, shuffling, substitution, text watermarking, substitution, tampering. I. INTRODUCTION Digital watermarking is the means for providing authentication and copyright protection for digital contents over the internet. Digital watermarking is a technique for inserting information into an image or text or audio, which can be later extracted for various purposes including identification and authentication. In the embedding process, the watermark may be encoded into the cover data using a specific key. This key is used to encrypt the watermark as an additional protection level. The output of the embedding process, the watermarked image, is then transmitted to the recipient. A digital watermarking generally involves three steps: generating and embedding of the watermark, attacking and detecting (Figure 1). The watermarking can be done by various algorithms, the algorithm works on the document, generating and embedding the watermark. In attacking the attacker chooses to change some content or add some content in the document or may even try to remove the watermark. This is detected in the extracting stage where the algorithm is applied on the attacked document to extracted and check for any modification in the watermark. Embedding Attacking Detection Function on text function Fig. 1: Steps of Digital Watermarking Nowadays text is the most widely used means of communication in addition to image, audio and video. The major content of websites, newspapers, e-books, research papers etc. is in the text format so the text needs to be fully protected. A text, being the simplest mode of communication and information exchange, brings various challenges when it comes to copyright protection and authentication. Text is easier to copy, reproduce and tamper as compared with images, audio and video. Text being a specialized medium requires specialized copyright protection and authentication solutions. Text document watermarking is the process of inserting digital watermark into text document which posses unique information about document owner. Due to text document watermarking re-distribution, recopying is prevented and copy recognition and copyright security is achieved. In many ways the text can be attacked, but generally an attack is the indiscriminate insertion, deletion or reordering of words and sentences to and from the text. The existing text watermarking algorithms are not good to provide confidentiality and integrity of document. In this paper we have proposed a method to provide confidentiality to text documents by encrypting the data and also prove the integrity of document by easily extracting the watermarked text image and verifying with the original text image. II. DIGITAL WATERMARKING A digital watermark can be visible (perceptible) or invisible (imperceptible) In the case of visible watermarking, watermarks are embedded in such a way that they are visible when the content is viewed. Invisible watermarks cannot be seen with the naked eye but they can be recovered with an appropriate decoding algorithm. The process of watermarking involves 4 steps a) Watermark Generation b) Watermark Insertion c) Watermark Detection d) Watermark Extraction In the first process there are two possibilities one is direct some unique digital signal as watermark is inserted and another is unique watermark is generated using certain technique. In the second process as watermark is generated it is inserted in original digital signal by some insertion process at certain position. In the third process user over the internet, third parties, illegal authorities, attacker etc just identify or detect that digital document contains watermark or not. Fourth process is performed at recipient side it extract watermark from digital document by using reverse process of inserting watermark. Based on the type of document to be watermarked, watermarking can be classified as:  Image Watermarking
  • 2. Study, analysis and formulation of a new method for integrity protection of digital data from unauthorized access (IJSRD/Vol. 1/Issue 3/2013/0058) All rights reserved by www.ijsrd.com 631  Video Watermarking  Audio Watermarking  Text Watermarking Watermarking can be again robust or fragile. In robust watermarking technique, the modification to the watermarked content will not affect the watermark. But fragile watermarking is a technique in which watermark gets destroyed when watermarked content is modified or tampered with. Based on processing method used, watermarking can be classified as:  Spatial-domain techniques  Transform-domain techniques Watermarking in spatial-domain is straightforward. Spatial domain watermarking are also the first watermarking schemes that were investigated by researchers. Transform- domain watermarking techniques have the convenience of allowing us more direct understanding of the content of cover data. This ease in understanding the content is exploited in many ways. On the basis of necessary data for extraction, watermarks can be divided in to two categories: a. Blind b. Informed In blind watermarking original document is not required during watermark detection process. But in informed, original document is required during watermark extraction process. The different issues that arise in the study of digital watermarking techniques are: Capacity: It is the minimum amount of data that can be embedded in a given signal. To find the optimum way to embed and the later extract this information. Robustness: How the data can be embedded and retrieved securely so that it would survive attacks at removal? Transparency: How the data can be embedded such that it does not degrade the underlying content? Security: How do we know that the information embedded has not been tampered, forged or removed? Cryptography only provides security by encryption and decryption. But encryption cannot help the seller to monitor how a legitimate customer handles the content after decryption. Hence we can say that there is no protection after decryption. Unlike cryptography, watermarks can protect content even after they are decoded. Cryptography cannot prevent illegal replication of the digital content. Cryptography is only about protecting the content of the messages. Digital watermarking technique is an effective method to solve these problems. Watermarks are inseparable from the cover in which they are embedded. So besides content protection, they provide many other applications like copyright protection, robustness and integrity etc. III. PROTECTING DIGITAL DATA The main security properties for digital data are confidentiality and integrity. Confidentiality is a guarantee that data has not been disclosed to an unauthorized party. Threats to confidentiality include the direct release of sensitive data values, approximate disclosures, and leaks resulting from inferences and outside knowledge. One way to provide confidentiality is to enforce access controls, which permit or deny access to data items. Another way to provide confidentiality is through encryption, often used to protect data on insecure networks or storage devices. In the proposed work we have not only included watermark in form of image but we have encrypted the image file before sending it to provide confidentiality. Integrity is a guarantee that data has not been modified from its original state by an unauthorized party. This requires both that data come from an original source, and that it be unaltered from its original state. Data authenticity is a closely related term, but does not always include freshness: a guarantee that a message or data item is current, and is not being re-used outside its original context. Threats to data integrity include tampering, message replay, and accidental data loss. Tampering can include modification or deletion of existing data, or insertion of new data items. In the proposed algorithm we send encrypted image file of text data and at the receiver side if any modifications or alterations are made then the watermark can easily be extracted and verified for tampering to prove integrity. IV. PREVIOUS WORK Document involving plain text transferring and sharing over the Internet has become popular and has become essential over the last two decades. Text watermarking is one of the most difficult types of watermarking. There exist different types of text watermarking techniques. In line shifting technique even lines are slightly shifted up or down as a watermark in text document so that normal human eyes cannot detect the difference. Odd lines are use at the time of decoding as a reference. In word shifting each line made by number of words. So that even group of words is shifted left or right as a watermark so that normal human eyes cannot detect the difference. Odd group of words is used as reference to calculate the distance at the time of decoding. Feature of any specific character is changed in your document. Then it is detected by comparing with original document and watermarked document in feature coding. In text document some of the expression change will not change the meaning of the document, so this is used as watermark in technique based on not important content In original text document specific words selected then it is replaced by its synonyms or acronyms such that meaning of that document should be same. Then resultant document is watermarked one in Synonyms or acronyms based technique Example: in original text document contains “This is big city” replace in watermarked document by “This is mega city” or “This is not a small city”. In font size coding character font size is increased by 0.5 in watermarked document otherwise keep document as it is. In font coding, Microsoft word has many types of fonts some of them are same means its effect is not
  • 3. Study, analysis and formulation of a new method for integrity protection of digital data from unauthorized access (IJSRD/Vol. 1/Issue 3/2013/0058) All rights reserved by www.ijsrd.com 632 identified easily. Such fonts are used as watermarking. Example: “Arial” and “Tunga”. Key based technique uses object based environment in which each text string is referred as different object. Each object has its own properties and attributes. So watermark is generated using key and embedded based on properties of object like z-ordering of text object. Normally text document composed of characters, words, sentences. A sentence has different syntactic structure. In Syntactic approach to insert watermark, apply syntactic transformations on text document. Text constitutes verbs, nouns, objectives, prepositions, word spelling, synonyms, acronyms, sentence structure, and grammar rules and so on. Such semantics are used to insert watermark in Semantic approach. DWTC technique is based on web documents. Watermark embedded into web document and by using this technique invisibleness and robustness improved. There are several algorithms on text digital watermarking and each algorithm is efficient and improved in its own way. The algorithms are based on image, semantic, syntax, structure. Text watermarking incorporating text and image is most common and widely used. The first one to propose such a method using text image was Brassil, et al [6]. Later Maxemchuk, et al [7]-[8] and Low, et al. [9] further analyzed this work and both worked individually on these methods. Ding Huang and Hong Yan [10] were the first to propose a work based on inter-word space statistics and without changing the content of the text document. The work is efficient and still used today for references. Their work involved changing the space between the words over a number of lines and forming a pattern in the form of a sine wave. The characteristics of their work included that sine wave varies gradually and such variation cannot be noticed by the human eyes. Sine wave’s periodic symmetry makes it easy and reliable for decoding. Young-Won Kim, [11] et al proposed their work based on word classification and inter- word space statistics. Works including text-image based to fully protect the document were proposed [12] and where a signature was embedded to ensure the authenticity [13]. Recently a work has been proposed which not only protects the document but ensure the authenticity by encrypting the text which involves cryptography. [14] Algorithms based on secret message being embedded in the text document also have been put forwarded. [15] Xingming, et al’s works included noun-verb basis for text watermarking [16], which uses nouns and verbs in a sentence parsed with a parser grammar using semantic. There are also work which based on the synonym, the watermark is the certain words which are replaced with their synonyms [17] There are also works based on the occurrence of punctuation marks and double letter words and the frequency of them. A robust text watermarking algorithm using combined image and text watermark to fully protect the text document is proposed as in [1]. A method is proposed by Chu-Hsing Lin to protect the integrity of text documents by computing character’s skeletons [20]. They investigated binary type documents protection by extracting skeletons of characters in a document. By the proposed method one can verify the integrity of text documents and a tampered document can be easily detected. V. PROBLEM FORMULATION A work is proposed in [19] that uses combined image and text watermark and encryption to protect the text document. The watermark is logically embedded in the text and the text is encrypted. Later the text is decrypted and then the watermark is extracted to prove authenticity. Disadvantage of this method: 1.) We have to encrypt and decrypt both image & text for confidentiality while transmitting over the network. 2.) If we are able to get image then we can easily get information about the text. 3.) Doesn’t provide confidentiality properly. An algorithm is proposed in [18], generates a watermark which modifies the inter-word space based on the content of the document. The value being too small remains unnoticeable to the human eyes which increases the robustness. The watermark can be extracted to ensure the authenticity and the integrity of the document. The contents of the document are same after watermarking which ensures one of the advantages of this algorithm. Disadvantages of this method 1) Text is not encrypted so there is lack of security and confidentiality 2) Only one keyword is selected and two types of shifting is used for creating watermark so it does not give robustness VI. PROPOSED METHOD We have proposed an algorithm that ensures the integrity and confidentiality of the document. In this technique watermark is created based on the contents of the document and embeds it without changing the contents of the document and also encrypts the text to provide confidentiality. To authenticate and prove the integrity of the document the watermark can be easily extracted and verified for tampering. The proposed method is based on selecting three most frequent keywords and according to the occurrence of keywords in the document we decide shuffling and substitution. Algorithm  Create an equivalent image of the text file (image1).  Select three most frequent words as keywords.  Now start scanning of the file word by word and compare each word with the keywords:  If(selected word == keyword1)  Apply shuffle method  If(selected word == keyword2)  Apply shuffle method  If(selected word == keyword3)  Apply shuffle method  Else  Apply shuffle method1
  • 4. Study, analysis and formulation of a new method for integrity protection of digital data from unauthorized access (IJSRD/Vol. 1/Issue 3/2013/0058) All rights reserved by www.ijsrd.com 633 4.) Now we have a new image from image1 (image2) 5.) These results the encrypted watermarked image. Shuffling Method  Firstly we calculate the length of keyword found.  Then we proceed towards another keyword from the most frequent ones.  Now according to the length of first keyword we apply substitution technique.  Substitution technique is applied between the frequent keywords found in the file and this will continue upto the end of file.  Substitution is done just by adding the length of those keywords with the remaining text.  By doing this we get the encrypted form of text. Shuffling method 1  After applying the shuffle method we have to calculate the average length from most frequent words.  So now again we have to apply substitution method with this average length of keywords.  So again we apply the substitution method from this average length for the entire file.  There is a slight difference between both shuffling methods, in shuffling method 1 we are applying substitution on the entire file according to the average length but in other substitution is applied between the keywords. Substitution technique  Substitution has been done on the basis of keyword  Length  In the substitution technique we are taking keyword 1 as a start point and keyword 2 as an ending point.  In between these keywords we are adding each character with the length of keyword and then changing into character value.  When in between words are completed then we apply the same process of selecting start and end points.  The whole process will continue up to the end of file.  Then after we get the encrypted file of text by substitution. Advantages  Encryption provides confidentiality  Either if one has the image file he is not able to retrieve the text.  We can send this image over the network without further encryption. VII. RESULT MAT LAB simulations are performed on the text file and its equivalent image file is generated. Now according to our work we applied some substitution algorithm and there after we get an encrypted form of that particular text file. Then again we convert the encrypted text file into image form. This encrypted form of image would be used to send through network and if this image is altered or change by any intruder then we can easily check by our work. So this proposed work provides the feature of integrity in the text documents through image. Our algorithm depends upon the keywords which we have chosen from the text file. All the integrity would be given by these keywords only. The larger the frequency of keywords means the higher integrity algorithm provide. VIII. CONCLUSION This paper provides an overview on the different features of digital watermarking, the various applications and its use in various fields. Text is the most widely used means of communication and we have proposed an algorithm that ensures the integrity of the document. A new technique is put forward which creates a watermark based on the content of the document and embeds it without changing the content of the document. As the keyword used for the algorithm is randomly chosen from a list of words it improves the robustness of this algorithm. Further the alternative shifting adds to the security and imperceptibility without adding any complexity. To authenticate and prove the integrity of the document, the watermark can be easily extracted and verified for tampering. REFERENCES [1]. Z. Jalil, A. M. Mirza ,“Text Watermarking Using Combined Image-plus- Text Watermark” , IEEE, 2010. [2]. Z. Xiao-hua1,M. Hong-yun,L. Fang, “A New Kind of Efficient Fragile Watermarking Technique“,Acta ElectronicaSinica, 2004. [3]. X.. Zhou,W. Zhao, Z. Wang, L. Pan,”Security Theory and Attack Anlysis for Text watermarking”, IEEE, 2009. [4]. Z. Jalil, A. M. Mirza ,“An Invisible Text Watermarking Algorithm Using Image Watermark” ,Innovations In Computing Science and Software Engineering, 2010. [5]. M. Chandra, S. Pandey, R. Chaudhary, “Digital Watermarking Techniques for Protecting Digital Images”, IEEE, 2010. [6]. J. T. Brassil, S. Low, N. F. Maxemchuk, and L. O’Gorman, “Electronic Marking and Identification Techniques to Discourage Document Copying”, IEEE Journal on Selected Areas in Communications, vol. 13, no. 8, October 1995, pp. 1495-1504. [7]. N. F. Maxemchuk, “Electronic Document Distribution”, AT&T Technical Journal, September 1994, pp. 73-80. [8]. N. F. Maxemchuk and S. Low, “Marking Text Documents,” Proceedings of the IEEE International Conference on Image Processing, Washington, DC, Oct. 26-29, 1997, pg. 13-16. [9]. S. H. Low, N. F. Maxemchuk, and A. M. Lapone, “Document Identification for Copyright Protection Using Centroid Detection”, IEEE Transactions on Communications, Mar. 1998, vol. 46, no.3, pg 372-381. [10]. D. Huang and H. Yan, “Interword distance changes represented by sine waves for Watermarking text images”, IEEE Trans. Circuits and Systems for Video Technology, Vol.11, No.12, pg.1237-1245, Dec 2001. [11]. Young-Won Kim , Kyung-Ae Moon, and Il-Seok Oh, “A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics” ,
  • 5. Study, analysis and formulation of a new method for integrity protection of digital data from unauthorized access (IJSRD/Vol. 1/Issue 3/2013/0058) All rights reserved by www.ijsrd.com 634 Proceedings of the Seventh International Conference on Document Analysis and Recognition, IEEE, 2003 [12]. Z. Jalil, A. M. Mirza ,“Text Watermarking Using Combined Image-plus- Text Watermark” , IEEE, 2010 [13]. Z. Jalil, A. M. Mirza ,“An Invisible Text Watermarking Algorithm Using Image Watermark”, Innovations in Computing Science and Software Engineering, 2010. [14]. Jaseena K.U., Anita John, “Text Watermarking using Combined Image and Text for Authentication and Protection”, International Journal of Computer Applications ,Volume 20 No.4, April 2011 [15]. Sanjay Jadhav, Viddhulata Mohite, “A Data Hiding Techniques Based on Length of English Text Using DES and Attacks”, International Journal of Research in Computer Science , Volume 2 Issue 4 ,2012, pg. 23-29 [16]. U. Topkara, M. Topkara, M. J. Atallah, “The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions”, Proceedings of ACM Multimedia and Security Conference, Geneva, 2006 [17]. Xingming Sun, Alex Jessey Asiimwe, “Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers”, Proceedings of ICNC (3), Springer Press, August 2005, Vol 3612, pg: 958-961 [18]. Nikita Pandey*, Sayani Nandy*, Shelly Sinha Choudhury** “Alternative shift algorithm for digital watermarking on text” International Journal of Scientific and Research Publications, Volume 2, Issue 10, October 2012 1 ISSN 2250-3153 [19]. Jaseena K.U Anita John “Text Watermarking using Combined Image and Text for Authentication and Protection” International Journal of Computer Applications (0975 – 8887) Volume 20– No.4, April 2011 [20]. Chu-Hsing Lin, Jue-Sam Chou, Yu-Wen Chen “Integrity Protection of Document Assets by Computing Skeletons” IEEE 2007