IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 3- Issue 1, January 2014 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Efficient Analysis And Secure Client Side Image Using Fingerprint Embedding

[Full Text]

 

AUTHOR(S)

A. Sudha, K. Vanitha, A. NooralShaba

 

KEYWORDS

Index Terms: Finger print embedding, Decryption, Encoding, Decoding, Encryption, Decryption.

 

ABSTRACT

Abstract: In Secure embedding, the data sent to the client in encrypted form along with a client specific decryption key. The decryption process and watermarking process are securely interwined, so that decryption result in a different uniquely watermarked content copy personalized for the client. The main objective of the project is to introduce the audition to identify whether the received image is original or not. To do that it maintains the authorized users fingerprint. For sending the image, the sender has to encode the finger print with the original image. While encoding, the senders fingerprint will be embedded behind the original image. After receiving the fingerprint images the receiver has to decode the image. While decoding the image the receiver can extract the fingerprint which is embedded in the image. Then the forensics detector checks the extracted finger print with the collected fingerprints. If the fingerprints are matched then the received image is original image otherwise the received image has been modified by the hackers.

 

REFERENCES

[1]. A. K. Jain, A. A. Ross,K.Nandakumar, Introduction to Biometrics, Springer, 2011, 311 p.
[2]. Alessandro Piva., Alessia De Rosa., and Tiziano Bianchi.(2010) ‘Secure Client-Side ST-DM Watermark Embedding’, IEEE Trans. On Information Forensics and Security,Vol.5,No.1,March.

[3]. Avcibas, I.,Bayram, S., Memon, N., and Sankur, B (2006) ‘Image manipulation detection,” Journal of ElectronicImaging, Volume 15, Issue4, 041102 (17 pages), vol.15(4).

[4]. Buccigrossi, R.W. and Simoncelli, E.P. (1999) ‘Image compression via joint statistical characterization in the wavelet domain’, IEEE Transactions on Image Processing, 8(12):1688.1701.

[5]. Christopoulos, C., and Nister, D. (1997) ‘An embedded DCT-based still image coding algorithm’, ISO/IEC JTC1/SC29/WG1 N610, November 10-14, Sydney, Australia.

[6]. Christopoulos, C., and Nister, D. (1997) ‘An embedded DCT-based still image coding algorithm’, ISO/IEC JTC1/SC29/WG1 N610, November 10-14, Sydney, Australia.

[7]. Farid, H., and Popescu, A.C. (2005) ‘Exposing digital forgeries by detecting traces of resampling’, IEEE Transactions on Signal Processing, vol. 53(2), pp. 758–767.

[8]. Fridrich, F., Lukas, J., and Soukal, D. (2003) ‘Detection of Copy-Move Forgery in Digital Images’, Digital Forensic Research Workshop, Cleveland, USA, Aug.

[9]. Friedman, G. L. (1993) ‘The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image’, IEEE Trans. Consumer Electron. Vol. 39, pp. 905-910.

[10]. Kirovski, D., Potkonjak, M., and Wong, J. L.(2004) ‘Computational forensic techniques for intellectual property protection’, IEEE Trans. On Computer-Aided Design of Integrated Circuits and Systems, vol. 23, no.6, pp. 987–994, Jun.

[11]. Ray Liu, K.J.,Sabrina Lin, W., Tjoa, K., and Vicky Zhao, H. (2009) ‘Digital Image Source Coder Forensics via Intrinsic Fingerprints’, IEEE Transactions On Information Forensics And Security, Vol. 4, No. 3, September.