Secured and Authentic Communication by Combined Approach of Digital Watermarking and Steganography

被引:0
|
作者
Sahu, Satya Prakash [1 ]
Verma, Satya [2 ]
机构
[1] NIT Raipur, Deptt IT, Raipur, CG, India
[2] NIT Raipur, Dept Elect Engn, Raipur, CG, India
关键词
Information Hiding; Payload; Opacity; Watermarked-steganographic Image;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid evolution of the Internet makes the transmission of digital multimedia content such as text, audio, images, and video easier. Digital media can be accessed or distributed through the network. As the communication over internet is easier and convenient, the security is the main concern. And one of the issues is authenticity of contents. There are two different approaches to achieve security and authenticity. One of the approaches for secured transmission is steganography in which secrete message is hidden behind the image. For authenticity, digital watermarking is a technique which embeds a digital signature or digital watermark that asserts the ownership or intellectual property rights of the media creator or owner, in the digital media such as text, audio, image, and video. In this paper a hybrid approach is being proposed, in which watermarking and steganography techniques have been combined, which exploits the advantages of both techniques resulting more robustness against different types of attacks.
引用
收藏
页码:595 / +
页数:2
相关论文
共 50 条
  • [1] On the Implementation of a Secured Digital Watermarking Framework
    Nayak, Manas Ranjan
    Tudu, Baidyanath
    Basu, Abhishek
    Sarkar, Subir Kumar
    [J]. INFORMATION SECURITY JOURNAL, 2015, 24 (4-6): : 118 - 126
  • [2] Secure and authentic DCT image steganography through DWT - SVD based Digital watermarking with RSA encryption
    Patel, Palak
    Patel, Yask
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 736 - 739
  • [3] Blind and Secured Adaptive Digital Image Watermarking Approach for High Imperceptibility and Robustness
    Singh, Priyanka
    Devi, Kilari Jyothsna
    Thakkar, Hiren Kumar
    Santamaria, Jose
    [J]. ENTROPY, 2021, 23 (12)
  • [4] Image Steganography for Confidential Communication and Secured Data Storing
    Sivagurunathan, P. T.
    Archana, M.
    Shree, N. Durga
    Yuvashrie, G.
    [J]. SOFT COMPUTING FOR SECURITY APPLICATIONS, ICSCS 2022, 2023, 1428 : 315 - 324
  • [5] A Secured Digital Video Watermarking in Chrominance Channel
    Velickovic, Zoran S.
    Milivojevic, Zoran N.
    Velickovic, Marko Z.
    [J]. 2018 23RD INTERNATIONAL SCIENTIFIC-PROFESSIONAL CONFERENCE ON INFORMATION TECHNOLOGY (IT), 2018,
  • [6] A STUDY OF INFLUENCE BETWEEN DIGITAL WATERMARKING AND STEGANOGRAPHY
    Zhou, Yafeng
    Ng, Wing W. Y.
    [J]. 2013 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION (ICWAPR), 2013, : 49 - 55
  • [7] Secured Communication using Steganography Framework with Sample RTF Implementation
    Ganeshkumar, Vijayaratnam
    Koggalage, Ravindra L. W.
    [J]. 2009 INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS, 2009, : 15 - 21
  • [8] Evaluating Security of Executable Steganography for Digital Software Watermarking
    Mullins, J. Alex
    McDonald, J. Todd
    Mahoney, William R.
    Andel, Todd R.
    [J]. SOUTHEASTCON 2022, 2022, : 666 - 673
  • [9] A secure transaction model based on digital steganography and watermarking
    Yin, KK
    Pan, ZG
    Xiang, H
    Shi, JY
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN & COMPUTER GRAPHICS, 1999, : 1314 - 1318
  • [10] Data Hiding and Its Applications: Digital Watermarking and Steganography
    Megias, David
    Mazurczyk, Wojciech
    Kuribayashi, Minoru
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (22):