4-share VCS based image watermarking for dual RST attacks

3Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The startling improvement about web need aggravated the transmission, conveyance Also right to advanced networking really useful. Therefore, networking makers need aid more usually managing illegal What’s more unapproved utilization from claiming their productions. In our proposed approach, first enter the user name and password then generate QR-code using zxing library that will converted into the three shares using Binary Visual cryptography algorithm. Now share-4 is save in the database that is for future reference at receiver side. Remaining share-1, share-2 and share-3 are embedding into the Red, Green and Blue-component LL bit using of block DWT-SVD and Pseudo Zernike moment. After embedding add RGB Component. Now Color watermark image transfer from the network. As in network there are different attackers apply combination of Rotation, Scale and Translation attacks on the color watermark image. For recover the attacks first apply Pseudo Zernike moment, Surf feature on R, G and B-component they will extract the attacks pixel and recover the scale-angle using affine transformation. Now share-1, share-2, share-3 and another share-4 is in data base so we will apply EX-OR operation to get the QR-code. The final QR-code is decoded and we get the user name and password. This research work can give a way for providing authentication to all online Services.

Cite

CITATION STYLE

APA

Degadwala, S. D., & Gaur, S. (2018). 4-share VCS based image watermarking for dual RST attacks. In Lecture Notes in Computational Vision and Biomechanics (Vol. 28, pp. 902–912). Springer Netherlands. https://doi.org/10.1007/978-3-319-71767-8_77

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free