2015
DOI: 10.5120/21078-3755
|View full text |Cite
|
Sign up to set email alerts
|

A Cryptographic and Watermarking Encryption Technique for Securing and Authentication of Digital Images

Abstract: Identity management is crucial in cyberspace where infringement of one's privacy, copy right disputes, theft and other malicious activities are very rampant. There exists a need of ownership identification and authentication of digital images. In solving and contributing to this field, we proposed a cryptographic and watermarking encryption technique for securing and authentication of digital images for identity management. In our approach, we encrypt the data to be embedded into the image before embedding it … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…The extracted image will be having dual shares. These dual shares will give the original image.In [11], the author proposed model the input image is a plain image in which a function has been applied to obtain the secret key. The secret key is used to shuffle the pixels on the plain image based on an algorithm and it produce the ciphered image which can be stored or transmitted.…”
Section: Related Workmentioning
confidence: 99%
“…The extracted image will be having dual shares. These dual shares will give the original image.In [11], the author proposed model the input image is a plain image in which a function has been applied to obtain the secret key. The secret key is used to shuffle the pixels on the plain image based on an algorithm and it produce the ciphered image which can be stored or transmitted.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed scheme provides high efficiency in terms of efficiency and is easy to implement [7]. Kester (2013) proposed a visual cryptographic technique for medical image encryption. Pixel shuffling and interchanging the positions of the plain medical images generates a cipher image.…”
Section: Related Workmentioning
confidence: 99%
“…This cipher image is difficult to decrypt by unauthorized person who does not know the knowledge of the secret key that has been used. The average total pixel before encryption is same as that of after encryption [10].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Combining these two methods will enhance security in maintaining data confidentiality [13]- [15]. Embedded extended Visual Cryptography also develop to image and have a good result [16]- [18]. The improvement of flip (2,2) image in visual cryptography had been done in this paper.…”
Section: Introductionmentioning
confidence: 99%