A Review of Techniques for Real time Authentication

Sabarinathan E.*, E. Manoj**
* Research Scholar, Erode, Tamilnadu, India.
** UG Scholar, Department of Electrical and Electronics Engineering, Coimbatore Institute of Technology, Coimbatore, Tamilnadu, India.
Periodicity:April - June'2016
DOI : https://doi.org/10.26634/jse.10.4.6058

Abstract

The Development of multimedia applications makes digital media to bring about conveniences to the people by easy processing of data. At the same time, it enables the illegal attackers to attack the works. For the protection of data, there has been growing interest in developing effective techniques to discourage the unauthorized duplication of digital data. Among Cryptography and Steganography, only the watermarking provides the copyright protection and authentication. This paper is a comprehensive review of diverse image processing methods and enormous number of interrelated solicitations in various disciplines, including various watermarking techniques. In this paper, different existing techniques are discussed along with their drawbacks, also explaining their future scope.

Keywords

Watermarking, Information Hiding, Steganography, Cryptography.

How to Cite this Article?

Sabarinathan, E., and Manoj, E. (2016). A Review of Techniques for Real time Authentication. i-manager’s Journal on Software Engineering, 10(4), 13-29. https://doi.org/10.26634/jse.10.4.6058

References

[1]. Sabarinathan E, and Manoj E, (2015). “FPGA Implementation of Shearlet Transform Based Invisible Image Watermarking Algorithm”. In: i-manager’s Journal on Pattern Recognition, Vol. 2, No. 2, pp. 19-28.
[2]. Arathi, C., and Chandra, M, (2012). “Authentication of Images Through Lossless Watermarking Technique with the Aid of Elliptic Curve Cryptography (ECC)”. In: International Journal of Computer Applications, Vol. 57, No. 6, pp. 17-25.
[3]. Baisa, G, (2011). “Wavelet Based Color Image Watermarking Scheme Giving High Robustness and Exact Correlation”. In: International Journal of Emerging Trends in Engineering and Technology, Vol. 1, No. 1, pp. 23-30.
[4]. Devapriya, M., and Ramar, K, (2010). “Statistical Image Water marking in DWT with Capacity Improvement”. In: Global Journal of Computer Science and Technology, Vol. 10, No. 2, pp. 20-24.
[5]. Dinu C, (2011). “Improved embedding for prediction based reversible watermarking”. In: IEEE Transactions on Information Forensics and security, Vol. 6, No. 3, pp. 873- 882.
[6]. Jih, P., Che, W., Wei, J., and Hung, H, (2010). “Watermarking technique based on DWT associated with embedding rule”. In: International Journal of Circuits, Systems and Signal Processing, Vol. 4, No. 2, pp. 72-82.
[7]. Anumol, T. J, Binson, V. A, and Soumya, R, (2013). “FPGA Implementation of Low Power, High Speed, Area Efficient Invisible Image Watermarking Algorithm for Images”. In: International Journal of Scientific And Engineering Research, Vol. 4, No. 8.
[8]. Sandeep, K., and Rajiv B, (2013). “Enhanced Technique for Watermarking using MFHWT”. In: International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 5, pp. 1199-1202.
[9]. Umaamaheshvari, A., and Thanushkodi, K, (2012). “A novel watermarking technique based on visual cryptography”. In: International Journal of Advanced Research in Computer Engineering and Technology, Vol. 1, No. 7, pp. 70-74.
[10]. Yang, C., and Tsai, M., (2010). “Improving histogram-based reversible data hiding by interleaving predictions”. In: IET Image Process, Vol. 4, No. 4, pp. 223- 234.
[11]. Bo, O., Rongrong, N., and Gang. C, (2010). “A high payload histogram-based reversible watermarking using linear prediction”. In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 446-449.
[12]. Pan, W., Coatrieux, G., Cuppens, N., Cuppens, F., and Roux, C, (2010). “An Additive and Lossless Watermarking Method Based on Invariant Image nd Approximation and Haar Wavelet Transform”. In: 32 Annual International Conference of the IEEE EMBS Buenos Aires, pp. 4740-4743.
[13]. Sujatha, S., and Mohamed. S, (2010). “Feature Based Watermarking Algorithm by Adopting Arnold Transform”. In: Proceedings of Springer International Conference on Information and Communication Technologies ICT, pp.78-82.
[14]. Karthigaikumar, P., and Baskaran. K, (2010a). Microelectronics. In: Elsevier. Available from: Elsevier books.
[15]. Karthigaikumar. P., Anumol., and Baskaran, (2011). “FPGA Implementation of High Speed Low Area DWT Based Invisible Image Watermarking Algorithm”. In: International Journal of System Architecture, Vol. 57, No. 4, pp. 404-411.
[16]. Karthigaikumar, P., and K Baskaran, (2010b). “An ASIC implementation of a low power invisible robust watermarking processor”. In: International Journal of System Architecture, Vol. 57, No. 4, pp. 404-411.
[17]. Tamilvanan, and Selvakumar, (2014). “FPGA Implementation of Digital Watermarking System”. In: International Journal of Computer Science and Mobile Computing, Vol. 3, No. 4.
[18]. Rohollah Mazrae Khoshki, Sami Oweis, and Shumei Wang, (2014). “FPGA Hardware Based Implementation of an Image Watermarking System”. In: International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, No. 5.
[19]. Nallagarla Ramamurthy, and Varadarajan, (2012). “Robust Digital Watermarking Scheme with Neural Network and Fuzzy Logic Approach”. In: International Journal of Emerging Technology and Advanced Engineering, Vol. 2, No. 9.
[20]. Sameh Oueslati, Adnene Cherif and Bassel Solaimane, (2011). “Adaptative Image Watermarking Scheme Based on Neural Network”. In: International Journal of Engineering Science and Technology, Vol. 3 No. 1.
[21]. BibiIsac V, and Santhi, (2011). “A Study on Digital Image and Video Watermarking Schemes using Neural Networks”. In: International Journal of Computer Applications, Vol. 12, No. 9.
[22]. Nanda yalamali, and Manjunath Asuti, (2012). “An Adaptive Image Watermarking Algorithm based on Neural Networks”. In: International Journal of Scientific & Engineering Research, Vol. 3, No. 7.
[23]. Remya, and Sumithra, (2013). “Development of a New Watermarking Algorithm for Telemedicine Applications”. In: International Journal of Engineering Research and Applications (IJERA), ISSN: 2248-9622, Vol. 3, No. 1, pp. 962-968.
[24]. Manoj, and Gireendranath, (2012). “Novel Invisible and Blind Watermarking Scheme for Copyright Protection of Digital Images”. In : International Journal of Engineering Research & Technology, Vol. 1, No. 7.
[25]. Shinfeng, and Shih, (2010). “Improving the robustness of DCT-based image watermarking against JPEG compression”. In: Elsevier, Computer Standards & Interfaces, pp.54-60.
[26]. Tomaz, and Andrej, (2012). “Block–wise authentication method for digital images”. In: Journal of Electrical Engineering, Vol. 63, No. 5, pp. 289-295, ISSN(Online), ISSN (Print) 1335-3632, DOI: 10.2478/v10187- 012-0042-6.
[27]. Veera, (2010). “A novel technique for image steganography based on Block-DCT and Huffman Encoding ” . 06/2010; abs/ 1006.1186(3). DOI: 10.5121/ijcsit.2010.2308.
[28]. Gouenou, et al. (2013). “Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting”. In: IEEE, in: Press.
[29]. Rajendra, and Narawade, (2012). “Reduced Pixel Shifting and Improved Histogram Shifting Based Reversible Watermarking for Cartoon Images”. In: International Journal of Computer Science and Telecommunications, Vol. 3, No. 4.
[30]. Shyang, Zhenfei, Zhe and Hao, (2011). “Reversible data hiding based on multilevel histogram modification and sequential recovery”. In: Elsevier, International Journal of Electronics and Communications, pp.814- 826.
[31]. Kiran and Kanwal Garg, (2015). “Watermark Embedding and Extraction using Histogram Shifting and Butterworth Filtering”. IJARCSSE, Vol. 5, No. 5, pp. 1481- 1487.
[32]. Umaamaheshvari, A., and Thanushkodi K, (2013). “Robust image watermarking based on block based error correction code”. In: International Journal of Advanced Research in Computer Engineering and Technology, Vol. 1, No. 7, pp. 70-74.
[33]. Sujatha, and Mohamed, (2012). “A Novel DWT Based Blind Watermarking for Image Authentication”. In: International Journal of Network Security, Vol. 14, No. 4, pp. 223-228.
[34]. Hazem, and Nedal, (2010). “A robust Blind color image watermarking based on wavelet-tree bit host difference selection”. ACM Digital Library, Vol. 90, No. 8, pp. 2498-2512. 2010, DOI:10.1016/j.sigpro.2010.02.017.
[35]. Roseline, and Sumalatha, (2012). “Fuzzy Based Chaotic and Logistic Method for Digital Watermarking Systems”. In: International Journal of Scientific & Engineering Research, Vol. 3, No. 6, ISSN 2229-5518.
[36]. Maruthu Perumal, and Vijayakumar, (2012). “Sorted Pixel Value Difference on Fuzzy Watermarking Scheme”. In: Global Journals Inc. Vol. 12, No. 4.
[37]. Sridevi, (2013). “Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD”. International Journal of Computer Applications, Vol. 74, No. 13, pp. 16-20.
[38]. Manikandan, R., Uma, M., and Mahalakshmi Preethi, S, (2012). “Reversible Data Hiding for Encrypted Image”. In: Journal of Computer Applications, Vol. 5, No. 1, pp. 104-110
[39]. A. Mohamed Zuhair., and Mohamed Yousuf, (2010). “FPGA based image security and authentication in digital camera using invisible watermarking technique”. In: International Journal of Engineering Science and Technology, Vol. 2, No. 6.
[40]. Ramezani, H., Keynia, F., Ramezani. F, (2013). “A Novel Image Steganography in Contourlet domain using Genetic Algorithm”. In: International Journal of Future Computer and Communication, Vol. 2, No. 4, pp. 359-363.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.