SECURE IMAGE IDENTIFICATION SYSTEM USING ANDROID: REVIEW REPORT
Journal: International Journal Of Research In Science & Engineering (IJRISE) (Vol.1, No. 2)Publication Date: 2015-02-15
Authors : S. R. Naik; P. A. Sute; Mr S. R. Kadu; A. O. Gharpande;
Page : 55-59
Keywords : Digital watermarking; Steganography; LSB algorithm; Android.;
Abstract
In recent years, internet revolution resulted in an explosive growth in multimedia applications. The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. Besides this, it is easier to modify and misuse the valuable information at the same time. As a solution to this we develop “Secure Image Identification System Using Android”. This tool will identify the mobile which is used to capture an image on his/her phone, so nobody will be able to misuse mobile images. The phone number or IMEI number of mobile will be encrypted in image. It will use steganography and digital watermarking techniques. Digital watermarking is one of the proposed solutions for copyright protection of multimedia data. A watermark is a form, image or text that is impressed onto paper, which provides evidence of its authenticity. Digital Watermarking describes methods and technologies that hide information, for example a number or text, in digital media, such as images, video or audio. The embedding takes place by manipulating t he content of the digital data, which means the information is not embedded in the frame around the data. The hiding process has to be such that the modifications of the media are imperceptible. For images this means that the modifications of the pixel values have to be invisible. Furthermore, the watermark must be either robust or fragile, depending on the application. By "robust" we mean the capability of the watermark to resist manipulations of the media, such as flossy compression. Steganography is art and science of invisible communication. Steganography is the method through which existence of the message can be kept secret. This is accomplished through hiding information in information, thus hiding the existence of the communicated information. Various steganography algorithms like Least Significant Bit (LSB) algorithm, Jsteg and F5 algorithms, out of these we are using LSB algorithm.
Other Latest Articles
- Assessing the potential of renewable energy as a primary source for residential college campuses-Evidence from SIC
- EMPLOYEE MANAGEMENT APPLICATION WITHIN A ORGANIZATION USING ANDROID SMARTPHONE’S
- FUTURE PERSPECTIVES OF NUCLEAR POWER AS PRIMARY ENERGY SOURCE. A REVIEW
- OZONE: A CAR RUN BY HYBRID FUEL
- GENERATOR OPERATED BY WATER
Last modified: 2015-03-06 11:36:21