Enviar búsqueda
Cargar
IRJET - Image Watermarking using QR Code
•
0 recomendaciones
•
24 vistas
IRJET Journal
Seguir
https://irjet.net/archives/V7/i3/IRJET-V7I3570.pdf
Leer menos
Leer más
Ingeniería
Denunciar
Compartir
Denunciar
Compartir
1 de 4
Descargar ahora
Descargar para leer sin conexión
Recomendados
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET Journal
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
Nz2422822287
Nz2422822287
IJERA Editor
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
IRJET Journal
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
IRJET Journal
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&Visualcryptography
Nagarjuna mahanti
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET Journal
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
IAEME Publication
Recomendados
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET Journal
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
Nz2422822287
Nz2422822287
IJERA Editor
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
IRJET Journal
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
IRJET Journal
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&Visualcryptography
Nagarjuna mahanti
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET Journal
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
IAEME Publication
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET Journal
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
Editor IJCATR
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
IJCERT
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
IJTRET-International Journal of Trendy Research in Engineering and Technology
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET Journal
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
Shahrukh Ali
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET Journal
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
Editor IJCATR
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
IJTRET-International Journal of Trendy Research in Engineering and Technology
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
IAEME Publication
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
Editor IJMTER
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET Journal
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET Journal
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
IAEME Publication
Photography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating System
IJRES Journal
Ijmet 10 01_020
Ijmet 10 01_020
IAEME Publication
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET Journal
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
IJTRET-International Journal of Trendy Research in Engineering and Technology
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
acijjournal
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET Journal
Más contenido relacionado
La actualidad más candente
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET Journal
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
Editor IJCATR
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
IJCERT
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
IJTRET-International Journal of Trendy Research in Engineering and Technology
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET Journal
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
Shahrukh Ali
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET Journal
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
Editor IJCATR
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
IJTRET-International Journal of Trendy Research in Engineering and Technology
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
IAEME Publication
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
Editor IJMTER
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET Journal
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET Journal
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
IAEME Publication
Photography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating System
IJRES Journal
Ijmet 10 01_020
Ijmet 10 01_020
IAEME Publication
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET Journal
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
IJTRET-International Journal of Trendy Research in Engineering and Technology
La actualidad más candente
(20)
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
Photography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating System
Ijmet 10 01_020
Ijmet 10 01_020
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
Similar a IRJET - Image Watermarking using QR Code
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
acijjournal
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET Journal
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcode
csandit
A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...
IRJET Journal
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
IRJET Journal
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
IRJET Journal
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET Journal
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
Survey on information sharing
Survey on information sharing
ijcisjournal
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
QR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
IRJET Journal
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
IRJET Journal
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET Journal
Understanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical Approach
IRJET Journal
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
IJNSA Journal
CryptoQR System based on RSA
CryptoQR System based on RSA
IJCSIS Research Publications
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
R04405103106
R04405103106
IJERA Editor
Similar a IRJET - Image Watermarking using QR Code
(20)
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcode
A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
Survey on information sharing
Survey on information sharing
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
QR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
Understanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical Approach
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
CryptoQR System based on RSA
CryptoQR System based on RSA
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
R04405103106
R04405103106
Más de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Más de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Último
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
SAURABHKUMAR892774
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
ShivangiSharma879191
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
Purva Nikam
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
Alluxio, Inc.
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Chandu841456
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
121011101441
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
sdickerson1
Último
(20)
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
IRJET - Image Watermarking using QR Code
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2857 Image Watermarking Using QR Code Ajit N. Gedam1, Afiya Papde2, Pranalee Walunj3, Rana Shaikh4 ,Sakshi Kamble5 2,3,4,5Students, Computer Engineering Department, AISSMS Polytechnic, Pune, Maharastra, India 1Ajit N. Gedam Lecturer in Computer Engineering Department, AISSMS Polytechnic, Pune, Maharastra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Digital image security and integrity are the top prioritized issue in today’s information World. Watermarking is a famous technique that is used for copyrightprotectionand authentication. Watermark Should be robust and imperceptible. Digital image watermarking process is to embed information of digital such as an image into digital signal using a strong media QR code. It is very difficult to identify that digital image watermarking has applied to the data This is a competent way to restrict illegal copyrights of Information from interactive multimedia networks.With advanced technology in printing and scanning, creating imitate documents have become an Uncomplicated task, making it very difficult to understand between original and the artificial. So, it is a very big challenge for providing Security and verification of digital data. This paper put forward an idea or intimation to provide an innovative method to verify the digital documents. An advanced method of QR code is bring here, which allow us to embed digital data such as image in QR code. In this paper, we bring up a new technique, where the image is encoded in QR i.e. [Quick Response] Code in encrypted form, so that if a hacker tries to modify or tries to tamper with the data the data then he will be unsuccessful to do that. This is due to; the encryption key is unknown to him except from the authorized person. It is impossible to scan or have access to the encrypted QR code as QR codes are robust. Key Words: QR code, AES(Advanced Encryption Standard) Algorithm, Android platform,Digtal image, Secret key,Watermarking,Decryption Problem Statement: After new technology of digitizing information were developed,a huge amount of databases of texts,images,scientific data,video,audiofilesandotherdigital information had been appeared in the world. With developing network and internet technologies and connecting computers into the World Wide Web, databases become available not only for authorize access butforillegal access also.Much more digital data can be accessed to via network now a days.The problem of data protectionisoneof the most important .The methods of coding and hiding information are well known from ancient times as a cryptography and stegnography. 1. INTRODUCTION A digital watermark is a kind of marker secretly embedded in a noise-permit signal such as an image data. It is typically used to identify proprietorship of the copyright of such signal. "Watermarking" is the process of hiding digital information in a carrier signal the hidden information should, but doesn't need to, contain a relation to the carrier signal. Digital watermarks may be used to prove the authenticity or integrity of the carrier signal or to show the identity of its proprietor. The informationtobeembedded in a signal is called a digital watermark, although in some condition the term digital watermark means the dissimilarity between the watermarked signal andthecover signal. The signal where the watermark is to be embeddedis called the host signal. A watermarking system is usually divided into three prominent steps, embedding, attack, and perception. In embedding, an algorithm obtain the host and the data to be submerged, and produces a watermarked signal. this paper contain QR codeandsteganographyisused to furnish the security to important data. 1.1 QR Code QR codes are 2 dimensional matrix. It allows to store a large volume of unique data. Bar-codes are one dimensional vector. So compare to bar-codes QR codes are having more storage size. QR codes can hold up to 7,089 numeric characters and up to 4,296 alphanumerical letter values as an information. The following figureshowsthestructure ofa QR code. Fig-1: QR Code 1.2 Steganography Steganography is an embedding process to hide the data in the form of an image or text. now a days sense of the word
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2858 sometimes refers to data or a file that has been hide within a digital image. What Steganography basically does is utilize human perception; the human sensesareunqualifiedtolook for files that have data hidden inside them. Generally, in steganography, the specific data isn't maintained in its original format and thereby it's converted into an alternate identical transmission file like image that successively is being hidden among another object. This apparent message (known as cover text in usual terms) is sent through the network to the recipient, wherever the specific message is separated from it. Steganography are used to achieve data privacy over confidentiality. 2. LITERATURE SURVEY 1. Image steganography with using QR code and cryptography: In this there is image stenography method that’s enables us to to embed the encoded secret message using Quick Response Code (QR) code into the image information. Advanced Encryption Standard[AES]domainis introduced for the encryption of the QR code, whereas encrypting method is in addition secured by Advanced Encryption Standard (AES) cipher algorithmic rule. Also, typical characteristics of QR code was cracked using the encryption, therefore it makes the method more secure. The relation between security and capability of the strategy was improved by special confining of QR code before the embedding method. 2. Information Hiding using Image Embedding in QR Codes for Color Images: It is considered that embedding strategies are designed to be Consistent with standarddecodingapplicationsandmight be Enforced to any color or gray scale image with full space Coverage. The embedding technique consists of 2 main following components. First element is that the use of halftoning techniques for the choice Of varying the pixels to interrupt and decrease the coarse square Architectureof the QR code and second is that the brightness Level to that the pixels square measure to be re-created. In such some way that it shouldn’t be visible to naked eye on the Color image. Afterwards decoding should be done for QR code from the color image With minimum errors. 3. Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System: In this paper, there’s totally different methodology, where the QR code is embedded into the Image which act as a digital media. Then the message which the user wants to send to the receiver is inserted in that QR code which is hidden behind the image. After secret key or encryption key will be entered, so that if an intruder tries to modify the message then he cannot do this , as well as there is an image in front and behind the image there is QR code in which message is hidden In this project, message is double secure as if any one try to see the message they cannot this is because of the image in front of QR code advantage of this is the image cannot be scanned . In this Method encryption of the message is done using AES Advanced encryption standard encryption algorithm. The encrypted message are Entered inside QR code and that QR code is also hidden behind the image . The message can then be Accessed from the QR code and can be decrypted using Decryption algorithm Reverse of AES. then the message will be accessed using the secret key whichisknowntorecipient. 3.SYSTEM ARCHITECHTURE System architecture is the theoretical designthatdefinesthe structure and behavior of a system. An design explanationis a prescribed description of a system, systematized in a way that supports perceptive about the fundamental properties of the system. It outlines the system modules or building blocks and delivers a plan from which products can be secured, and systems developed, that will work organized to implement the whole system. The System architecture is shown below. Fig -2: Encryption Fig -3: Decryption 4. CLASSIFICATION OF DIGITAL WATERMARKING TECHNIQUES A] Robustness Robustness is crucial propertyforall watermarkingsystems. There are so many ways by which watermark is degraded, altered during transmission, striked by hackers in paid media applications. So watermark should robust, So that it will resist against all the attacks and threats.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2859 B] Effectiveness: It is the most important property of watermark that the watermark should be effective means it should surely be detective. If this will not be happened then the goal of the watermarking is not fulfilled. C] Host signal Quality: It is also important property of watermarking. Everyone knows that in watermarking, watermark is embedded in host signal (image, video, audio etc.). Thismayhaveaneffect on the host signal. So the watermarking system should be like that, it will least change the host signal and it should be unobtrusive when watermark is invisible. D] Watermark Size: Watermark is often use to owner identification or security approval of host signal and it always use when data is transmitted. So it is important that the sizeofthewatermark should be less because it will increase the size of data to be transmitted. E] Perception: A digital watermark includes perception Presence in the marked signal is visible On videos and Images, some are made transparent/translucent for Convenience for consumers due to the fact that they block Portion of the view; therefore degrading it. F] Capacity: It can be described as number of data bits a Watermark gets encoded within a unit of time or work. Watermark Should be able to carry enough information that can Represent the uniqueness of image. 5. ALGORITHM The AES algorithm gains vast application in our daily life, such as smart cards, cell phones, automated teller machines and WWW servers. AES encodes a plain text to become a cipher text, which can be decoded back to the original plain text by using usual private key. It can be seen the cipher text is much different from and gives no clue to the original plain text. All the computations in AES are implemented on bytes instead of bits. Therefore, 128 bits of plain text is treated as 16 bytes. These 16 bytes are located in a matrix of four rows and four columns. In AES 10 rounds are performed for 128 bit keys, 12 rounds for 192 bit keys, and 14 rounds for 256 bit keys. All of these rounds apply a different 128 bit key, calculated from the original AES key.15 Following is the Algorithm to encrypt the data:- • Step 1:- Input a plain text of 128 bits of block cipher which will be arranged as 16 bytes. • Step 2: - Add Round Key: - each byte is integrated with a block of the round key using bitwise XOR. • Step 3:- Byte Substitution: - the 16 input bytes are substituted by examining S- box. The result will be a 4x4 matrix. • Step 4:- Shiftrow: - Every row of 4x4 matrixes will be shifted to left. Entries which will be on the left side now will be on the right side. • Step 5:- Mix Columns: - Every column of four bytes will be transformed by applying a distinctive mathematical function (Galois Field). • Step 6:- Add Round Key: - The 16 bytes of matrix will be scrutinized as 128 bits and will be XORed to 128 bits of the round key. • Step 7:- This 128 bits will be taken as 16 bytes and similar rounds will be performed. • Step 8:- At the 10th round which will be last round a ciphered text will be produced. Initially, the plain text of 128 bits of block cipher will be input, which will be treated as 16 bytes. Then, each byte will be non-discriminated with a block of the round key using bitwise XOR. From S-Box the 16 input bytes will be exchanged resulting 4x4 matrices.All rowsofthismatrix will be shifted to left. Shifting will be done as follows:- 1) First row will be not shifted. 2) Second row will be moved one position left. 3) Third row will be switched two positions to the left. 4) Fourth row will be shifted three positions to the left 16 As a result new matrices will be produced containing same 16 bytes but shifted with respect to each other. In MixColumn, every column of the matrix will be transformed by applying mathematical function such as Galois Field. The 16 bytes of matrix will be considered as 128 bits and will be XORed to 128 bits of round key.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2860 6. APPLICATIONS Digital watermarking may be used for a variety of Applications like : 1. Copyright protection. 2. Source tracking (different recipients get differently Watermarked content). 3. Broadcast monitoring (television news often contains 4. Watermarked video from international agencies). 5. Video authentication. 6. Content management on social networks. 7. CONCLUSION In this method we have implemented a advanced solutionto protect the asset of the user or owner by providing security by using method Digital Watermarking technique whose work is to protect the authenticity,copyright protection of owner using a strong media QR code.In addition to, the QR code is also hidden behind the image so that seeing at it the person will not be able to recognize that it contains QR code. We also classified the watermarking algorithms based On spatial and transform domain. Watermarking, whichBelong to the data hiding field, has seen a lot of Research interest recently. There is a lot of work begin Conducted in different branches in this field. We classify the Techniques based on different areas in which data is Embedded. AES (Advanced Encryption Standard ) provides more security (it is less susceptible to cryptanalysis than 3DES). REFERENCES [1] Image Steganography and Data hiding in QR Code Rutuja Kakade1, Nikita Kasar2, Shruti Kulkarni3, Shubham Kumbalpuri4, Sonali Patil5 Student, Dept of Computer Engineering, PCCOE, Maharashtra, India Associate Professor, Dept of Computer Engineering, PCCOE, Maharashtra, India [2] V.Hajduk , M.Broda , O.Kováþ and D.Levický, “Image steganography with using QR code and cryptography,” 26th Conference Radioelektronika, IEEE pp. 978-1- 5090-1674-7, 2016 [3] A. Gaikwad and K.R.Singh, “Information Hiding using Image Embedding in QR Codes for Color Images: A Review,” International Journal ofComputer Scienceand Information Technologies, Vol. 6 (1) , 2015 [4] M. Broda, V. Hajduk, D. Levický, “Image steganography based on combination of YCbCr color model and DWT,” in ELMAR, 2015 57th International Symposium, pp. 201- 204, 28-30, 2015. [5] S. Dey, A.Nath and S. Agarwal, “Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System,” International Conference on Com Improvement in the Performance and Security of Advanced Encryption Standard Using AES Algorithm and Comparison with Blowfish Amit Verma, Simarpreet Kaur, Bharti Chhabra, M. Tech. Research Scholar, Computer Science & Engineering, Chandigarh Engineering College 3Assistant Professor, Computer Science& Engineering,ChandigarhEngineeringCollege, Landran, Punjab, India, Professor and Head of Department, Computer Science& Engineering,Chandigar Engineering College,Landran,Punjab. [6] A Survey of Digital Watermarking Techniques and its Applications, Lalit Kumar Saini1, Vishal Shrivastava, M.Tech Research Scholar, Professor Department of Computer Science and Engineering, Arya College of Engineering. & Information Technology, Jaipur, India. [7] “Digital Image Security Using Digital Watermarking “ Prof.A.S.Kapse, Sharayu Belokar, Yogita Gorde, Radha Rane, Shrutika Yewtkar, Professor. A.S.Kapse, Dept. Computer Science & Engineering, P.R. Pote College of Engineering & Tech, Amravati, Maharashtra, India. BE student, Dept. of Computer Science & Engineering, P.R. Pote College of Engineering & Tech, Amravati, Maharashtra, India. [8] Improvement in the Performance and Security of Advanced Encryption Standard Using AES Algorithm and Comparison withBlowfish AmitVerma,Simarpreet Kaur, Bharti Chhabra M. Tech. Research Scholar, Computer Science & Engineering, Chandigarh Engineering College Assistant Professor, Computer Science& Engineering,ChandigarhEngineeringCollege, Landran, Punjab, India Professor and Head of Department, Computer Science& Engineering, Chandigarh Engineering College, Landran,Punjab, [9] Chi-Feng Lu , Fast implementation of AES cryptographic algorithms in smart cards; Yan-Shun Kao; Hsia-Ling Chiang; Chung-Huang Yang; Security Technology, 2003. [10] FIPS PUB 197, Advanced Encryption Standard (AES), National Institute of standards and Technology.
Descargar ahora