SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2857
Image Watermarking Using QR Code
Ajit N. Gedam1, Afiya Papde2, Pranalee Walunj3, Rana Shaikh4 ,Sakshi Kamble5
2,3,4,5Students, Computer Engineering Department, AISSMS Polytechnic, Pune, Maharastra, India
1Ajit N. Gedam Lecturer in Computer Engineering Department, AISSMS Polytechnic, Pune, Maharastra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Digital image security and integrity are the top
prioritized issue in today’s information World. Watermarking
is a famous technique that is used for copyrightprotectionand
authentication. Watermark Should be robust and
imperceptible. Digital image watermarking process is to
embed information of digital such as an image into digital
signal using a strong media QR code. It is very difficult to
identify that digital image watermarking has applied to the
data This is a competent way to restrict illegal copyrights of
Information from interactive multimedia networks.With
advanced technology in printing and scanning, creating
imitate documents have become an Uncomplicated task,
making it very difficult to understand between original and
the artificial. So, it is a very big challenge for providing
Security and verification of digital data. This paper put
forward an idea or intimation to provide an innovative
method to verify the digital documents. An advanced method
of QR code is bring here, which allow us to embed digital data
such as image in QR code. In this paper, we bring up a new
technique, where the image is encoded in QR i.e. [Quick
Response] Code in encrypted form, so that if a hacker tries to
modify or tries to tamper with the data the data then he will
be unsuccessful to do that. This is due to; the encryption key is
unknown to him except from the authorized person. It is
impossible to scan or have access to the encrypted QR code as
QR codes are robust.
Key Words: QR code, AES(Advanced Encryption Standard)
Algorithm, Android platform,Digtal image, Secret
key,Watermarking,Decryption
Problem Statement: After new technology of digitizing
information were developed,a huge amount of databases of
texts,images,scientific data,video,audiofilesandotherdigital
information had been appeared in the world. With
developing network and internet technologies and
connecting computers into the World Wide Web, databases
become available not only for authorize access butforillegal
access also.Much more digital data can be accessed to via
network now a days.The problem of data protectionisoneof
the most important .The methods of coding and hiding
information are well known from ancient times as a
cryptography and stegnography.
1. INTRODUCTION
A digital watermark is a kind of marker secretly embedded
in a noise-permit signal such as an image data. It is typically
used to identify proprietorship of the copyright of such
signal. "Watermarking" is the process of hiding digital
information in a carrier signal the hidden information
should, but doesn't need to, contain a relation to the carrier
signal. Digital watermarks may be used to prove the
authenticity or integrity of the carrier signal or to show the
identity of its proprietor. The informationtobeembedded in
a signal is called a digital watermark, although in some
condition the term digital watermark means the
dissimilarity between the watermarked signal andthecover
signal. The signal where the watermark is to be embeddedis
called the host signal. A watermarking system is usually
divided into three prominent steps, embedding, attack, and
perception. In embedding, an algorithm obtain the host and
the data to be submerged, and produces a watermarked
signal. this paper contain QR codeandsteganographyisused
to furnish the security to important data.
1.1 QR Code
QR codes are 2 dimensional matrix. It allows to store a large
volume of unique data. Bar-codes are one dimensional
vector. So compare to bar-codes QR codes are having more
storage size. QR codes can hold up to 7,089 numeric
characters and up to 4,296 alphanumerical letter values as
an information. The following figureshowsthestructure ofa
QR code.
Fig-1: QR Code
1.2 Steganography
Steganography is an embedding process to hide the data in
the form of an image or text. now a days sense of the word
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2858
sometimes refers to data or a file that has been hide within a
digital image. What Steganography basically does is utilize
human perception; the human sensesareunqualifiedtolook
for files that have data hidden inside them. Generally, in
steganography, the specific data isn't maintained in its
original format and thereby it's converted into an alternate
identical transmission file like image that successively is
being hidden among another object. This apparent message
(known as cover text in usual terms) is sent through the
network to the recipient, wherever the specific message is
separated from it. Steganography are used to achieve data
privacy over confidentiality.
2. LITERATURE SURVEY
1. Image steganography with using QR code and
cryptography: In this there is image stenography method
that’s enables us to to embed the encoded secret message
using Quick Response Code (QR) code into the image
information. Advanced Encryption Standard[AES]domainis
introduced for the encryption of the QR code, whereas
encrypting method is in addition secured by Advanced
Encryption Standard (AES) cipher algorithmic rule. Also,
typical characteristics of QR code was cracked using the
encryption, therefore it makes the method more secure. The
relation between security and capability of the strategy was
improved by special confining of QR code before the
embedding method.
2. Information Hiding using Image Embedding in QR Codes
for Color Images: It is considered that embedding strategies
are designed to be
Consistent with standarddecodingapplicationsandmight be
Enforced to any color or gray scale image with full space
Coverage. The embedding technique consists of 2 main
following components. First element is that the use of
halftoning techniques for the choice Of varying the pixels to
interrupt and decrease the coarse square Architectureof the
QR code and second is that the brightness Level to that the
pixels square measure to be re-created. In such some way
that it shouldn’t be visible to naked eye on the Color image.
Afterwards decoding should be done for QR code from the
color image With minimum errors.
3. Confidential Encrypted Data Hiding and Retrieval Using
QR Authentication System: In this paper, there’s totally
different methodology, where the QR code is embedded into
the Image which act as a digital media. Then the message
which the user wants to send to the receiver is inserted in
that QR code which is hidden behind the image. After secret
key or encryption key will be entered, so that if an intruder
tries to modify the message then he cannot do this , as well
as there is an image in front and behind the image there is
QR code in which message is hidden In this project, message
is double secure as if any one try to see the message they
cannot this is because of the image in front of QR code
advantage of this is the image cannot be scanned . In this
Method encryption of the message is done using AES
Advanced encryption standard encryption algorithm. The
encrypted message are Entered inside QR code and that QR
code is also hidden behind the image . The message can then
be Accessed from the QR code and can be decrypted using
Decryption algorithm Reverse of AES. then the message will
be accessed using the secret key whichisknowntorecipient.
3.SYSTEM ARCHITECHTURE
System architecture is the theoretical designthatdefinesthe
structure and behavior of a system. An design explanationis
a prescribed description of a system, systematized in a way
that supports perceptive about the fundamental properties
of the system. It outlines the system modules or building
blocks and delivers a plan from which products can be
secured, and systems developed, that will work organized to
implement the whole system. The System architecture is
shown below.
Fig -2: Encryption
Fig -3: Decryption
4. CLASSIFICATION OF DIGITAL WATERMARKING
TECHNIQUES
A] Robustness
Robustness is crucial propertyforall watermarkingsystems.
There are so many ways by which watermark is degraded,
altered during transmission, striked by hackers in paid
media applications. So watermark should robust, So that it
will resist against all the attacks and threats.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2859
B] Effectiveness:
It is the most important property of watermark that the
watermark should be effective means it should surely be
detective. If this will not be happened then the goal of the
watermarking is not fulfilled.
C] Host signal Quality:
It is also important property of watermarking. Everyone
knows that in watermarking, watermark is embedded in
host signal (image, video, audio etc.). Thismayhaveaneffect
on the host signal. So the watermarking system should be
like that, it will least change the host signal and it should be
unobtrusive when watermark is invisible.
D] Watermark Size:
Watermark is often use to owner identification or security
approval of host signal and it always use when data is
transmitted. So it is important that the sizeofthewatermark
should be less because it will increase the size of data to be
transmitted.
E] Perception:
A digital watermark includes perception Presence in the
marked signal is visible On videos and Images, some are
made transparent/translucent for Convenience for
consumers due to the fact that they block Portion of the
view; therefore degrading it.
F] Capacity:
It can be described as number of data bits a Watermark gets
encoded within a unit of time or work. Watermark Should be
able to carry enough information that can Represent the
uniqueness of image.
5. ALGORITHM
The AES algorithm gains vast application in our daily life,
such as smart cards, cell phones, automated teller machines
and WWW servers. AES encodes a plain text to become a
cipher text, which can be decoded back to the original plain
text by using usual private key. It can be seen the cipher text
is much different from and gives no clue to the original plain
text.
All the computations in AES are implemented on bytes
instead of bits. Therefore, 128 bits of plain text is treated as
16 bytes. These 16 bytes are located in a matrix of four rows
and four columns. In AES 10 rounds are performed for 128
bit keys, 12 rounds for 192 bit keys, and 14 rounds for 256
bit keys. All of these rounds apply a different 128 bit key,
calculated from the original AES key.15 Following is the
Algorithm to encrypt the data:-
• Step 1:- Input a plain text of 128 bits of block cipher which
will be arranged as 16 bytes.
• Step 2: - Add Round Key: - each byte is integrated with a
block of the round key using bitwise XOR.
• Step 3:- Byte Substitution: - the 16 input bytes are
substituted by examining S- box. The result will be a 4x4
matrix.
• Step 4:- Shiftrow: - Every row of 4x4 matrixes will be
shifted to left. Entries which will be on the left side now will
be on the right side.
• Step 5:- Mix Columns: - Every column of four bytes will be
transformed by applying a distinctive mathematical function
(Galois Field).
• Step 6:- Add Round Key: - The 16 bytes of matrix will be
scrutinized as 128 bits and will be XORed to 128 bits of the
round key.
• Step 7:- This 128 bits will be taken as 16 bytes and similar
rounds will be performed.
• Step 8:- At the 10th round which will be last round a
ciphered text will be produced.
Initially, the plain text of 128 bits of block cipher will be
input, which will be treated as 16 bytes. Then, each byte will
be non-discriminated with a block of the round key using
bitwise XOR. From S-Box the 16 input bytes will be
exchanged resulting 4x4 matrices.All rowsofthismatrix will
be shifted to left. Shifting will be done as follows:-
1) First row will be not shifted.
2) Second row will be moved one position left.
3) Third row will be switched two positions to the left.
4) Fourth row will be shifted three positions to the left 16
As a result new matrices will be produced containing same
16 bytes but shifted with respect to each other. In
MixColumn, every column of the matrix will be transformed
by applying mathematical function such as Galois Field. The
16 bytes of matrix will be considered as 128 bits and will be
XORed to 128 bits of round key.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2860
6. APPLICATIONS
Digital watermarking may be used for a variety of
Applications like :
1. Copyright protection.
2. Source tracking (different recipients get differently
Watermarked content).
3. Broadcast monitoring (television news often contains
4. Watermarked video from international agencies).
5. Video authentication.
6. Content management on social networks.
7. CONCLUSION
In this method we have implemented a advanced solutionto
protect the asset of the user or owner by providing security
by using method Digital Watermarking technique whose
work is to protect the authenticity,copyright protection of
owner using a strong media QR code.In addition to, the QR
code is also hidden behind the image so that seeing at it the
person will not be able to recognize that it contains QR code.
We also classified the watermarking algorithms based On
spatial and transform domain. Watermarking, whichBelong
to the data hiding field, has seen a lot of Research interest
recently. There is a lot of work begin Conducted in different
branches in this field. We classify the Techniques based on
different areas in which data is Embedded. AES (Advanced
Encryption Standard ) provides more security (it is less
susceptible to cryptanalysis than 3DES).
REFERENCES
[1] Image Steganography and Data hiding in QR Code
Rutuja Kakade1, Nikita Kasar2, Shruti Kulkarni3,
Shubham Kumbalpuri4, Sonali Patil5 Student, Dept of
Computer Engineering, PCCOE, Maharashtra, India
Associate Professor, Dept of Computer Engineering,
PCCOE, Maharashtra, India
[2] V.Hajduk , M.Broda , O.Kováþ and D.Levický, “Image
steganography with using QR code and cryptography,”
26th Conference Radioelektronika, IEEE pp. 978-1-
5090-1674-7, 2016
[3] A. Gaikwad and K.R.Singh, “Information Hiding using
Image Embedding in QR Codes for Color Images: A
Review,” International Journal ofComputer Scienceand
Information Technologies, Vol. 6 (1) , 2015
[4] M. Broda, V. Hajduk, D. Levický, “Image steganography
based on combination of YCbCr color model and DWT,”
in ELMAR, 2015 57th International Symposium, pp.
201- 204, 28-30, 2015.
[5] S. Dey, A.Nath and S. Agarwal, “Confidential Encrypted
Data Hiding and Retrieval Using QR Authentication
System,” International Conference on Com
Improvement in the Performance and Security of
Advanced Encryption Standard Using AES Algorithm
and Comparison with Blowfish Amit Verma,
Simarpreet Kaur, Bharti Chhabra, M. Tech. Research
Scholar, Computer Science & Engineering, Chandigarh
Engineering College 3Assistant Professor, Computer
Science& Engineering,ChandigarhEngineeringCollege,
Landran, Punjab, India, Professor and Head of
Department, Computer Science&
Engineering,Chandigar Engineering
College,Landran,Punjab.
[6] A Survey of Digital Watermarking Techniques and its
Applications, Lalit Kumar Saini1, Vishal Shrivastava,
M.Tech Research Scholar, Professor Department of
Computer Science and Engineering, Arya College of
Engineering. & Information Technology, Jaipur, India.
[7] “Digital Image Security Using Digital Watermarking “
Prof.A.S.Kapse, Sharayu Belokar, Yogita Gorde, Radha
Rane, Shrutika Yewtkar, Professor. A.S.Kapse, Dept.
Computer Science & Engineering, P.R. Pote College of
Engineering & Tech, Amravati, Maharashtra, India. BE
student, Dept. of Computer Science & Engineering, P.R.
Pote College of Engineering & Tech, Amravati,
Maharashtra, India.
[8] Improvement in the Performance and Security of
Advanced Encryption Standard Using AES Algorithm
and Comparison withBlowfish AmitVerma,Simarpreet
Kaur, Bharti Chhabra M. Tech. Research Scholar,
Computer Science & Engineering, Chandigarh
Engineering College Assistant Professor, Computer
Science& Engineering,ChandigarhEngineeringCollege,
Landran, Punjab, India Professor and Head of
Department, Computer Science& Engineering,
Chandigarh Engineering College, Landran,Punjab,
[9] Chi-Feng Lu , Fast implementation of AES
cryptographic algorithms in smart cards; Yan-Shun
Kao; Hsia-Ling Chiang; Chung-Huang Yang; Security
Technology, 2003.
[10] FIPS PUB 197, Advanced Encryption Standard (AES),
National Institute of standards and Technology.

Más contenido relacionado

La actualidad más candente

IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric ImagesIRJET Journal
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyIJCERT
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET Journal
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyShahrukh Ali
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT DomainIRJET Journal
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...IAEME Publication
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemEditor IJMTER
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET Journal
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...IRJET Journal
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDIAEME Publication
 
Photography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating SystemPhotography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating SystemIJRES Journal
 
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...IRJET Journal
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 

La actualidad más candente (20)

IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
 
Photography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating SystemPhotography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating System
 
Ijmet 10 01_020
Ijmet 10 01_020Ijmet 10 01_020
Ijmet 10 01_020
 
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
 

Similar a IRJET - Image Watermarking using QR Code

DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodeSurvey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodecsandit
 
A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...IRJET Journal
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmIRJET Journal
 
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET Journal
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET Journal
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
Survey on information sharing
Survey on information sharingSurvey on information sharing
Survey on information sharingijcisjournal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalIRJET Journal
 
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...IRJET Journal
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 
Understanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical ApproachUnderstanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical ApproachIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 

Similar a IRJET - Image Watermarking using QR Code (20)

DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodeSurvey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcode
 
A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
 
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
Survey on information sharing
Survey on information sharingSurvey on information sharing
Survey on information sharing
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
 
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
Understanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical ApproachUnderstanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical Approach
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
CryptoQR System based on RSA
CryptoQR System based on RSACryptoQR System based on RSA
CryptoQR System based on RSA
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
R04405103106
R04405103106R04405103106
R04405103106
 

Más de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 

Último (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 

IRJET - Image Watermarking using QR Code

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2857 Image Watermarking Using QR Code Ajit N. Gedam1, Afiya Papde2, Pranalee Walunj3, Rana Shaikh4 ,Sakshi Kamble5 2,3,4,5Students, Computer Engineering Department, AISSMS Polytechnic, Pune, Maharastra, India 1Ajit N. Gedam Lecturer in Computer Engineering Department, AISSMS Polytechnic, Pune, Maharastra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Digital image security and integrity are the top prioritized issue in today’s information World. Watermarking is a famous technique that is used for copyrightprotectionand authentication. Watermark Should be robust and imperceptible. Digital image watermarking process is to embed information of digital such as an image into digital signal using a strong media QR code. It is very difficult to identify that digital image watermarking has applied to the data This is a competent way to restrict illegal copyrights of Information from interactive multimedia networks.With advanced technology in printing and scanning, creating imitate documents have become an Uncomplicated task, making it very difficult to understand between original and the artificial. So, it is a very big challenge for providing Security and verification of digital data. This paper put forward an idea or intimation to provide an innovative method to verify the digital documents. An advanced method of QR code is bring here, which allow us to embed digital data such as image in QR code. In this paper, we bring up a new technique, where the image is encoded in QR i.e. [Quick Response] Code in encrypted form, so that if a hacker tries to modify or tries to tamper with the data the data then he will be unsuccessful to do that. This is due to; the encryption key is unknown to him except from the authorized person. It is impossible to scan or have access to the encrypted QR code as QR codes are robust. Key Words: QR code, AES(Advanced Encryption Standard) Algorithm, Android platform,Digtal image, Secret key,Watermarking,Decryption Problem Statement: After new technology of digitizing information were developed,a huge amount of databases of texts,images,scientific data,video,audiofilesandotherdigital information had been appeared in the world. With developing network and internet technologies and connecting computers into the World Wide Web, databases become available not only for authorize access butforillegal access also.Much more digital data can be accessed to via network now a days.The problem of data protectionisoneof the most important .The methods of coding and hiding information are well known from ancient times as a cryptography and stegnography. 1. INTRODUCTION A digital watermark is a kind of marker secretly embedded in a noise-permit signal such as an image data. It is typically used to identify proprietorship of the copyright of such signal. "Watermarking" is the process of hiding digital information in a carrier signal the hidden information should, but doesn't need to, contain a relation to the carrier signal. Digital watermarks may be used to prove the authenticity or integrity of the carrier signal or to show the identity of its proprietor. The informationtobeembedded in a signal is called a digital watermark, although in some condition the term digital watermark means the dissimilarity between the watermarked signal andthecover signal. The signal where the watermark is to be embeddedis called the host signal. A watermarking system is usually divided into three prominent steps, embedding, attack, and perception. In embedding, an algorithm obtain the host and the data to be submerged, and produces a watermarked signal. this paper contain QR codeandsteganographyisused to furnish the security to important data. 1.1 QR Code QR codes are 2 dimensional matrix. It allows to store a large volume of unique data. Bar-codes are one dimensional vector. So compare to bar-codes QR codes are having more storage size. QR codes can hold up to 7,089 numeric characters and up to 4,296 alphanumerical letter values as an information. The following figureshowsthestructure ofa QR code. Fig-1: QR Code 1.2 Steganography Steganography is an embedding process to hide the data in the form of an image or text. now a days sense of the word
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2858 sometimes refers to data or a file that has been hide within a digital image. What Steganography basically does is utilize human perception; the human sensesareunqualifiedtolook for files that have data hidden inside them. Generally, in steganography, the specific data isn't maintained in its original format and thereby it's converted into an alternate identical transmission file like image that successively is being hidden among another object. This apparent message (known as cover text in usual terms) is sent through the network to the recipient, wherever the specific message is separated from it. Steganography are used to achieve data privacy over confidentiality. 2. LITERATURE SURVEY 1. Image steganography with using QR code and cryptography: In this there is image stenography method that’s enables us to to embed the encoded secret message using Quick Response Code (QR) code into the image information. Advanced Encryption Standard[AES]domainis introduced for the encryption of the QR code, whereas encrypting method is in addition secured by Advanced Encryption Standard (AES) cipher algorithmic rule. Also, typical characteristics of QR code was cracked using the encryption, therefore it makes the method more secure. The relation between security and capability of the strategy was improved by special confining of QR code before the embedding method. 2. Information Hiding using Image Embedding in QR Codes for Color Images: It is considered that embedding strategies are designed to be Consistent with standarddecodingapplicationsandmight be Enforced to any color or gray scale image with full space Coverage. The embedding technique consists of 2 main following components. First element is that the use of halftoning techniques for the choice Of varying the pixels to interrupt and decrease the coarse square Architectureof the QR code and second is that the brightness Level to that the pixels square measure to be re-created. In such some way that it shouldn’t be visible to naked eye on the Color image. Afterwards decoding should be done for QR code from the color image With minimum errors. 3. Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System: In this paper, there’s totally different methodology, where the QR code is embedded into the Image which act as a digital media. Then the message which the user wants to send to the receiver is inserted in that QR code which is hidden behind the image. After secret key or encryption key will be entered, so that if an intruder tries to modify the message then he cannot do this , as well as there is an image in front and behind the image there is QR code in which message is hidden In this project, message is double secure as if any one try to see the message they cannot this is because of the image in front of QR code advantage of this is the image cannot be scanned . In this Method encryption of the message is done using AES Advanced encryption standard encryption algorithm. The encrypted message are Entered inside QR code and that QR code is also hidden behind the image . The message can then be Accessed from the QR code and can be decrypted using Decryption algorithm Reverse of AES. then the message will be accessed using the secret key whichisknowntorecipient. 3.SYSTEM ARCHITECHTURE System architecture is the theoretical designthatdefinesthe structure and behavior of a system. An design explanationis a prescribed description of a system, systematized in a way that supports perceptive about the fundamental properties of the system. It outlines the system modules or building blocks and delivers a plan from which products can be secured, and systems developed, that will work organized to implement the whole system. The System architecture is shown below. Fig -2: Encryption Fig -3: Decryption 4. CLASSIFICATION OF DIGITAL WATERMARKING TECHNIQUES A] Robustness Robustness is crucial propertyforall watermarkingsystems. There are so many ways by which watermark is degraded, altered during transmission, striked by hackers in paid media applications. So watermark should robust, So that it will resist against all the attacks and threats.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2859 B] Effectiveness: It is the most important property of watermark that the watermark should be effective means it should surely be detective. If this will not be happened then the goal of the watermarking is not fulfilled. C] Host signal Quality: It is also important property of watermarking. Everyone knows that in watermarking, watermark is embedded in host signal (image, video, audio etc.). Thismayhaveaneffect on the host signal. So the watermarking system should be like that, it will least change the host signal and it should be unobtrusive when watermark is invisible. D] Watermark Size: Watermark is often use to owner identification or security approval of host signal and it always use when data is transmitted. So it is important that the sizeofthewatermark should be less because it will increase the size of data to be transmitted. E] Perception: A digital watermark includes perception Presence in the marked signal is visible On videos and Images, some are made transparent/translucent for Convenience for consumers due to the fact that they block Portion of the view; therefore degrading it. F] Capacity: It can be described as number of data bits a Watermark gets encoded within a unit of time or work. Watermark Should be able to carry enough information that can Represent the uniqueness of image. 5. ALGORITHM The AES algorithm gains vast application in our daily life, such as smart cards, cell phones, automated teller machines and WWW servers. AES encodes a plain text to become a cipher text, which can be decoded back to the original plain text by using usual private key. It can be seen the cipher text is much different from and gives no clue to the original plain text. All the computations in AES are implemented on bytes instead of bits. Therefore, 128 bits of plain text is treated as 16 bytes. These 16 bytes are located in a matrix of four rows and four columns. In AES 10 rounds are performed for 128 bit keys, 12 rounds for 192 bit keys, and 14 rounds for 256 bit keys. All of these rounds apply a different 128 bit key, calculated from the original AES key.15 Following is the Algorithm to encrypt the data:- • Step 1:- Input a plain text of 128 bits of block cipher which will be arranged as 16 bytes. • Step 2: - Add Round Key: - each byte is integrated with a block of the round key using bitwise XOR. • Step 3:- Byte Substitution: - the 16 input bytes are substituted by examining S- box. The result will be a 4x4 matrix. • Step 4:- Shiftrow: - Every row of 4x4 matrixes will be shifted to left. Entries which will be on the left side now will be on the right side. • Step 5:- Mix Columns: - Every column of four bytes will be transformed by applying a distinctive mathematical function (Galois Field). • Step 6:- Add Round Key: - The 16 bytes of matrix will be scrutinized as 128 bits and will be XORed to 128 bits of the round key. • Step 7:- This 128 bits will be taken as 16 bytes and similar rounds will be performed. • Step 8:- At the 10th round which will be last round a ciphered text will be produced. Initially, the plain text of 128 bits of block cipher will be input, which will be treated as 16 bytes. Then, each byte will be non-discriminated with a block of the round key using bitwise XOR. From S-Box the 16 input bytes will be exchanged resulting 4x4 matrices.All rowsofthismatrix will be shifted to left. Shifting will be done as follows:- 1) First row will be not shifted. 2) Second row will be moved one position left. 3) Third row will be switched two positions to the left. 4) Fourth row will be shifted three positions to the left 16 As a result new matrices will be produced containing same 16 bytes but shifted with respect to each other. In MixColumn, every column of the matrix will be transformed by applying mathematical function such as Galois Field. The 16 bytes of matrix will be considered as 128 bits and will be XORed to 128 bits of round key.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2860 6. APPLICATIONS Digital watermarking may be used for a variety of Applications like : 1. Copyright protection. 2. Source tracking (different recipients get differently Watermarked content). 3. Broadcast monitoring (television news often contains 4. Watermarked video from international agencies). 5. Video authentication. 6. Content management on social networks. 7. CONCLUSION In this method we have implemented a advanced solutionto protect the asset of the user or owner by providing security by using method Digital Watermarking technique whose work is to protect the authenticity,copyright protection of owner using a strong media QR code.In addition to, the QR code is also hidden behind the image so that seeing at it the person will not be able to recognize that it contains QR code. We also classified the watermarking algorithms based On spatial and transform domain. Watermarking, whichBelong to the data hiding field, has seen a lot of Research interest recently. There is a lot of work begin Conducted in different branches in this field. We classify the Techniques based on different areas in which data is Embedded. AES (Advanced Encryption Standard ) provides more security (it is less susceptible to cryptanalysis than 3DES). REFERENCES [1] Image Steganography and Data hiding in QR Code Rutuja Kakade1, Nikita Kasar2, Shruti Kulkarni3, Shubham Kumbalpuri4, Sonali Patil5 Student, Dept of Computer Engineering, PCCOE, Maharashtra, India Associate Professor, Dept of Computer Engineering, PCCOE, Maharashtra, India [2] V.Hajduk , M.Broda , O.Kováþ and D.Levický, “Image steganography with using QR code and cryptography,” 26th Conference Radioelektronika, IEEE pp. 978-1- 5090-1674-7, 2016 [3] A. Gaikwad and K.R.Singh, “Information Hiding using Image Embedding in QR Codes for Color Images: A Review,” International Journal ofComputer Scienceand Information Technologies, Vol. 6 (1) , 2015 [4] M. Broda, V. Hajduk, D. Levický, “Image steganography based on combination of YCbCr color model and DWT,” in ELMAR, 2015 57th International Symposium, pp. 201- 204, 28-30, 2015. [5] S. Dey, A.Nath and S. Agarwal, “Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System,” International Conference on Com Improvement in the Performance and Security of Advanced Encryption Standard Using AES Algorithm and Comparison with Blowfish Amit Verma, Simarpreet Kaur, Bharti Chhabra, M. Tech. Research Scholar, Computer Science & Engineering, Chandigarh Engineering College 3Assistant Professor, Computer Science& Engineering,ChandigarhEngineeringCollege, Landran, Punjab, India, Professor and Head of Department, Computer Science& Engineering,Chandigar Engineering College,Landran,Punjab. [6] A Survey of Digital Watermarking Techniques and its Applications, Lalit Kumar Saini1, Vishal Shrivastava, M.Tech Research Scholar, Professor Department of Computer Science and Engineering, Arya College of Engineering. & Information Technology, Jaipur, India. [7] “Digital Image Security Using Digital Watermarking “ Prof.A.S.Kapse, Sharayu Belokar, Yogita Gorde, Radha Rane, Shrutika Yewtkar, Professor. A.S.Kapse, Dept. Computer Science & Engineering, P.R. Pote College of Engineering & Tech, Amravati, Maharashtra, India. BE student, Dept. of Computer Science & Engineering, P.R. Pote College of Engineering & Tech, Amravati, Maharashtra, India. [8] Improvement in the Performance and Security of Advanced Encryption Standard Using AES Algorithm and Comparison withBlowfish AmitVerma,Simarpreet Kaur, Bharti Chhabra M. Tech. Research Scholar, Computer Science & Engineering, Chandigarh Engineering College Assistant Professor, Computer Science& Engineering,ChandigarhEngineeringCollege, Landran, Punjab, India Professor and Head of Department, Computer Science& Engineering, Chandigarh Engineering College, Landran,Punjab, [9] Chi-Feng Lu , Fast implementation of AES cryptographic algorithms in smart cards; Yan-Shun Kao; Hsia-Ling Chiang; Chung-Huang Yang; Security Technology, 2003. [10] FIPS PUB 197, Advanced Encryption Standard (AES), National Institute of standards and Technology.