Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Document Verification & Authentication
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
[attachment=72698]


Steganography


The art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message



Digital Watermarking
Digital watermarking is the process of embedding information into a digital signal .

Types of watermark
Robust Watermark
Fragile Watermark
Visible Watermark
Invisible Watermarking
Existing system
Acquire parameter
- Details of document owner.
Convert
-Computation of row , column , & values.
Hide
-Identification of the pixel in original image.
-Hiding of data.
-Restore the pixel.
Drawbacks
Easy to detect stereographic image.
Sometimes difficult to detect the pixels.
Easy to modify the hidden data.
Doesn’t satisfy security requirement.

Proposed system
Modules
Registration
Generate Unique Keys and Parameters
Create Image Card and Save to Database
Image Card Viewer
Apply Image Card Verification


LSB Algorithm
Replaces least significant bits with the message to be encoded
Most popular technique when dealing with images
Simple, but susceptible to lossy compression and image manipulation


Benefits
Transparency
Robustness
Security
Capacity
Reversibility
Possibility of verification


Applications
Owner identification

Conclusion
This authentication scheme embeds the invisible watermark into the photo.
It satisfies
- robustness
- Invisibility
-Undetectability
-Security requirements.