International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-11,Issue-12  ( Dec, 2023 )
  2. Volume-11,Issue-11  ( Nov, 2023 )
  3. Volume-11,Issue-10  ( Oct, 2023 )
  4. Volume-11,Issue-9  ( Sep, 2023 )
  5. Volume-11,Issue-8  ( Aug, 2023 )
  6. Volume-11,Issue-7  ( Jul, 2023 )
  7. Volume-11,Issue-6  ( Jun, 2023 )
  8. Volume-11,Issue-5  ( May, 2023 )
  9. Volume-11,Issue-4  ( Apr, 2023 )
  10. Volume-11,Issue-3  ( Mar, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 133
Paper Published : 1552
No. of Authors : 4025
  Journal Paper


Paper Title :
Secured Image Authentication By Watermarking In Digital Photography And Encryption Via Sd-Aies

Author :Irfan C, Geogen George

Article Citation :Irfan C ,Geogen George , (2014 ) " Secured Image Authentication By Watermarking In Digital Photography And Encryption Via Sd-Aies " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 31-34, Volume-2,Issue-3

Abstract : Abstract—The three pillars of information security are integrity, confidentiality and availability and in this paper the confidentiality is assured by digital watermarking and the integrity is assured by SD-AEIS. Watermarking is the process of hiding digital information in a carrier signal the hidden information should, but does not need to contain a relation to the carrier signal. Digital watermarking holds significant promise as one of the keys to protecting proprietary digital content in the coming years. It focuses on embedding information inside a digital object such that the embedded information is in separable bound to the object. It is typically used to identify ownership of the copyright of such signal. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. It is prominently used for tracing copyright infringements and for banknote authentication. The advanced image encryption standard will encrypt the image and will protect from any attack from the third party.

Type : Research paper

Published : Volume-2,Issue-3


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-519   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 40
| Published on 2014-03-21
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY