Projectwale,Opp. DMCE,Airoli,sector 2
projectwale@gmail.com

Digital Watermarking and Security Techniques

Digital Watermarking and Security Techniques

ABSTRACT:-

Watermarking performs a genuinely essential function inside the subject of network safety and authentication of records. But the main hassle is to secure the data from duplication and unauthorized use. Consequently, digital watermarking is employed. With this technology, we tend to implant the secret information into the real information for protecting it from unauthorized use. The need and requirement of online transaction of records is growing daily on the internet consequently we would like authentication and safety of our facts and virtual watermarking is the decision of that drawback. Digital watermarking illustrates techniques and technology that cover the records inside the form of text, images, audio and video.

For security purposes we take input as an image which you want to watermark, then we will generate any random key with our logic. By using RSA encryption we generate public and private keys to encrypt randomly generated keys.  After key generation we encrypt the watermark image by using RSA keys. After that we stored these data into our database. Then this newly formed image will be read and embedded into the original image. Then we have to detect the image for that we retrieve all the information regarding the image from the database. Then we decrypt the RSA private key to read that watermarked image, after decryption the image and hidden watermark will be displayed.

For any who envisions building an application, uploading images is a major component they have to take into account. It is an essential requirement while creating a complete application. File uploading means a user from a client machine wants to upload files to the server. For example, users can upload images, videos, etc. on Facebook, Instagram. As with any programming problem, there are many ways to achieve this outcome. This article explains a simple way to implement the approach to upload a single file with React.

The process of uploading an image can be broadly divided into two steps:

•Select a File (user input): To enable the user to pick a file, the first step is to add the tag to our App component. This tag should have the type attribute set as “file”. Now, we need an event handler to listen to any changes made to the file. This event handler will be triggered whenever the user selects a new file and will update the state.

•Send a request to the server: After storing the selected file (in the state), we are now required to send it to a server

•File encryption is one of the most effective security solutions. Combined with advanced security controls, it gives your business comprehensive data protection. AES Crypt is a file encryption software available on several operating systems that uses the industry standard Advanced Encryption Standard (AES) to easily and securely encrypt files.

•The process of decryption of an AES ciphertext is similar to the encryption process in the reverse order.

Keywords: RSA, Watermark, Private Key, Public Key, Secure data, database, encryption, decryption

OBJECTIVES OF THE PROJECT:-

The main objectives of the project are:

The main objective for developing this application is that it can provide the user with security of data it will also provide the transfer of data from one machine to another in from of files only the authorized user and administrator can access the application.

1) Data embedding even as now no longer distorts the image. 

2) Minimum perceptual degradation. 

3) Information extraction without any loss. 

4) This could in the long run be the reason for shielding medical images with watermarking. 

5) Digital watermarking is presently a drastically focused technique aimed towards imparting a dependable manner to defend images or certify copyrights safety. 

6) In the present mode-like spatial domain, the watermark isn’t always nicely embedded and extracted and it finally ends up in the fallacious safety of secret info. 

7) The prevailing spatial area is remodeled into frequency area mistreatment separate ripple rework. 

8) In our projected paintings the watermark is from time to time embedded invisibly in the images to keep away from attracting the attention of malicious attackers. 

9) We use color image watermarking, which has excessive efficiency in comparison to the ordinary gray scale picture watermarking.

 

EXISTING SYSTEM:-

      A completely unique image sweetening technique, named CLAHE-discrete wavelet transform (DWT), which mixes the CLAHE with DWT.

      The new technique includes 3 main steps: initial, the first image is rotten into low-frequency and high-frequency elements by DWT.

      Then, the authors enhance the low-frequency coefficients exploitation CLAHE and keep the high-frequency coefficients unchanged to limit noise sweetening.

      This is often as a result of the high-frequency part corresponds to the detail info and contains most noises of original image.

      Finally, reconstruct the image by taking inverse DWT of the new coefficients.

 

 

DISADVANTAGES OF EXISTING SYSTEM:-

      System was not much secure.

      Easy to implement.

      System is not précised.

 

PROPOSED SYSTEM:-

•For security purpose we take input as an image which you want to watermark, then we will generate any random key with our logic.

•By using RSA encryption, we generate public key and private key to encrypt randomly generated key. 

•After key generation we encrypt the watermark image by using RSA keys. After that we stored these data into our database.

•Then this newly formed image will be read and embedding into the original image. Then we have to detect the image for that we retrieve all the information regarding image from database.

•Then we decrypt the RSA private key to read that watermarked image, after decryption image and hidden watermark will be display.

•The proposed watermarking technique have been developed under the assumption that the noise attacks are happening in isolation and not simultaneously. The project can be extended in scenario where the noise attacks happen simultaneously

•The proposed scheme is limited to only image watermarking. The future work can be extended to audio and video data.

•The proposed scheme is limited to only software. The future work can be extended to the realization of the software implementation and the subsequent hardware implementation.

•The proposed method of watermarking has been implemented to make the process of watermarking both robust and imperceptible.

•The encrypted watermark file share with the other users and other users download that file after the acceptance of consent form.

Advantages of Proposed System:

1. Data is more secure than existing system.

2. It isn’t robust to common signal technique operations thence watermarks are often simply depleted because of signal processing attacks

3. Good compression and better imperceptibility.

4. Easily shared encrypted data to any recipient.

5. Very fast and simple encryption and verification.

 

MODULES:

·        User Registration: User have to register to become a part of project.

·        User Login: User have to login themself to access in project.

·        Upload file: When user uploads file watermark emebbed and encrypt with AES and AES key encrypted with RSA Public key and metadata store in database

·        Share File:We Can Share that Encrypted file.

·        Download File:We Can Download that Encrypted file.

Advantages of Proposed System:-

1. Data is more secure than existing system.

2. It isn’t robust to common signal technique operations thence watermarks are often simply depleted because of signal processing attacks

3. Good compression and better imperceptibility.

4. Easily shared encrypted data to any recipient.

5. Very fast and simple encryption and verification.

 

HARDWARE AND SOFTWARE REQUIREMENTS :-

HARDWARE: –

·        Processor: Intel Core i3 or more.

·        RAM: 4GB or more.

·        Hard disk: 250 GB or more.

 

SOFTWARE:-

  • Operating System: Windows 10, 7, 8.
  • Python.
  • Anaconda.
  • Spyder, Jupiter notebook, Flask.
  • MYSQL.
  • React

Leave a Reply

Your email address will not be published. Required fields are marked *