Abstract
The startling improvement about web need aggravated the transmission, conveyance Also right to advanced networking really useful. Therefore, networking makers need aid more usually managing illegal What’s more unapproved utilization from claiming their productions. In our proposed approach, first enter the user name and password then generate QR-code using zxing library that will converted into the three shares using Binary Visual cryptography algorithm. Now share-4 is save in the database that is for future reference at receiver side. Remaining share-1, share-2 and share-3 are embedding into the Red, Green and Blue-component LL bit using of block DWT-SVD and Pseudo Zernike moment. After embedding add RGB Component. Now Color watermark image transfer from the network. As in network there are different attackers apply combination of Rotation, Scale and Translation attacks on the color watermark image. For recover the attacks first apply Pseudo Zernike moment, Surf feature on R, G and B-component they will extract the attacks pixel and recover the scale-angle using affine transformation. Now share-1, share-2, share-3 and another share-4 is in data base so we will apply EX-OR operation to get the QR-code. The final QR-code is decoded and we get the user name and password. This research work can give a way for providing authentication to all online Services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Delphin Raj, K.M, Nancy, V.: Secure QR coding of images using the techniques of encoding and encryption. Int. J. Appl. Eng. Res. 9(12), 2009–2017 (2014). ISSN 0973-4562
Ajish, S., Rajasree, R.: Secure Mail Using Visual Cryptography (SMVC), 5th ICCCNT, Hefei, China 11–13 July 2014
Benoraira, A., Benma hammed, K., Boucenna, N.: Blind Image Watermarking Technique Based on Differential Embedding in DWT and DCT Domains, Springer (2015)
Aparna, J.R., Ayyappan, S.: Comparison of digital watermarking techniques. In: International Conference for Convergence of Technology, (2014)
Singh, B., Dhaka, V.S., Saharan, R.: Blind Detection Attack Resistant Image Watermarking, IEEE, (2014)
Huang, C.H., Wu, J.L.: Attacking visible watermarking schemes. IEEE Trans. Multimed. 6(1), Feb. (2004)
Bay, H., Ess, A., Tuytelaars, T., Van Gool, L.: Speeded-Up Robust Features (SURF), Elsevier, (2007)
Degadwala, S.D., Gaur, S.: Privacy preserving system using Pseudo Zernike moment with SURF and affine transformation on RST attacks. Int. J. Comput. Sci. Inf. Secur. 15(4), April (2017)
Gupta, A.K., Raval, M.S.: A Robust and Secure Watermarking Scheme Based on Singular Values Replacement Sadhana, vol. 37, Part 4. Indian Academy of Sciences, pp. 425–440 Aug. (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Degadwala, S.D., Gaur, S. (2018). 4-Share VCS Based Image Watermarking for Dual RST Attacks. In: Hemanth, D., Smys, S. (eds) Computational Vision and Bio Inspired Computing . Lecture Notes in Computational Vision and Biomechanics, vol 28. Springer, Cham. https://doi.org/10.1007/978-3-319-71767-8_77
Download citation
DOI: https://doi.org/10.1007/978-3-319-71767-8_77
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-71766-1
Online ISBN: 978-3-319-71767-8
eBook Packages: EngineeringEngineering (R0)