Verification of document with social values using watermark exclusion
|
Full Text(PDF, 3000) PP.
|
|
Author(s) |
Mukesh Kumar |
|
KEYWORDS |
check the ownership of legal document, Check ligtimacy of document, currency verification, check the genuineness of documents, detect fackeness of document, document authenthicatin using watermark exclusion, To deter copying using watermark
|
|
ABSTRACT |
Cryptography ensure the authenticity and integrity of a document but after encryption it is helpless but watermark prove all such aspects with legitimacy and ownership of document at all levels. Digital watermarking is a technique for inserting information (the watermark) into an image, which can be later extracted or detected for variety of purposes including identification and authentication purposes A watermark is a pattern made in high-quality papers by means of an improved or worst design that comes in contact with the paper; it is approximately 90% water and 10% fibers. The watermark designs are spaced at specific intervals (depending on the frequency of appearance required in the finished sheet) along the surface of a skillfully crafted wire roll called a "Groovy roll". As the revolving groovy roll comes in contact with the fibers, the designs displace with the fibers and produce the pattern visible in the finished sheet known as a watermark. Most people are familiar with two types of document watermarks which can be found in banknotes or on cheques. In banknotes, these are recognizable designs that are put into the paper on which the documents are printed, while in cheques they tend to be specific patterns. These watermarks are normally used to prevent people from being able to make fake copies, and, therefore, to be confident that the banknote or document is authentic. Our aim to remove all the vulnerability by checking the genuineness of documents with social values through such methods that verify the legitimacy of documents
|
|
References |
|
[1] Anderson, R., Cox, I., Low, S., Maxemchuk, N., & Tranter, W.
Guest Editorial Copyright and Privacy Protection. IEEE Journal
on Selected Areas of Communications. Vol 16, No 4. May 1998.
[2] Anderson, R., Fabien, A., Peticolas, P. On the Limits of Steganography.
IEEE Journal on Selected Areas in Communications.
Vol 16, NO 4. May 1998.
[3] Hardin, R. W., “Optical Tricks Designed to Foil Counterfeiters”.
OE Reports Number 191, International Society for Optical Engineering,
November 1999
[4] Benedens, O. Geometry-Based Watermarking of 3D Models.
IEEE Computer Graphics and Applications. Vol 19, No 1.
Jan/Feb 1999.
[5] Kundur D., Hatzinakos D., “A robust digital image watermarking
method using wavelet-based fusion,” Int. Conf. on Image
Processing, Vol. 1, Oct 1997, pp. 544-547.
[6] Cox I. J., Kilian J., Leighton F. T., & Shamoon T., “Secure Spread
Spectrum Watermarking for Multimedia,” IEEE Transactions
on Image Processing,Vol. 6, No: 12, Dec 1997, pp. 1673-1687.
[7] Tirkel A.Z.., Rankin G. A., Schyndel R.G. van, Ho W.J., Mee
N.R.A., and Osborne C.F., “Electronic Watermark,” In Dicta-93,
Dec 1993, pp. 666-672.
[8] Bender W., Gruhl D., and Morimoto N., “Method and apparatus
for data hiding in images,” U.S. Patent # 5689587, 1996.
[9] Goffin F., Delaigle J.F., De Vleeschouwer C., Marc B., and Quisquater
J.J., “A low cost perceptive digital picture watermarking
method,” Storage and Retrieval for Image and Video Database,
Vol. 3022, Feb 1997, pp. 264-277.
[10] Kutter M., Jordan F., & Bossen F., “Digital signature of color
images using amplitude modulation,” Proc. of SPIE-EI 97, Feb
1997, pp. 518-526.
[11] Cox I. J., Miller M. L., and McKellips A. L., “Watermarking as
Communications with Side Information,” Proc. of IEEE, Vol. 87,
No: 7, July 1999, pp. 1127-1141.
[12] Ho A.T.S., Jun S., Soon H. T., & Kot A.C., “Digital image-inimage
watermarking for copyright protection of satellite images
using the fast Hadamard transform,” IEEE International Geoscience
and Remote Sensing Symposium (IGARSS '02), 24-28
June 2002, Vol. 6, pp. 3311-3313.
[13] Hsu C. T., and Wu J.L., “Hidden digital watermarks in
images,” IEEE Transactions on Image Processing, Vol. 8,
No: 1, Jan 1999, pp. 58-68.
|
|
|