IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 9    
Website: http://www.ijser.org
scirp IJSER >> Volume 2, Issue 9, September 2011
Verification of document with social values using watermark exclusion
Full Text(PDF, 3000)  PP.  
Author(s)
Mukesh Kumar
KEYWORDS
check the ownership of legal document, Check ligtimacy of document, currency verification, check the genuineness of documents, detect fackeness of document, document authenthicatin using watermark exclusion, To deter copying using watermark
ABSTRACT
Cryptography ensure the authenticity and integrity of a document but after encryption it is helpless but watermark prove all such aspects with legitimacy and ownership of document at all levels. Digital watermarking is a technique for inserting information (the watermark) into an image, which can be later extracted or detected for variety of purposes including identification and authentication purposes A watermark is a pattern made in high-quality papers by means of an improved or worst design that comes in contact with the paper; it is approximately 90% water and 10% fibers. The watermark designs are spaced at specific intervals (depending on the frequency of appearance required in the finished sheet) along the surface of a skillfully crafted wire roll called a "Groovy roll". As the revolving groovy roll comes in contact with the fibers, the designs displace with the fibers and produce the pattern visible in the finished sheet known as a watermark. Most people are familiar with two types of document watermarks which can be found in banknotes or on cheques. In banknotes, these are recognizable designs that are put into the paper on which the documents are printed, while in cheques they tend to be specific patterns. These watermarks are normally used to prevent people from being able to make fake copies, and, therefore, to be confident that the banknote or document is authentic. Our aim to remove all the vulnerability by checking the genuineness of documents with social values through such methods that verify the legitimacy of documents
References
[1] Anderson, R., Cox, I., Low, S., Maxemchuk, N., & Tranter, W. Guest Editorial Copyright and Privacy Protection. IEEE Journal on Selected Areas of Communications. Vol 16, No 4. May 1998.

[2] Anderson, R., Fabien, A., Peticolas, P. On the Limits of Steganography. IEEE Journal on Selected Areas in Communications. Vol 16, NO 4. May 1998.

[3] Hardin, R. W., “Optical Tricks Designed to Foil Counterfeiters”. OE Reports Number 191, International Society for Optical Engineering, November 1999

[4] Benedens, O. Geometry-Based Watermarking of 3D Models. IEEE Computer Graphics and Applications. Vol 19, No 1. Jan/Feb 1999.

[5] Kundur D., Hatzinakos D., “A robust digital image watermarking method using wavelet-based fusion,” Int. Conf. on Image Processing, Vol. 1, Oct 1997, pp. 544-547.

[6] Cox I. J., Kilian J., Leighton F. T., & Shamoon T., “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing,Vol. 6, No: 12, Dec 1997, pp. 1673-1687.

[7] Tirkel A.Z.., Rankin G. A., Schyndel R.G. van, Ho W.J., Mee N.R.A., and Osborne C.F., “Electronic Watermark,” In Dicta-93, Dec 1993, pp. 666-672.

[8] Bender W., Gruhl D., and Morimoto N., “Method and apparatus for data hiding in images,” U.S. Patent # 5689587, 1996.

[9] Goffin F., Delaigle J.F., De Vleeschouwer C., Marc B., and Quisquater J.J., “A low cost perceptive digital picture watermarking method,” Storage and Retrieval for Image and Video Database, Vol. 3022, Feb 1997, pp. 264-277.

[10] Kutter M., Jordan F., & Bossen F., “Digital signature of color images using amplitude modulation,” Proc. of SPIE-EI 97, Feb 1997, pp. 518-526.

[11] Cox I. J., Miller M. L., and McKellips A. L., “Watermarking as Communications with Side Information,” Proc. of IEEE, Vol. 87, No: 7, July 1999, pp. 1127-1141.

[12] Ho A.T.S., Jun S., Soon H. T., & Kot A.C., “Digital image-inimage watermarking for copyright protection of satellite images using the fast Hadamard transform,” IEEE International Geoscience and Remote Sensing Symposium (IGARSS '02), 24-28 June 2002, Vol. 6, pp. 3311-3313.

[13] Hsu C. T., and Wu J.L., “Hidden digital watermarks in images,” IEEE Transactions on Image Processing, Vol. 8, No: 1, Jan 1999, pp. 58-68.

Untitled Page