Security

A New Fragile Approach for Optimization in Invisible Image Watermarking by Using Symmetric Key Algorithms

Free registration required

Executive Summary

In the information technology and communication, the most important factor has been the security of information and one of the methods is watermarking. The Watermarking aims to validate the host and the undeniable identity of the legal owner. In this paper, the authors will concentrate on hidden watermarks. At one time, it deals with two different images in BMP to hide information. The message will be dividing evenly in both images to maximize the security of image watermarking. It utilizes the LSB manipulation method and the images addresses used as key are also encrypted for performance improvement with existing Symmetric key algorithms.

  • Format: PDF
  • Size: 356.69 KB