Abstract
In Development of network communication need protect the transmission with fast Communication. Therefore, networking producers need to be constantly manage illegal use of the data. In our proposed approach, first step enter the user name and password then generate in text format that will be converted to QR-code using zxing library. Now the QR-code will be converted in to the share using Binary Visual cryptography algorithm. After that generated share-2 is save in the database that is for future reference at receiver side and share-1 is embedding into the R-Component LL bit using of block DWT-SVD and Pseudo Zernike moment. In embedded image further add G, B Component. So, Color watermark image is ready to transfer from the network. As in network there are different attackers apply RST attacks on the color watermark image and Generated attack Watermark Image. At the receiver side recover the attacks first apply Pseudo Zernike moment, Surf feature on R-component so, they will extract the attacks pixel and recover the scale-angle using affine transformation. Now share-1 and another share-2 is in data base so we will apply EX-OR operation to get the QR-Code. The final QR-code is decoded and we get the user name and password. This research work can give a way for providing authentication to all online Services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Delphin Raj, K.M., Victor, N.: Secure QR coding of images using the techniques of encoding and encryption. Int. J. Appl. Eng. Res. 9(12), 2009–2017 (2014). ISSN 0973-4562
Ajish, S., Rajasree, R.: Secure mail using visual cryptography (SMVC). In: 5th ICCCNT 2014, 11–13 July 2014, Hefei, China (2014)
Gupta, A.K., Raval, M.S.: A robust and secure watermarking scheme based on singular values replacement. SaDhana 37(4), 425–440 (2012)
Benoraira, A., Benmahammed, K., Boucenna, N.: Blind image watermarking technique based on differential embedding in DWT and DCT domains. EURASIP J. Adv. Sig. Process. 2015, 55 (2015)
Gao, L., Gao, T., Sheng, G., Zhang, S.: Robust medical image watermarking scheme with rotation correction. In: Pan, J.-S., Snasel, V., Corchado, E.S., Abraham, A., Wang, S.-L. (eds.) Intelligent Data analysis and its Applications, Volume II. AISC, vol. 298, pp. 283–292. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07773-4_28
Nguyen, S.C., Ha, K.H., Nguyen, H.M.: An improved image watermarking scheme using selective curvelet scales. In: 2015 International Conference on Advanced Technologies for Communications (ATC) (2015)
Saxena, V.: Collusion attack resistant watermarking scheme for images using DCT. IEEE (2014)
Bay, H., Ess, A., Tuytelaars, T., Van Gool, L.: Speeded-up robust features (SURF). Comput. Vis. Image Underst. 110, 346–359 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Degadwala, S.D., Gaur, S. (2018). An Efficient Privacy Preserving System Based on RST Attacks on Color Image. In: Patel, Z., Gupta, S. (eds) Future Internet Technologies and Trends. ICFITT 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 220. Springer, Cham. https://doi.org/10.1007/978-3-319-73712-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-73712-6_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-73711-9
Online ISBN: 978-3-319-73712-6
eBook Packages: Computer ScienceComputer Science (R0)