Skip to main content

Frequency Domain Combination for Preserving Data in Space Specified Token with High Security

  • Conference paper
Informatics Engineering and Information Science (ICIEIS 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 251))

Abstract

A space specified token may be used in future for the purpose of authentication in all aspects. Digital information to be stored in space specified token should be of minimized size. Such minimization of the digital data is done and stored using watermarking procedure as proposed for secure purpose. For higher security the key to perform watermarking and Encoding/ Decoding is obtained from a Biometric trait as an added feature

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fei, C., Kundur, D., Kwang, R.H.: Analysis and Design of Watermarking Algorithms for improved Resistance to Compression. IEEE Trans. Image Processing 13, 126–144 (2004)

    Article  Google Scholar 

  2. van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: IEEE Proceedings ICIP, vol. 2, pp. 86–90 (1994)

    Google Scholar 

  3. Nikolaidis, N., Pitas, I.: Copyright protection of images using robust digital signatures. In: IEEE Int. Conf. Acoustics, Speech Signal Processing, vol. 4, pp. 2168–2171 (May 1996)

    Google Scholar 

  4. Wolfgang, R., Delp, E.: A watermark for digital image. In: IEEE ICIP, vol. 3, pp. 211–214 (1996)

    Google Scholar 

  5. Cox, J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing 6, 1673–1687 (1997)

    Article  Google Scholar 

  6. Hsu, C.-T., Wu, J.-L.: DCT-based watermarking for video. IEEE Trans. Consumer Electronics 44, 206–216 (1998)

    Article  Google Scholar 

  7. Hsieh, M.-S., Tseng, D.-C., Huang, Y.-H.: Hiding Digital Watermarks Using Multiresolution Wavelet Transform. IEEE. Trans. Industrial Electronics 48(5), 875–882 (2001)

    Article  Google Scholar 

  8. Daren, H., Jiufen, L., Jiwu, H., Hongmei, L.: A DWT-based image watermarking algorithm. In: Proceedings IEEE Int. Conf. Multimedia and Expo., Tokyo, August 22-25 (2001)

    Google Scholar 

  9. Rao, K., Yip, P.: Discrete Cosine Transform: algorithms, advantages, applications. Academic Press, USA (1990)

    Book  MATH  Google Scholar 

  10. Fotopulos, V., Skodras, A.N.: A Subband DCT Approach to Image Watermarking. In: 10th European Signal Processing Conference 2000 (EUSIPCO 2000), Tampere, Finland (September 2000)

    Google Scholar 

  11. Emek, S., Pazarci, M.: Additive vs. Image Dependent DWT-DCT Based Watermarking. In: Gunsel, B., Jain, A.K., Tekalp, A.M., Sankur, B. (eds.) MRCS 2006. LNCS, vol. 4105, pp. 98–105. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Emek, S.: DWT-DCT Based Digital Watermarking Techniques for Still Images and Video Signals, PhD’s Thesis, Institue of Science, Yıldız Tech. Unv. (January 2006)

    Google Scholar 

  13. Emek, S., Pazarcı, M.: A Cascade DWT-DCT Based Watermarking Scheme. In: 13th European Signal Processing Conference 2005 (EUSIPCO 2005), Antalya Turkey (September 2005)

    Google Scholar 

  14. Al-Haj, A.: Combined DWT-DCT Digital Image Watermarking. Journal of Computer Science 3(9), 740–746 (2007)

    Article  Google Scholar 

  15. Prasanalakshmi, B., Kannammal, A.: Secure Authentication of Space Specified Tokens with Biometric Traits- Face and Fingerprint. IJCSNS International Journal of Computer Science and Network Security 9(7) (July 2009)

    Google Scholar 

  16. Prasanalakshmi, B., Kannammal, A.: A Secure Cryptosystem from Palm Vein Biometrics. In: ACM Proceedings from ICIS 2009, Korea (November 2009)

    Google Scholar 

  17. Saeed, Ahmed: Robust Digital Image Watermarking Based on Joint DWT-DCT. International Journal of Digital Content Technology and its Applications 3(2) (June 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Prasanalakshmi, B., Kannammal, A., Sridevi, R. (2011). Frequency Domain Combination for Preserving Data in Space Specified Token with High Security. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25327-0_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25327-0_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25326-3

  • Online ISBN: 978-3-642-25327-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics