z-logo
open-access-imgOpen Access
Robust Watermarking Technique for Sharing Family Photos on Social Media using Aadhar Number and DCT
Author(s) -
Deepti Varshney,
AUTHOR_ID,
Monika Bansal,
Birendra Kumar Sharma,
AUTHOR_ID,
AUTHOR_ID
Publication year - 2020
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.b4162.099320
Subject(s) - computer science , digital watermarking , internet privacy , the internet , phone , multimedia , process (computing) , permission , authentication (law) , computer security , social media , discrete cosine transform , world wide web , artificial intelligence , image (mathematics) , law , linguistics , philosophy , political science , operating system
The mind setup of persons has been changed in today’s environment due to the easily available of internet and smart phone on very low-price cost. Smart phone and internet are two main resources which are being used by persons most of the time in his/her daily routine specially in lockdown due to COVID-19. In this lockdown, persons are doing some creative activity, making fun, etc and recording all his/her this personal information in the form of multimedia contents like text, images, audio and video. This created multimedia content is shared by persons frequently on globe through internet in the daily routine life and some other persons are watching this daily routine activity and making huge business with these data by sometimes with original content or sometimes with modified content without concerns/information/permission of the originator. In this process if everything is going in right way then no issues but if something going wrong then require legal issues and for this, we need to protect our data legally through some methodology. So this paper proposed secure watermarking technique for protecting multimedia content like images using Aadhar number and Discrete Cosine Transform (DCT) technique. In this proposed methodology individual can share the information’s with watermarked information which is hidden in shared images and on demand at the time of legal issue originator will show the actuality and its ownership. This paper explained details concepts of the embedding and reverse of embedding ( i.e. extracting) process for authentication of the images and its protection from the misuse or fraud. The experimental result of the proposed methodology is shown on different family photos shared on globe and found robust results.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here