Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published September 30, 2020 | Version v1
Journal article Open

Robust Watermarking Technique for Sharing Family Photos on Social Media using Aadhar Number and DCT

  • 1. Department of Computer Science & Engineering, Shobhit Institute of Eng. & Technology (Deemed-to-be-University), Meerut
  • 2. Department of MCA, AKG Engineering College, Ghaziabad
  • 1. Publisher

Description

The mind setup of persons has been changed in today’s environment due to the easily available of internet and smart phone on very low-price cost. Smart phone and internet are two main resources which are being used by persons most of the time in his/her daily routine specially in lockdown due to COVID-19. In this lockdown, persons are doing some creative activity, making fun, etc and recording all his/her this personal information in the form of multimedia contents like text, images, audio and video. This created multimedia content is shared by persons frequently on globe through internet in the daily routine life and some other persons are watching this daily routine activity and making huge business with these data by sometimes with original content or sometimes with modified content without concerns/information/permission of the originator. In this process if everything is going in right way then no issues but if something going wrong then require legal issues and for this, we need to protect our data legally through some methodology. So this paper proposed secure watermarking technique for protecting multimedia content like images using Aadhar number and Discrete Cosine Transform (DCT) technique. In this proposed methodology individual can share the information’s with watermarked information which is hidden in shared images and on demand at the time of legal issue originator will show the actuality and its ownership. This paper explained details concepts of the embedding and reverse of embedding ( i.e. extracting) process for authentication of the images and its protection from the misuse or fraud. The experimental result of the proposed methodology is shown on different family photos shared on globe and found robust results.

Files

B4162079220.pdf

Files (633.5 kB)

Name Size Download all
md5:822db7f9fa07cc093f3a3ff48cfd96df
633.5 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2277-3878 (ISSN)

Subjects

ISSN
2277-3878
Retrieval Number
100.1/ijrte.B4162079220