Reference Hub7
A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security

A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security

Ranjeet Kumar Singh, Dilip Kumar Shaw
Copyright: © 2018 |Volume: 12 |Issue: 1 |Pages: 12
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781522543060|DOI: 10.4018/IJISP.2018010101
Cite Article Cite Article

MLA

Singh, Ranjeet Kumar, and Dilip Kumar Shaw. "A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security." IJISP vol.12, no.1 2018: pp.1-12. http://doi.org/10.4018/IJISP.2018010101

APA

Singh, R. K. & Shaw, D. K. (2018). A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security. International Journal of Information Security and Privacy (IJISP), 12(1), 1-12. http://doi.org/10.4018/IJISP.2018010101

Chicago

Singh, Ranjeet Kumar, and Dilip Kumar Shaw. "A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security," International Journal of Information Security and Privacy (IJISP) 12, no.1: 1-12. http://doi.org/10.4018/IJISP.2018010101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Now a days, in communication technology safety of digital data in the form of text, image, and video, audio is a biggest problem. With the rapid development of the network multimedia systems, security is the biggest issue. Digital watermarking is one of the solutions to these problems. It hides some secret data into the original image and this information is use for image authentication and security. This paper Focus an application using Hybrid approach of Cryptography technique and dual watermarking for the purpose of Providing highly security and authentication of digital data. This paper use cryptography and QR Code in combined approach of LSB and DCT Digital image water marking technique. The Experimental results are given in the form of table and graph. This algorithm provides more security and data authentication compare to other image data security approach.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.