Abstract

Technology and digital communications have advanced so that digital photos, videos, or text may be easily manipulated by those not authorized to do so. In addition, the availability of specialized picture editing programs like Photoshop has simplified the process of altering photographs. At first glance, there may seem to be no problem, especially when an image editing method is necessary to delete or add a certain scene that increases the picture’s beauty. But what about personal images or images with copyright? Attempts are constantly made to spoof these images using different approaches. Therefore, measures to reduce the likelihood of counterfeiting in digital and printed forms of media are required. The proposed approach aims to detect a counterfeit in images using a unique generator that conceals the data represented by the embedded watermark utilizing modern visual cryptography and hash algorithms. Image extractions may easily be analyzed for signs of forgery. As a result, our approach will detect and validate phony documents and images.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.