Abstract

The original signature or document. The application demonstrates that it can be used to protect a document or signature from fraud by an authorize person. Criminal can be considered as Harmful act or omission against the public which the State wishes to prevent and which, upon con eviction, is punishable by fine, imprisonment, and/or death. No conduct constitutes a crime unless it is declared criminal in the laws of the country. Some crimes (such as theft or criminal damage) may also be civil wrongs (torts) for which the victim(s) may claim damages in compensation. Criminals may be happened in every sector and in daily life. Criminal acts may be in the form of copy right fraud and signature forgery. In this work we try to solve or prevent those criminals. By using watermarking technique, the work proposed to introduce new technique to protect document originality quickly and accurately. Watermarking was carried out by inserting an image or text into signature image in order to protect. The work shows that file size produced by integrating the two same files but on different file stored and also produce different file size. Moreover Testing shows that steganography of image file with JPEG format and file image hidden with JPEG format which produced other small size of file from file steganography storage such as BMP and PNG formats.

Highlights

  • Fraud or violation to unauthorized copy right always happened repeatedly and become more complicate

  • To open multimedia product inserted with watermark, he/she does not realize that the product was inserted with watermark or digital signature

  • Inserting watermark process was carried out by some steps: First, input original image convert to vector form, vector form converts to binary form

Read more

Summary

INTRODUCTION

Fraud or violation to unauthorized copy right always happened repeatedly and become more complicate. The work using digital watermarking with image RGB and correlation Discrete Cosines Transforms (DCT) method which carried out by comparing floating value [7]. Implementation of watermarking to protect documents was carried out by using Least Significant Bit (LSB) and use to insert code. Digital watermarking considered as technique insert information into data using a certain method which cause watermark to be deleted or destroy [1]. The purposed of invisible watermark is to verify the ownership or verify the integrity image digital or information It usually when extraction of invisible watermarking need a password which is called watermark key. Least Significant Bi method considered as one of watermarking methods that works in Red Green Blue R,G,B) mode This method was carried out by inserting information into the most right bits from every RGB element. Width ratio obtained from division between division viewer and original width image

RESULTS AND DISCUSSION
Snapshot Program Display
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.