Detection of Tampered Images using Watermarking Technique
Komali Dammalapati1, Bhanu Kiran Devisetty2, VVS Sasank3, Arpita Roy4, Sadhana Burlah5
1Bhanu Kiran Devisetty*, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India.
2VVS Sasank, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India.
3Arpita Roy, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India.
4Sadhana Burla, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India.
5Komali Dammalapati, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India.
Manuscript received on December 12, 2019. | Revised Manuscript received on December 22, 2019. | Manuscript published on January 10, 2020. | PP: 3063-3068 | Volume-9 Issue-3, January 2020. | Retrieval Number: C8420019320/2020©BEIESP | DOI: 10.35940/ijitee.C8420.019320
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Over the most recent couple of years there is a gigantic improvement in advanced innovation . Most the data is in the form of images, videos and audios. But there are various software’s to modify these images. So the data we transmit through the digital images may not be secure. For example if we are using an image as an evidence then there may be a chance of modifying that image. There may be a risk of using a digital image as evidence. So, it’s not secure to use digital images as evidence. So we decided to do a research on technology that provide security to tampered images. But there are many technologies to detect tampered images. Our project mainly focused on watermarking technique to detect tampered images.
Keywords: Technology, Steganography, Digitalimage , Tampering, Security
Scope of the Article: Knowledge Engineering Tools and Techniques