2014
DOI: 10.5120/16705-6852
|View full text |Cite
|
Sign up to set email alerts
|

A Secured Approach for Watermark Embedding using Key based Gödelization Technique under Spatial and Frequency Domains

Abstract: The huge availability of multimedia data on the internet makes the creation, modification and distribution of the multimedia content easy and affordable. This improvement in the digital techniques has led a path to unauthorized access, copying and distribution of multimedia data, which throws a serious challenge in the field of copyright protection. This paper focuses on providing security and authentication through a method termed Gödelization for the purpose of encryption and Location Decision Embedding Tech… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…What this means is that the time required to factorize integers into their prime factors grows exponentially with the number of bits in the integer. So if the encryption uses very large integers, it would take an unrealistic amount of time to crack it [4]. In formal number theory a Gӧdel numbering is a function which assigns to each symbol and formula of some formal language a unique natural number called a Gӧdel number (GN).…”
Section: Proposed Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…What this means is that the time required to factorize integers into their prime factors grows exponentially with the number of bits in the integer. So if the encryption uses very large integers, it would take an unrealistic amount of time to crack it [4]. In formal number theory a Gӧdel numbering is a function which assigns to each symbol and formula of some formal language a unique natural number called a Gӧdel number (GN).…”
Section: Proposed Methodologymentioning
confidence: 99%
“…7) Insecure software/firmware:Lack of secure update mechanism, update files not encrypted, update files not verified before upload, insecure update server, hardcoded credentials. 8) Poor physical security: Device easy to disassemble, access to software via USB ports, removable storage media [4].…”
Section: ) Privacy Concernsmentioning
confidence: 99%