Submitted Successfully!
To reward your contribution, here is a gift for you: A free trial for our video production service.
Thank you for your contribution! You can also upload a video entry or images related to this topic.
Version Summary Created by Modification Content Size Created at Operation
1 -- 1020 2023-12-15 08:21:46 |
2 layout Meta information modification 1020 2023-12-15 08:37:00 |

Video Upload Options

Do you have a full video?

Confirm

Are you sure to Delete?
Cite
If you have any further questions, please contact Encyclopedia Editorial Office.
Upadhyay, S.; Kumar, M.; Upadhyay, A.; Verma, S.; Kavita, D.; Hosen, A.S.M.S.; Ra, I.; Kaur, M.; Singh, S. Digital Image Authentication for Security and Validation Enhancement. Encyclopedia. Available online: https://encyclopedia.pub/entry/52796 (accessed on 04 July 2024).
Upadhyay S, Kumar M, Upadhyay A, Verma S, Kavita D, Hosen ASMS, et al. Digital Image Authentication for Security and Validation Enhancement. Encyclopedia. Available at: https://encyclopedia.pub/entry/52796. Accessed July 04, 2024.
Upadhyay, Shrikant, Mohit Kumar, Aditi Upadhyay, Sahil Verma, Dr. Kavita, A. S. M. Sanwar Hosen, In-Ho Ra, Maninder Kaur, Satnam Singh. "Digital Image Authentication for Security and Validation Enhancement" Encyclopedia, https://encyclopedia.pub/entry/52796 (accessed July 04, 2024).
Upadhyay, S., Kumar, M., Upadhyay, A., Verma, S., Kavita, D., Hosen, A.S.M.S., Ra, I., Kaur, M., & Singh, S. (2023, December 15). Digital Image Authentication for Security and Validation Enhancement. In Encyclopedia. https://encyclopedia.pub/entry/52796
Upadhyay, Shrikant, et al. "Digital Image Authentication for Security and Validation Enhancement." Encyclopedia. Web. 15 December, 2023.
Digital Image Authentication for Security and Validation Enhancement
Edit

Digital face approaches possess currently received awesome attention because of their huge wide variety of digital audio, and visual programs. Digitized snapshots are progressively more communicated using an un-relaxed medium together with cyberspace. Consequently, defence, clinical, medical, and exceptional supervised photographs are essentially blanketed towards trying to employ it; such controls ought to damage such choices constructed totally based on those pictures.

watermarking authentication security HMM Viterbi algorithm

1. Introduction

In the past few years face identification and its verification received great attention in computer vision, pattern recognition and biometric communities. Common attraction among researchers motivated by the phenomenal capability to identify a human faces with evidence such that people’s occupations are related both in multimedia and daily routine. The facial analysis involves extracting or gathering information like age, gender, pose, landmark, naming etc. It includes different applications as well as law imposition, face biometrics for transactions, self-driving vehicles, active verification on devices etc. Validation and recognition of face systems basically consist of basic three steps. Starting, the stage consists of an identifier for confining profile in faces is required and belongings of profiles identifier are strong to variations in illuminations, scale and pose. Also, an efficient face identifier should be able to handle output constantly with a well confining limited area. The second stage localizes the facial indicators like the tip of the nose, view base, point of ear lobes, jaw corner etc. Such indicators are then worn to arrange profiles (faces) with ease consequence of scaling and in-level spinning. The last and third stage is of attribute separator which encrypts the naming statistics in a high-dimension locator. Such complete descriptions are worn to evaluate a similar point or outcome in the middle of similar profiles. A fruitful attribute separator capable to handle delusions found by back stages in the queue: profile alignment, face recognition and indicator finding [1].
The profile (face) has many benefits that force it to be one of the efficient bioscrypt distinguishing qualities. First, the profile face reflects internal emotions (affections) of happiness or sadness (concern) including the person’s approximate age and identity. Second, even at a long distance, the face biometric is easy to capture. And this feature makes face identification crucial in person recognition as well as in human-computer interaction. The profile face bioscrypt is impressed by a variety of extrinsic and natural variations like lighting, pose, age and expressions. In the past, an outstanding refinement was observed in the staging of the profile face identification, but quiet under the tolerable levels found in various applications. A modern attempt has mainly concentrated on different features, 3D (3-dimensional) prototypes and pictorial inputs to control the execution of additional demand in 2-dimensional profile still image identification [2]. Face geometrically is a 3D space sum of a large number of polygons that can be represented by facial features and pixels related to the face geometry. Image data computationally can be represented in vector form.

2. Digital Image Identification and Verification Using Maximum and Preliminary Score Approach with Watermarking for Security and Validation Enhancement

Walton in the year 1995 [3] proposed the first approach based on watermarking where image verification was done by fragile watermarking where only image facts are used to develop the watermark. This approach used the placing technique using checksum and least significant bit with a grey quantity of the most significant seven selected pseudo-randomly captured pixels. This approach localizes and detects but not having a repairing facility. In the year 2020 [4] proposed an algorithm that gain more attention where a large number of ‘N’ is used for evaluating the checksums and this size directly affects the detecting probability manipulations. H. Cheng in the year 2019 [5] proposed a method based on a secret key used to create a binary function and this function maps integers from interval {0, 1, 2,…..255} per colour image which is further used as code to calculate the grey level. M.T. Bhatti & W. Fang [6][7] in the year 20,211 proposed a method to prevent attack from vector quantification to prevent attack from vector quantification based on a private public key systems and minimize the quantification attack.
Lee [8] in the year 2021 proposed a method to validate colour images using fragile watermarking where colour images are decomposed into three different parts for their protection also this colour component is used to hide the facts of images. Byun SC and K. Seth [9][10] in the year 2002 & 2021 proposed a technique that converts the grey level of original version of image in interval (−127, 128) and break image into 8 × 8 blocks and separate each blocks using cosine discrete transform. In [11] authors discussed digital watermarking approach to provide authentication and ownership for audio, videos and images where watermarking is first transformed and in way to encrypt the sequence of randomly generated pixels for key selection.
In [12] authors discussed a watermarking approach in which dropped a mark in program and protecting its functionality and no one has right to uncover the mark without affecting the functionality. In [13] authors proposed a technology of watermarking for industries to provide security to their leased or hired data. In this paper Fractal and Spatial algorithm watermarking was considered to improve the protection of data compression. In Spatial approach there is no need for transforming the computation of embedding watermarking. Here nine co-ordinates minimum considered for its implementation.
In [14] authors proposed a method for multimedia facts copyright protection using digital watermarking as it helps to reduce the increasing overhead. Text or numbers, videos, and images are considered for the analysis where information is not embedded in the frame throughout the data. Cryptography which is based on an unseeing image watermarking approach was presented to increase security. Scrambling watermarks with different attacks like Gaussian noise, median filtering, rotation etc. was also discussed in many papers.
The existing approaches face the problems of protecting their functionality in protecting compressed data. It also arises the issue of copyright protection which increases the overhead. The decomposition of images increases the chances of validation and verification. The proposed model takes care of such issues in the training and testing phase process. This process increases the authentication and validation to become more secure without affecting the original version of images.

References

  1. Upadhyay, A.; Sharma, S. Robust Feature Extraction using Embedded HMM for Face Identification & Verification. Int. J. Appl. Eng. Res. 2017, 12, 15729–15777.
  2. Abraham, J.; Paul, V. An imperceptible spatial domain color image water scheme. J. King Saud Univ.-Comput. Inf. Sci. 2019, 31, 125–133.
  3. Liu, Y.; Tang, S.; Liu, R.; Zhang, L.; Ma, Z. Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst. Appl. 2018, 97, 95–105.
  4. Alsawwaf, M.; Chaczko, Z.; Kulbacki, M. In your face: Person identification through ratios and distances between facial features. Vietnam J. Comput. Sci. 2022, 9, 187–202.
  5. Mohammed, A.; Kadhim Farhan, A. A novel improvement with an effective expansion to enhance the MD5 hash function for verification of a secure E-Document. IEEE Access 2020, 8, 80290–80304.
  6. Chambino, L.L.; Silva, J.S.; Bernardino, A. Multispectral facial recognition: A review. IEEE Access 2020, 8, 80290–80304.
  7. Chen, H.; Shi, B.; Zhong, T. Research on recognition method of electrical components based on YOLO v3. IEEE Access 2019, 7, 157818–157829.
  8. Bhatti, M.; Khan, M.; Aslam, M.; Fiaz, M.J. Weapon detection in real-time CCTV videos using deep learning. IEEE Access 2021, 9, 34366–34382.
  9. Fang, W.; Wnag, L.; Ren, P. Tinier-YOLO: A real-time object detection method for constrained environments. IEEE Access 2020, 8, 1935–1944.
  10. Li, H.; Hu, J.; Yu, J.; Wu, Q. UFaceNet: Research on multitask face recognition algorithm based on CNN. Algorithms 2021, 12, 268.
  11. Dash, S.; Verma, S.; Kavita; Khan, M.S.; Wozniak, M.; Shafi, J.; Ijaz, M.F. A Hybrid Method to Enhance Thick and Thin Vessels for Blood Vessel Segmentation. Diagnostics 2021, 11, 2017.
  12. Shenvi, D.; Shet, K. CNN based COVID-19 prevention system. In Proceedings of the 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), Coimbatore, India, 25–27 March 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 873–878.
  13. Kumar, M.; Raju, K.S.; Kumar, D.; Goyal, N.; Verma, S.; Singh, A. An efficient framework using visual recognition for IoT based smart city surveillance. Multimed. Tools Appl. 2021, 80, 31277–31295.
  14. Yang, G.; Jan, M.A.; Rehman, A.U.; Babar, M.; Aimal, M.M.; Verma, S. Interoperability and Data Storage in Internet of Multimedia Things: Investigating Current Trends, Research Challenges and Future Directions. IEEE Access 2020, 8, 124382–124401.
More
Information
Contributors MDPI registered users' name will be linked to their SciProfiles pages. To register with us, please refer to https://encyclopedia.pub/register : , , , , , , , ,
View Times: 102
Revisions: 2 times (View History)
Update Date: 15 Dec 2023
1000/1000
Video Production Service