A study on image security in social media using digital watermarking with metadata

Author(s):  
Mohd Aliff Faiz bin Jeffry ◽  
Hazinah Kutty Mammi
2020 ◽  
Vol 10 (1) ◽  
Author(s):  
Mohd Aliff Faiz Jeffry ◽  
Hazinah Kutty Mammi

Digital watermarking technique is a way of protecting digital image from malicious attacks. Compression attack is one of the most common attacks for images uploaded into social media. Social media, such as Facebook and Twitter, implement compression method for all types of media, before it is successfully uploaded into their server. This is to reduce the network bandwidth and storage needed to store each media in their server. However, the implemented compression method tends to tarnish image properties from the image itself, which can be used to identify the image itself. This produces other problems, which are ownership and copyright issues. Digital watermark has been proposed in numerous researches, and this research is one of them, in preventing the stated problem. The chosen digital watermarking techniques must be able to withstand against compression attack done by social media. A comprehensive analysis towards the watermarking algorithms and watermarked images were done, by applying several designed experiments. Based on the results, it shows that both chosen watermarking techniques could not withstands against compression attack made by JPEG compression and social media compression. It indicates that watermarking technique was not a suitable method to be used in preserving the ownership and copyright of the image throughout social media.


2019 ◽  
Vol 11 (8) ◽  
pp. 3221-3229 ◽  
Author(s):  
A. Mohanarathinam ◽  
S. Kamalraj ◽  
G. K. D. Prasanna Venkatesan ◽  
Renjith V. Ravi ◽  
C. S. Manikandababu

2021 ◽  
Vol 320 ◽  
pp. 110691
Author(s):  
Narima Zermi ◽  
Amine Khaldi ◽  
Redouane Kafi ◽  
Fares Kahlessenane ◽  
Salah Euschi

2010 ◽  
Vol 174 ◽  
pp. 144-147
Author(s):  
Xin Ying Hu ◽  
Xiu Ping Zhao

Digital watermarking has been proposed as a way to claim the ownership of the source and owner of the digital image data. In this paper, A robust algorithm based on DCT region is proposed to improve the image security. The main transforming is based on DCT (Discrete Cosine Transform). The algorithm was processed in the MATLAB software. In this paper, images of gray scale and RGB color scale were researched respectively. For color images, in order to get the best image quality, the RGB scale was transformed to YcbCr scale. Then, the Y channel (brightness channel) was separated, in which the watermark was embedded and extracted. The results show that the algorithm embedded a certain size of black and white Bitmap image into gray and color images. The watermark can’t be seen by the naked eye. The robustness detection experiment was also carried out. The watermark can still be extracted after certain amount of tailoring, defacing, Gaussian noise, and format changes. The similarity is more than 0.7. It confirmed that the algorithm is highly robust.


2021 ◽  
Vol 69 (3) ◽  
pp. 3857-3870
Author(s):  
Shady Y. El-mashad ◽  
Amani M. Yassen ◽  
Abdulwahab K. Alsammak ◽  
Basem M. Elhalawany

2020 ◽  
Vol 8 (6) ◽  
pp. 2639-2645

In the current daily routine the sharing of digital content is increasing in large scale through social media. Every individual is sharing his/her activities like photos, message, etc. through social media (i.e. WhatsApp, Facebook, etc.) to other persons without authentication of all these data and through this general activity of people some people are doing fraud to them or misuse of these data or illegally showing to other people without his concern. To ensure the authentication of digital contents this paper proposes methodology to prove the ownership by Digital watermarking and Intellectual Property Right (IPR). This paper explains the concepts of IPR and proposed alphanumeric watermarking technique for authentication of images and its protection from the fraud or misuse. Digital Watermarking has become one of the research areas in many fields from more than decades. This paper gives the methodology of embedding and extraction techniques for images to prove the authentication of images when required its demand. The result of this proposed technique is shown very helpful to society at a globe.


ASHA Leader ◽  
2015 ◽  
Vol 20 (7) ◽  
Author(s):  
Vicki Clarke
Keyword(s):  

ASHA Leader ◽  
2013 ◽  
Vol 18 (5) ◽  

As professionals who recognize and value the power and important of communications, audiologists and speech-language pathologists are perfectly positioned to leverage social media for public relations.


Sign in / Sign up

Export Citation Format

Share Document