UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 11 Issue 4
April-2024
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2404G87


Registration ID:
539160

Page Number

p673-p681

Share This Article


Jetir RMS

Title

Secure Content Based Image Retrieval And Copy Deterrence Using Invisible Digital Watermarking

Abstract

Ensuring the security and integrity of data is crucial in the current digital environment. With a focus on collaboration between data owners, users, and administrators and the integration of cutting-edge methods like encryption and invisible digital watermarking, this project offers a comprehensive solution for data management. The three primary components of the system are administrators, users, and data owners. Owners of data have the ability to upload a variety of assets, such as documents, photos, and PDFs, and add undetectable digital watermarks on them. These watermarks are used for tracking and ownership verification since they contain encrypted text. After authenticating, users get access to a personalized dashboard where they may browse the information of files that data owners have submitted. Users receive an email containing a public-private key combination after choosing a file to download. The file and its concealed watermark can be safely retrieved and viewed with this key pair. A key component in guaranteeing data security across the system is encryption. Sensitive data, such as user information, file details, and key information, is encrypted and decrypted using AES encryption and stored in the database. Administrators can monitor key distributions, file interactions, and user activity with privileged access. They are able to keep an eye on file downloads, follow user activities, and make sure security protocols are followed. The architecture of the system places a high priority on data privacy and integrity, protecting against illegal access and tampering with strong encryption techniques and undetectable digital watermarking. The project offers a strong foundation for safe data management and cooperation in digital environments by combining these cutting-edge technologies.

Key Words

Data owners, users and administrators, Encryption, Invisible Digital Watermarking, Public-Private key, AES encryption, Database, Data Privacy, Integrity.

Cite This Article

"Secure Content Based Image Retrieval And Copy Deterrence Using Invisible Digital Watermarking", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.11, Issue 4, page no.p673-p681, April-2024, Available :http://www.jetir.org/papers/JETIR2404G87.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Secure Content Based Image Retrieval And Copy Deterrence Using Invisible Digital Watermarking", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.11, Issue 4, page no. ppp673-p681, April-2024, Available at : http://www.jetir.org/papers/JETIR2404G87.pdf

Publication Details

Published Paper ID: JETIR2404G87
Registration ID: 539160
Published In: Volume 11 | Issue 4 | Year April-2024
DOI (Digital Object Identifier):
Page No: p673-p681
Country: Chennai, Tamilnadu, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00021

Print This Page

Current Call For Paper

Jetir RMS