Dual Watermarking in Cyber Security
DOI:
https://doi.org/10.24297/jac.v13i10.5834Keywords:
Dual watermarking, Cyber security and Cyber TechnologyAbstract
Cyber security is generally a conservatory of the conventional information system security that is aimed at protecting cyber threats, like cyber terrorism, cyber warfare, and cyber espionage to corrupt digital information. This leads to increase the researches in cyber security. This paper proposes the application of dual watermarking in cyber technology, focusing on forgery detection. The rest of the paper presents a brief overview of cyber security and the role of digital dual watermarking.
Downloads
References
2. Types of Cyber attacks. Reterived from www.google.co.in
3. Overview of different types of Identity Theft. 2015. Retrived from www.idtheftauthority.com
4. Lakshmi priya. A, Letitis.S.2015,â€Copyright protection for Digital Colour Images in RGB plane using Improved DWT-DCT-SVD Algorithmâ€, International joural of applied Engineering Research.
5. Lakshmi priya. A, S. Letitia. 2016. “Copyright protection of Dual Color Images Based on Singular Valuue Decomposition Using Improved Arnoldâ€, Asian Journal of Information Technology.
6. Accenture. 2010. Cyber security: An escalating global challenge for all organizations.Alexander, A. (2015). Protecting yourself from identity theft. Retrieved from www.thewatermarkgrp.com
7. Braun, S. K.. 2014. Forensic evidence of copyright infringement by digital audio sampling analysis identification marking. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 3(3), 170-182.
8. Prakobphol. K., Zhan, 2002. Alleviating identity theft in social networks
9. Topkara. M., Ashish. K., Mikhail. J.A. and Cristina. N. 2005, “ViwiD: Visible watermarking based defence against phishingâ€, Digital watermarking lecture notes in Computer seience.
10. Cox, J., Miller, M. L., Bloom, J. A., Fridrich, J., & Kalker, T. 2008. Digital watermarking and steganog-raphy.Elsevier Inc.
11. IBM. 2014 . IBM Security Services 2014 Cyber Security Intelligence Index Analysis of cyber attack and incident data from IBM’s worldwide security operations.
12. Information commissioner. 2010. Guidelines for preventing identity theft. Retrieved from www.ip-rs.si
Downloads
Published
How to Cite
Issue
Section
License
All articles published in Journal of Advances in Linguistics are licensed under a Creative Commons Attribution 4.0 International License.