In the modern world, art is the creative world?s response to the perspective of new lives and ideas. In today?s digital world art is not only circumscribed to something created using paints and canvas, instead everything from clicking the scenery from a mountain?s top or to capture the shimmering ci
Image Authentication Using Digital Certificate
In the modern world, art is the creative world’s response to the perspective of new lives and ideas. In today’s digital world art is not only circumscribed to something created using paints and canvas, instead everything from clicking the scenery from a mountain’s top or to capture the shimmering cities under the twilight to going beyond the stars ,is considered as art! And so, with emerging technologies in hand, art is advanced and created as Digital images. Although it has now been made easy for people to benefit from this digitized art and to get many creative ideas without the need for going to art galleries, but its also very crucial to provide security for these digital assets.
As we all know, pictures are copied and distributed illegally countless times each day. These pictures are stolen from their creators who are put at a great financial disadvantage because of their property being used without copyright permission or proper license and credit.
So that is why there needs to be in place a fair platform for publishers, photographers and image agencies which should be able to authenticate the intellectual property on the internet.
Such a platform will be able to distinguish between an original image and its perfect copy using encryption algorithms and will authenticate the copyright using a digital certificate. This will work by comparing the image that is uploaded, to the the images present in the systems database. And if the uploaded image matches any image from the database the system will not authenticate the image. And if the image does not match any image it will authenticate the image using digital certificate and add the image to the database.
This technology will lessen, if not mitigate, the theft of online intellectual property.
The degree of credibility will surely be diminished if altered photos are widely employed in the state media, scientific innovation, and sometimes even forensic evidence, having a negative influence on different parts of society. so our system aims to mitigate the risk of image forgery and to detect any possible changes to the original image.
We picked the Agile implementation technique since it is a widely utilised project management methodology that emphasises rapid and continuous improvement. Agile methodology's usage of sprints makes it easier for us to follow. Sprints' flexibility allows for last-minute alterations, which can lead to a higher-quality product.
It enables the identification of the multimedia data's author and the determination as to whether an actual multimedia data's content has been altered in any way after its recording. the system is able to preserve confidentiality, integrity and and authentication of an image.
encryption techniques have been presented in order to make familiar with the image which has been transferred over the network. Perceptual hashing is used to hash the digital image. AES is used to encrypt the hash of the original image. The image is saved with a MAC on the server’s database. This method reduces the likelihood of a meticulous invader attack. Encryption protects data in transit, whereas hashing ensures that a file or piece of data hasn't been tampered with.
Perceptual image hashing is an algorithm that can very accurately identify copies of similar images and their legitimately modified versions, their effectiveness in detecting content-changing manipulations has not been thoroughly investigated [3]. It generate perceptual features of image to generate their hashes. The primary goal is to generate hashes that remain unchanged or only slightly change when content-preserving changes are made to the image. There are three steps in perceptual hashing which are image pre-processing, perceptual feature extraction, and quantization to generate the final string.
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Printing and Stationary | Miscellaneous | 1000 | 3 | 3000 |
| image processing tool | Equipment | 1 | 8000 | 8000 |
| matlab license | Equipment | 1 | 60000 | 60000 |
| Total in (Rs) | 71000 |
Our project title is Smart Wearable Kit.Our project is based on IOT technology which...
Crops can be watered in many ways either through proper canal channels we can use ground w...
Project will provide software as well as hardware to vehicle manufacturers and individual...
The IoT-based Smart Drink Dispenser (iSDD) is a system that can be used for dispensing wat...
This is the project that have been developed for those who face sometimes vehicle breakdow...