This paper is published in Volume-4, Issue-2, 2018
Area
Image Processing
Author
Shrutika Potdar, Mihir Potdar
Org/Univ
Infosys Technologies Limited, Mumbai, Maharashtra, India
Keywords
Digital watermarking, Phishing, E-Banking, Algorithm, Three-Factor authentication.
Citations
IEEE
Shrutika Potdar, Mihir Potdar. Application of digital watermarking in piracy, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Shrutika Potdar, Mihir Potdar (2018). Application of digital watermarking in piracy. International Journal of Advance Research, Ideas and Innovations in Technology, 4(2) www.IJARIIT.com.
MLA
Shrutika Potdar, Mihir Potdar. "Application of digital watermarking in piracy." International Journal of Advance Research, Ideas and Innovations in Technology 4.2 (2018). www.IJARIIT.com.
Shrutika Potdar, Mihir Potdar. Application of digital watermarking in piracy, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Shrutika Potdar, Mihir Potdar (2018). Application of digital watermarking in piracy. International Journal of Advance Research, Ideas and Innovations in Technology, 4(2) www.IJARIIT.com.
MLA
Shrutika Potdar, Mihir Potdar. "Application of digital watermarking in piracy." International Journal of Advance Research, Ideas and Innovations in Technology 4.2 (2018). www.IJARIIT.com.
Abstract
In today’s world where piracy has surfaced itself as one of the biggest problems, it becomes important to protect the originality to prevent huge revenue losses, to safeguard digital rights and protect information. This paper presents the application of digital watermarking for authorization against copying or piracy. E-Banking is the method of banking in which the customer conducts transactions electronically via the internet which causes the problem of phishing. The remedy to avoid phishing is to use different anti-piracy techniques. The technique that we are using is digital watermarking. The watermark is inserted by means of a security key. On reception, only the authorized person with a valid security key can extract the watermark thus verifying the integrity and authenticity of the image.