Cryptography with video watermarking Authentication password using Hadoop

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2017 by IJETT Journal
Volume-48 Number-1
Year of Publication : 2017
Authors : Dharmik Patel, Dr. S. N. Gujar
DOI :  10.14445/22315381/IJETT-V48P202

Citation 

Dharmik Patel, Dr. S. N. Gujar "Cryptography with video watermarking Authentication password using Hadoop", International Journal of Engineering Trends and Technology (IJETT), V48(1),7-11 June 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Now a day there is an upcoming challenge to Store, Manage and Distribute Big data across several server nodes, for this purpose, the new platform has been developed which are called as Hadoop. There are provided a within more than three levels of security. It`s motivation to provide more security; These are levels of security. There are quite a few numbers of authentication methods are available for security. It is provided of 6-levels of security. That security is a timestamp, shoulder surfing, capture image, one-time password and image selection. The image file is sending with security video watermarking with cryptography. It had the merit of being easy to understand and use. Video watermarking is nothing but inserting a hidden object to detect deceitful alteration by hackers. The object may be regarding a secret key or password etc. The complete software implementation of 3-Level DWT algorithms and to have more secure data a secret key is used, and it used one-time password algorithm for using OTP. That system is providing to the highly secured system. There are providing to video watermarking with cryptography security it using sender to receiver.

 References

[1] Taekyoung Kwon, Jin Hong, “Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks," IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 2, FEBRUARY 2015.
[2] Shaikh Shoaib, R. C. Mahajan, “Authenticating Using Secret Key in Digital Video Watermarking Using 3-Level DWT”, 2015 International Conference on Communication, Information & Computing Technology (ICCICT), 978-1-4799-5522-0/2015.
[3] Rakesh Ahuja, S S Bedi, “Copyright Protection using Blind Video Watermarking Algorithm based on MPEG-2 Structure", International Conference on Computing, Communication and Automation 978-1-4799-8890-7/15/ ©2015 IEEE.
[4] P. Viswanathan, P. Venkata Krishna, “A Joint FED Watermarking System Using Spatial Fusion for Verifying the Security Issues of Teleradiology," IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 18, NO. 3, MAY 2014.
[5] Somayyeh Mohammadi, Kerman, Iran, “A Novel Video Watermarking Algorithm based on Chaotic maps in the Transform Domain," 2015 International Symposium on Artificial Intelligence and Signal Processing.
[6] S. Saranya, M. Sarumathi, B. Swathi, P. Victer Paul, S. Sampath Kumar, T. Vengattaraman, “Dynamic Preclusion of Encroachment in Hadoop Distributed File System” 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15)
[7] Hung-Min Sun, Shiuan-Tung Chen, Jyh-Haw Yeh and Chia-Yun Cheng, “A Shoulder-Surfing Resistant Graphical Authentication System," 10.1109/TDSC.2016.2539942, IEEE Transactions on Dependable and Secure Computing.
[8] R.Thenmozhi, Swathikha.S, RanjanaDevi.G, R. Saravanan, “Authentication and Digital Video Tampering Detection Using Watermarking," ICARCSET `15, March 06 - 07, 2015, Unnao.
[9] Rupali Walker, Priyanka More, “Digital Audio Watermarking and Image Watermarking for Information Security," International Conference on Pervasive Computing (ICPC)
[10] Rupali D. Patil, Shilpa Metkar, “Fragile Video Watermarking for Tampering Detection and Localization," 2015 International Conference on Advances in Computing, Communications, and Informatics (ICACCl).
[11] Santhoshi Bhat, Arghya Ray, Avishake Ghosh, Ananya Ray, “Image Steganography and Visible Watermarking using LSB Extraction Technique”, IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO)2015.
[12] M.Hindusree, Dr.R.Sasikumar, “Preventing Shoulder Surfing in Secure Transactions”, 2015 International Conference on Computing and Communications Technologies (ICCCT`15).
[13] Amir M. U. Wagdarikar, Ranjan K. Senapati, “Robust and novel blind watermarking scheme for H.264 compressed video”, SPACES-2015, Dept of ECE, K L UNIVERSITY.
[14] Chu-Hsing Lin, Chen-Yu Lee, Shih-Pei Chien, “ Digital Video Watermarking On Cloud Computing Environments," ijirct.

Keywords
Watermarking, video watermarking, shoulder surfing, Security, Levels of security.