Dual Watermarking in Cyber Security


  • Mrs. A. Lakshmi Priya Assistant professor, and Technology, Vellore, India
  • S. Letitia Thanthai Periyar Government Inst. Of Engg. And Technology, Vellore, India




Dual watermarking, Cyber security and Cyber Technology


Cyber security is generally a conservatory of the conventional information system security that is aimed at protecting cyber threats, like cyber terrorism, cyber warfare, and cyber espionage to corrupt digital information. This leads to increase the researches in cyber security. This paper proposes the application of dual watermarking in cyber technology, focusing on forgery detection. The rest of the paper presents a brief overview of cyber security and the role of digital dual watermarking. 


Download data is not yet available.


1. Agbaje M.O, Awodele O., and Ogbonna A.C. 2015. “Application of Digital Watermarking to Cyber Security (Cyber Watermarking)”, Proceedings of Information Science & IT Education Conference.
2. Types of Cyber attacks. Reterived from www.google.co.in
3. Overview of different types of Identity Theft. 2015. Retrived from www.idtheftauthority.com
4. Lakshmi priya. A, Letitis.S.2015,”Copyright protection for Digital Colour Images in RGB plane using Improved DWT-DCT-SVD Algorithm”, International joural of applied Engineering Research.
5. Lakshmi priya. A, S. Letitia. 2016. “Copyright protection of Dual Color Images Based on Singular Valuue Decomposition Using Improved Arnold”, Asian Journal of Information Technology.
6. Accenture. 2010. Cyber security: An escalating global challenge for all organizations.Alexander, A. (2015). Protecting yourself from identity theft. Retrieved from www.thewatermarkgrp.com
7. Braun, S. K.. 2014. Forensic evidence of copyright infringement by digital audio sampling analysis identification marking. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 3(3), 170-182.
8. Prakobphol. K., Zhan, 2002. Alleviating identity theft in social networks
9. Topkara. M., Ashish. K., Mikhail. J.A. and Cristina. N. 2005, “ViwiD: Visible watermarking based defence against phishing”, Digital watermarking lecture notes in Computer seience.
10. Cox, J., Miller, M. L., Bloom, J. A., Fridrich, J., & Kalker, T. 2008. Digital watermarking and steganog-raphy.Elsevier Inc.
11. IBM. 2014 . IBM Security Services 2014 Cyber Security Intelligence Index Analysis of cyber attack and incident data from IBM’s worldwide security operations.
12. Information commissioner. 2010. Guidelines for preventing identity theft. Retrieved from www.ip-rs.si




How to Cite

Priya, M. A. L., & Letitia, S. (2017). Dual Watermarking in Cyber Security. JOURNAL OF ADVANCES IN CHEMISTRY, 13(10), 5923–5926. https://doi.org/10.24297/jac.v13i10.5834