Archana Tiwari

Work place: Chhatrapati Shivaji Institute of Technology, Durg

E-mail: archanatiwari@csitdurg.in

Website:

Research Interests: Information Security, Image Processing, Information Systems, Information Retrieval, Information-Theoretic Security

Biography

Prof. Archana Tiwari received her B.E degree in Electronics and Telecommunication from Amravati in 1994 and completed her post graduation from GEC Jabalpur in 2005. She is pursuing her PhD from Swami Vivekananda Technical University, Bhilai. She has to her credit, more than 20 papers in various International and National Journals and Conferences. With more than 16 years of teaching and research experience .She is currently serving as Associate professor & head in the department of Electronics and Instrumentation, Chhatrapati Shivaji Institute of Technology, Durg. Her areas of interest include image processing, information security and digital watermarking. She is a life member of Indian Society for Technical Education and Institution of Electronics and Telecommunications engineers. She is member of IEEE also.

Author Articles
Semifragile Watermarking Schemes for Image Authentication- A Survey

By Archana Tiwari Manisha Sharma

DOI: https://doi.org/10.5815/ijcnis.2012.02.07, Pub. Date: 8 Mar. 2012

Digital images are very easy to manipulate, store, publish and secondary creation this juggle will lead to serious consequence in some applications such as military image, medical image. So, integrity of digital image must be authenticated. Tools that help us establish the authenticity and integrity of digital media are thus essential and can prove vital whenever questions are raised about the origin of an image and its content. To project authenticity of images semi fragile watermarking is very concerned by researchers because of its important function in content authentication. Semifragile watermarking aim to monitor contents of images not its representations. In present paper various semi fragile water marking algorithm are studied using some image quality matrices, insertion methods used, verification method. Finally some observations are given based on literature survey of algorithms and techniques of semifragile watermarking techniques.

[...] Read more.
Other Articles