ABSTRACT via various ways which is allowed

ABSTRACT                In recent years, bank systemsare connected by the network technology all over the world. Core bankingnetwork plays a vital role in transactions. Customers can be able to transferand receive money in their account via various ways which is allowed by thebanks. Payments are made by various methods such as demand draft, NationalElectronic Fund Transfer(NEFT) payment system, Real Time Gross settlement(RTGS)payment system and cheque. Cheque truncation system in bank clear the cheque  payment.

It is useful for the employee toclear the cheque from home branch to the clearing house of cheque branch.During this case, cheque is scanned and the scanned image is transfer by the chequetruncation system to clearing house of cheque branch through the communicationchannel. Copyright protection and security for cheque image issue arises duringthe transmission through the digital communication channel. To overcome thisissue, Discrete Wavelet Transform(DWT) – Singular Value Decomposition(SVD)transform and RC4 Techniques with Chaotic Logistics Map (CLM) are used. Ithelps the cheque image to facilitate digital image watermarking and providessecurity for copyright protection. The strong key is provided by the ChaoticLogistics Map function. The proposed work converts the initial value from thekey and this value is given as input for the CLM function then this generatesequence of 256-bit key array.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

The final stage is the permutation process andthe result is get XORed with the plain image to produce the cipher image andvice versa. The experimental results shows that the proposed work: (a) providesthe cipher image cannot be visually identified, (b) the statistical correlationbetween the plain image and cipher image is eliminate, (c) very sensitive tosmall changes in key, (d) provides no change in image during encryption anddecryption process, (e) robust to a wide range of attacks such as croppingattack, Gaussian noise, JPEG compression attack, rotation attack, brightnessattack, contrast attack.INTRODUCTION                A digitalwatermarking is a marker covertly embedded in a noise tolerant signal such astext, image, audio, video. It is widely used for identifying ownership andcopyright protection of a image. In digital image watermarking, the digitalinformation of a watermark image is hidden in a carrier image but it does notcontain a information of a carrier image.  DWT-SVD provides robustness against variousattacks and the imperceptibility of hidden information.

Digital watermarkingscheme is the combination of Discrete Wavelet Transform and Singular ValueDecomposition. The transformed image’s matrix decomposed into each level ofdecomposition for two dimensional DWT. The decomposed matrices into fourfrequencies such as LL, HL, LH and HH frequencies.

The watermark image isembedded in all of these frequencies leads to negative correlated and possesnegative film effect during the extraction process. In order to increase therobustness by adding the singular values to HH frequency band in DWT. It ishighly sensitive to human visual system, which maintains the perceptual qualityof the watermarked image. Due to high development in network and communicationtechnology, there is a need for providing secure communication while exchangingconfidential information like image, audio and video. It can be achieved bychanging the shape of the transmitted image, which is called as encryption.

Inthis process, the image encrypted with the help of encryption algorithm andsecret key. In Wired Equivalent Privacy, the image is encrypted by using RC4encryption algorithm. During the encryption process, long pseudorandom bits aregenerated by the Chaotic Logistics Map function. It improves the confusion anddiffusion by the discrete exponential chaotic maps and it provides strong resistanceto brute force attack, statistic attack and differential attack. During thetransmission of cheque image intruders may attack the encrypted image. Hence itcan be evaluate by active and passive attack such as cropping attack, Gaussiannoise, JPEG compression attack, rotation attack, brightness attack, contrastattack.


I'm Ruth!

Would you like to get a custom essay? How about receiving a customized one?

Check it out