IJCATR Volume 3 Issue 3

Stepping Stone Technique for Monitoring Traffic Using Flow Watermarking

S.R.Ramya A. Reyana
10.7753/IJCATR0303.1009
keywords : Perturbation, Embedding,Correlation,Extraction, validation

PDF
The proposed system describes a watermarking technique on ownership authentication providing secured transactions. The unique watermark signature is invisible. The specific request preferred by the user is identified by the watermark extraction procedure,whichidentifies the signature and returns the user requested data with a proper secret key, indicating authorized user. The watermark extraction algorithm returns an error that tells impostor user. Here it requires a unique signature during both the insertion and the request procedures, thus the user remains unauthorized until it passes the signature validation test. Here the versions of signature and secret key techniques are followed.
@artical{s332014ijcatr03031009,
Title = "Stepping Stone Technique for Monitoring Traffic Using Flow Watermarking",
Journal ="International Journal of Computer Applications Technology and Research(IJCATR)",
Volume = "3",
Issue ="3",
Pages ="176 - 179",
Year = "2014",
Authors ="S.R.Ramya A. Reyana"}
  • null