CFP last date
20 January 2025
Reseach Article

An Efficient Image Watermarking for Combination of RST Attacks

by Sheshang D. Degadwala, Sanjay Gaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 170 - Number 5
Year of Publication: 2017
Authors: Sheshang D. Degadwala, Sanjay Gaur
10.5120/ijca2017914837

Sheshang D. Degadwala, Sanjay Gaur . An Efficient Image Watermarking for Combination of RST Attacks. International Journal of Computer Applications. 170, 5 ( Jul 2017), 15-21. DOI=10.5120/ijca2017914837

@article{ 10.5120/ijca2017914837,
author = { Sheshang D. Degadwala, Sanjay Gaur },
title = { An Efficient Image Watermarking for Combination of RST Attacks },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2017 },
volume = { 170 },
number = { 5 },
month = { Jul },
year = { 2017 },
issn = { 0975-8887 },
pages = { 15-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume170/number5/28065-2017914837/ },
doi = { 10.5120/ijca2017914837 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:17:40.069758+05:30
%A Sheshang D. Degadwala
%A Sanjay Gaur
%T An Efficient Image Watermarking for Combination of RST Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 170
%N 5
%P 15-21
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays in network communication need to protect the transmission, also right to advance networking helpful fast Communication. Therefore, networking makers need to additional consistently handling illegal use of the data. In our proposed approach, first enter the user name and password then generate QR-code using zxing library that will converted in to the share using Binary Visual cryptography algorithm. Now share-2 is save in the database that is for future reference at receiver side. Now share-1 is embedding into the R-Component LL bit using of block DWT-SVD and Pseudo Zernike moment. After embedding add G, B Component. Now Color watermark image transfer from the network. As in network there are different attackers apply combination of Rotation, Scale and Translation attacks on the color watermark image. For recover the attacks first apply Pseudo Zernike moment, Surf feature on R-component they will extract the attacks pixel and recover the scale-angle using affine transformation. Now share-1 and another share-2 is in data base so we will apply EX-OR operation to get the QR-Code. The final QR-code is decoded and we get the user name and password. This research work can give a way for providing Security to Authority data and give protection against Attacks.

References
  1. Delphin Raj K. M and Nancy Victor “Secure QR Coding of Images Using the Techniques of Encoding and Encryption” International Journal of Applied Engineering Research ISSN 0973-4562 Volume 9, Number 12 (2014) pp. 2009-2017
  2. Ajish S And Rajasree R "Secure Mail Using Visual Cryptography (Smvc)" 5th Icccnt 2014 July 11- 13, 2014, Hefei, China
  3. Akshya Kumar Gupta And Mehul S Raval "A Robust And Secure Watermarking Scheme Based On Singular Values Replacement" SaDhana Vol. 37, Part 4, August 2012, Pp. 425–440.Indian Academy Of Sciences
  4. Ali Benoraira, Khier Benma hammed And Noureddine Boucenna "Blind Image Watermarking Technique Based On Differential Embedding In Dwt And Dct Domains" Springer 2015
  5. Angelina Espejel-Trujillo, Mariko Nakano-Miyatake, And Hector Perez-Meana "New Condition For Hierarchical Secret Image Sharing Scheme" 2014 Ieee 28th International Conference On Advanced Information Networking And Applications
  6. Aparna J R And Sonal Ayyappan "Comparison Of Digital Watermarking Techniques" International Conference For Convergence Of Technology - 2014
  7. Bharat Singh, Dr. V.S. Dhaka And Ravi Saharan "Blind Detection Attack Resistant Image Watermarking" Ieee 2014
  8. Carlo Blundo, Alfredo De Santis, Moni Naor "Visual Cryptography For Grey Level Images" Information Processing Letters 75 (2000) 255–259 Elsevier
  9. Chun-Hsiang Huang And Ja-Ling Wu "Attacking Visible Watermarking Schemes" Ieee Transactions On Multimedia, Vol. 6, No. 1, February 2004
  10. Dao-Shun Wang, Member, Ieee, Tao Song, Lin Dong, And Ching-Nung Yang "Optimal Contrast Grayscale Visual Cryptography Schemes With Reversing" Ieee Transactions On Information Forensics And Security, Vol. 8, No. 12, December 2013
  11. Deepa A K1 And Bento Benziger "Embedded Extended Visual Cryptography Scheme For Color Image Using Abc Algorithm" IEEE,Icsp 2014
  12. Dong Zheng, Yan Liu, And Jiying Zhao "A Survey Of Rst Invariant Image Watermarking Algorithms" IeeeCcece/Ccgei, Ottawa, May 2006
  13. Dr.M.A.Dorai rangaswamy And B.Padhmavathi "An Effective Blind Watermarking Scheme For Protecting Rightful Ownership Of Digital Images" Ieee 2009
  14. Farzin Ahammed T And M.K Sulaiman "A Master Share (2, N) Xor Based Visual Cryptography Scheme By Random Grids" 2015 International Conference On Control, Communication & Computing India (Iccc) , 19-21 November 2015 ,Trivandrum
  15. Hailiang Shi, Nan Wang, Zihui Wen, Yue Wang, Huiping Zhao, Yanmin Yang "An Rst Invariant Image Watermarking Scheme Using Dwt-Svd" Ieee 2012
  16. Kai-Hui Lee And Pei-Ling Chiu "Image Size Invariant Visual Cryptography For General Access Structures Subject To Display Quality Constraints" Ieee Transactions On Image Processing, Vol. 22, No. 10, October 2013
  17. Keta Raval And Sameena Zafar "Digital Watermarking With Copyright Authentication For Image Communication" 2013 International Conference On Intelligent Systems And Signal Processing (Issp)
  18. Lin Gao, Tiegang Gao, Guorui Sheng, And Shun Zhang "Robust Medical Image Watermarking Scheme With Rotation Correction" Springer 2014
  19. M. Sukumar Reddy And S. Murali Mohan "Visual Cryptography Scheme For Secret Image Retrieval" Ijcsns International Journal Of Computer Science And Network Security, Vol.14 No.6, June 2014
  20. Md. Maklachur Rahman "A Dwt, Dct And Svd Based Watermarking Technique To Protect The Image Piracy" International Journal Of Managing Public Sector Information And Communication Technologies (Ijmpict) Vol. 4, No. 2, June 2013
  21. Munesh Chandra, Shikha Pandel And Rama Chaudharl "Digital Watermarking Technique For Protecting Digital Images" Ieee 2010
  22. Pallavi Vijay Chavan ,Dr. Mohammad Atique And Dr. Latesh Malik "Signature Based Authentication Using Contrast Enhanced Hierarchical Visual Cryptography" 2014 Ieee Students’ Conference On Electrical, Electronics And Computer Science
  23. Ray Smith. Hybrid Page Layout Analysis via Tab-Stop Detection. Proceedings of the 10th international conference on document analysis and recognition. 2009.Was
  24. Shyong Jian Shyu And Ming Chiang Chen "Minimizing Pixel Expansion In Visual Cryptographic Scheme For General Access Structures" 2015 Ieee.
  25. Sy C. Nguyen, Kha H. Ha And Hoang M. Nguyen "An Improved Image Watermarking Scheme Using Selective Curvelet Scales" 2015 International Conference On Advanced Technologies For Communications (Atc)
  26. Vikas Saxena "Collusion Attack Resistant Watermarking Scheme For Images Using Dct" Ieee 2014
  27. Xiaotian Wu And Wei Sun "Extended Capabilities For Xor-Based Visual Cryptography" Ieee Transactions On Information Forensics And Security, Vol. 9, No. 10, October 2014
  28. Xiao-Yi Liu, Ming-Song Chen, And Ya-Li Zhang "A New Color Visual Cryptography Scheme With Perfect Contrast" 2013 8th International Conference On Communications And Networking In China (Chinacom)
  29. Young-Chang Hou "Visual Cryptography For Color Images" IEEE Pattern Recognition 36 (2003) 1619 – 1629
  30. Herbert Bay, Andreas Ess, Tinne Tuytelaars, Luc Van Gool," Speeded-Up Robust Features (SURF)", 2007, Elsevier
  31. Sheshang D. Degadwala & Dr. Sanjay Gaur “Privacy Preserving System Using Pseudo Zernike Moment with SURF & Affine Transformation on RST Attacks” Vol. 15 No. 4 April 2017 International Journal of Computer Science and Information Security.
Index Terms

Computer Science
Information Sciences

Keywords

QR Codes VCS RGB-Extract Block-DWT Surf Affine and Combinational RST attacks.