CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

GLCM and PCA Algorithm based Watermarking Scheme

by Jyoti Juneja, Avani Chopra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 48
Year of Publication: 2018
Authors: Jyoti Juneja, Avani Chopra
10.5120/ijca2018917261

Jyoti Juneja, Avani Chopra . GLCM and PCA Algorithm based Watermarking Scheme. International Journal of Computer Applications. 180, 48 ( Jun 2018), 24-29. DOI=10.5120/ijca2018917261

@article{ 10.5120/ijca2018917261,
author = { Jyoti Juneja, Avani Chopra },
title = { GLCM and PCA Algorithm based Watermarking Scheme },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2018 },
volume = { 180 },
number = { 48 },
month = { Jun },
year = { 2018 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number48/29562-2018917261/ },
doi = { 10.5120/ijca2018917261 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:03:56.803146+05:30
%A Jyoti Juneja
%A Avani Chopra
%T GLCM and PCA Algorithm based Watermarking Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 48
%P 24-29
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital watermarking is the mechanism by which security is provided to the sensitive data which is stored in the databases in the form images. In this process, all the essential features of an image is extracted and calculated after which this original image is implanted into the watermark image. In this research paper, GLCM and PCA algorithm has been utilized in order to improve the working capability of the neural network based watermarking technique. Therefore, the features of the original images are extracted with the help of GLCM and PCA algorithm. The scaling factor defines the output of the PCA algorithm which is used for implementation. On the basis of simulation results it is concluded that proposed algorithm performs well in terms of PSRN and MSE and MATLAB tool is used for the implementation of the proposed method.

References
  1. Kashyap, Nikita, and G. R. Sinha. "Image watermarking using 3-level discrete wavelet transforms (DWT)." International Journal of Modern Education and Computer Science (IJMECS) 4.3 (2012): 50.
  2. T. Serre, L. Wolf, S. Bileschi, M. Riesenhuber, and T. Poggio, “Object recognition with cortex-like mechanisms,” IEEE Trans. on PAMI vol. 29, no. 3, 2007.
  3. J.-K. Kamarainen, V. Kyrki, and H. K ¨ alvi¨ ainen, “Invariance properties of Gabor filter based features - overview and applications,” IEEE Trans. on Image Processing, vol. 15, no. 5, pp. 1088–1099, 2006.
  4. D. Gabor, “Theory of communication,” Journal of Institution of Electrical Engineers, vol. 93, pp. 429–457, 1946.
  5. J. Ilonen, J.-K. Kamarainen, P. Paalanen, M. Hamouz, J. Kittler, and H. K¨ alvi¨ ainen, “Image feature localization by multiple hypothesis testing of Gabor features,” IEEE Trans. on Image Processing, vol. 17, no. 3, pp. 311–325, 2008
  6. Singh, Surya Pratap, Paresh Rawat, and Sudhir Agrawal, A robust watermarking approach using DCT-DWT, International Journal of Emerging Technology and Advanced Engineering (ISSN 2250-2459, Volume 2, Issue 8 (2012).
  7. Al-Haj, Ali, Combined DWT-DCT digital image watermarking, Journal of computer science 3, no. 9 (2007): 740.
  8. Mansouri, A., A. Mahmoudi Aznaveh, and F. Torkamani Azar. "SVD-based digital image watermarking using complex wavelet transform." Sadhana 34, no. 3 (2009): 393-406.
  9. Lu, Chun-Shien, and H-YM Liao. Multipurpose watermarking for image authentication and protection, Image Processing, IEEE Transactions on 10, no. 10 (2001): 1579-1592.
  10. Martin, Alberto, and Sabri Tosunoglu, Image processing techniques for machine vision, Miami, Florida (2000).
  11. Chaturvedi, Navnidhi, and S. J. Basha. Comparison of Digital Image watermarking Methods DWT & DWT-DCT on the Basis of PSNR, image 2 (2012): 1.
  12. D. Gabor, “Theory of communication,” Journal of Institution of Electrical Engineers, vol. 93, pp. 429–457, 1946.
  13. J. Ilonen, J.-K. Kamarainen, P. Paalanen, M. Hamouz, J. Kittler, and H. K¨ alvi¨ ainen, “Image feature localization by multiple hypothesis testing of Gabor features,” IEEE Trans. on Image Processing, vol. 17, no. 3, pp. 311–325, 2008.
  14. J. Ilonen, J.-K. Kamarainen, and H. K ¨ alvi¨ ainen, “Fast extraction of multi-resolution gabor features,” in 14th Int Conf on Image Analysis and Processing (ICIAP), 2007, pp. 481–486.
  15. E. Simoncelli, W. Freeman, E. Adelson, and D. Heeger, “Shiftable multiscale transforms,” IEEE Transactions on Information Theory, vol. 38,no. 2, pp. 587–607, 1992.
Index Terms

Computer Science
Information Sciences

Keywords

GLCM PCA PSRN MSE Scaling Factor