We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Reversible Blind HF Domain Contourlet Watermarking for Authentication of Digital Images

by R.Velumani, V.Seenivasagam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 24 - Number 4
Year of Publication: 2011
Authors: R.Velumani, V.Seenivasagam
10.5120/2938-3898

R.Velumani, V.Seenivasagam . Reversible Blind HF Domain Contourlet Watermarking for Authentication of Digital Images. International Journal of Computer Applications. 24, 4 ( June 2011), 22-29. DOI=10.5120/2938-3898

@article{ 10.5120/2938-3898,
author = { R.Velumani, V.Seenivasagam },
title = { Reversible Blind HF Domain Contourlet Watermarking for Authentication of Digital Images },
journal = { International Journal of Computer Applications },
issue_date = { June 2011 },
volume = { 24 },
number = { 4 },
month = { June },
year = { 2011 },
issn = { 0975-8887 },
pages = { 22-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume24/number4/2938-3898/ },
doi = { 10.5120/2938-3898 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:10:06.592378+05:30
%A R.Velumani
%A V.Seenivasagam
%T Reversible Blind HF Domain Contourlet Watermarking for Authentication of Digital Images
%J International Journal of Computer Applications
%@ 0975-8887
%V 24
%N 4
%P 22-29
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital images are widely used in defense, e-governance, medicine, banking, insurance, healthcare, scientific research, weather forecasting etc. Varied applications in these fields demand the secure exchange of digital images that serve as valid document evidences for legal procedures and for clinical, scientific and forensic analysis. These images are susceptible to intentional or accidental attacks during transit which may lead to the loss of confidentiality and integrity of the content and identity of the sender. This paper presents a reversible blind watermarking scheme for authentication of digital images with a binary logo. It exploits the contourlet domain for watermarking as it preserves the smooth contours and edges even after multiple levels of decomposition. The proposed watermarking algorithm embeds the watermark in an arbitrary sparse High Frequency (HF) subband; the watermark extraction algorithm follows a unique hard thresholding approach for blind watermark extraction. The system applies a triangular number generating function to strengthen the binary watermark and employs Arnold transform for watermark synchronization. Experimental results show that the proposed system provides good fidelity of watermarked and recovered images and robustness to certain geometrical and non geometrical attacks.

References
  1. Honsinger, C., Jones, P., Rabbani, P. and Stoffel, M. 1999. Lossless recovery of an original image containing embedded data,US Patent application, Docket No: 77102/E-D.
  2. Fridrich, J., Goljan, M. and Du, R.2001. Invertible Authentication, Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, California, January 2326.
  3. Tian, J., 2002. Reversible watermarking by difference expansion, Proceedings of Workshop on Multimedia and Security.
  4. Li, H. F. and Wen, J. T. 2006. A Novel Blind Watermarking Algorithm in Contourlet Domain, IEEE International Conference on Pattern Recognition.
  5. Do, M., Vetterli, M., 2002. Contourlets: a directional multi resolution image representation, IEEE International Conference on Image Processing, Rochester, vol. 1, pp. 357–360.
  6. Dr.Peterson.2001.Triangular Number. http://mathforum.org/library/drmath/view/56036.html
  7. Gabriel Peterson.1997.Arnold’s Cat Map,Math45-Linear algebra http://online.redwoods.cc.ca.us/instruct/darnold/maw/catmap.htm
  8. Duncan, D., Po, Y. and Minh N. Do, 2006. Directional Multiscale Modeling of Image Using the Contourlet Transform, IEEE Transactions On Image Processing, Vol. 15, No. 6.
  9. Sahraeian, S. M. E., Akhaee, M. A. , Hejazi, S. A. and Marvasti, F. 2008. Contourlet based image watermarking using optimum detector in the noisy environment, IEEE ICIP, pp 429-432.
  10. Cox, I., Kilian, J., Leighton, F.T. and Shamoon, T. 1997 Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol. 6, pp. 1673-1687.
  11. Song, H., Yu, S., Yang, X., Song, L. and Wang, C. 2008. Contourlet-based image adaptive watermarking, Elsevier Signal Processing: Image Communication 162–178.
  12. Elham Salahi, Shahram Moin, M. and Ahmad Salahi, 2008. A New Visually Imperceptible and Robust Image Watermarking Scheme in Contourlet Domain, IEEE IIH-MSP, pp 457-460.
  13. Shereen Ghannam and Fatma Abou-Chadi E. Z., 2009. Enhancing Robustness Of Digital Image Watermarks Using Contourlet Transform, IEEE ICIP 3645-3648.
  14. Athanasios Nikolaidis and Ioannis Pitas.2000. Proceedings of IEEE International Symposium on Circuits and Systems, ISCAS 2000 Geneva.
  15. Wu, X. and Guan, Z. H, 2007. A novel digital watermark algorithm based on chaotic maps, Physics Letters A, 365, Jun. 2007, 403-406.
  16. Lei-Da Li, Bao-Long Guo,2009. Localized image watermarking in spatial domain resistant to geometric Attacks, International Journal of Electronics and Communications, pp 123-131.
  17. Zhou Wang, 2002. A Universal Image Quality Index, IEEE Signal Processing Letters, vol. 9, pp. 81–84.
  18. Rabbani, H., Vafadust M. and Gazor, S., 2007. Medical Volume Noise Reduction Employing a Laplace Distribution with Local Variance for Modeling Contourlet Coefficients, Proceedings of the 4th IEEE-EMBS International Summer School and Symposium on Medical Devices and Biosensors.
  19. Jayalakshmi, M., Merchant S. N. and Desai, U. B. 2006. Digital Watermarking in Contourlet Domain, Proceedings of the 18th International Conference on Pattern Recognition (ICPR2006), vol.3, pp.861-864.
  20. Shelby Pereira, Sviatoslav Voloshynovskiy, Maribel Madueño, Stéphane Marchand-Maillet and Thierry Pun, 2001. Second generation benchmarking and application oriented evaluation, Information Hiding Workshop, Pittsburgh, PA, USA.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication blind watermarking reversible watermarking triangular number Arnold transform