CFP last date
20 January 2025
Reseach Article

Semi-Fragile Watermarking Scheme based on Feature in Dwt Domain

by Chaitanya Kommini, Kamalesh Ellanti, E. Harshavardhan Chowdary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 28 - Number 3
Year of Publication: 2011
Authors: Chaitanya Kommini, Kamalesh Ellanti, E. Harshavardhan Chowdary
10.5120/3370-4653

Chaitanya Kommini, Kamalesh Ellanti, E. Harshavardhan Chowdary . Semi-Fragile Watermarking Scheme based on Feature in Dwt Domain. International Journal of Computer Applications. 28, 3 ( August 2011), 42-46. DOI=10.5120/3370-4653

@article{ 10.5120/3370-4653,
author = { Chaitanya Kommini, Kamalesh Ellanti, E. Harshavardhan Chowdary },
title = { Semi-Fragile Watermarking Scheme based on Feature in Dwt Domain },
journal = { International Journal of Computer Applications },
issue_date = { August 2011 },
volume = { 28 },
number = { 3 },
month = { August },
year = { 2011 },
issn = { 0975-8887 },
pages = { 42-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume28/number3/3370-4653/ },
doi = { 10.5120/3370-4653 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:14:35.363559+05:30
%A Chaitanya Kommini
%A Kamalesh Ellanti
%A E. Harshavardhan Chowdary
%T Semi-Fragile Watermarking Scheme based on Feature in Dwt Domain
%J International Journal of Computer Applications
%@ 0975-8887
%V 28
%N 3
%P 42-46
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In DWT domain, A novel semi-fragile watermarking is the scheme for the purpose of authenticating the image and also tamper localization. In this scheme, to generate the watermark, we extract the content-based image features in the wavelet domain in particular from the approximation subband. Later, we embed the watermark into the middle subband. Then, the main goals of this scheme i.e., image authentication and tamper localization are achieved by comparing the matrices of extracted content based image with the extracted watermark. It is proven that this proposed scheme is very robust for common content preserving image processing like noise-adding and lossy JPEG compression through experimental results. The impact of this scheme to malicious tamper in images is fragile. The proposed scheme is very accurate in detecting the tamper location.

References
  1. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking, New York: Academic Press, 2002.
  2. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, pp. 1673-1687, December 1997.
  3. S. Walton, “Authentication for a slippery new age,” Dr. Dobb’s Journal, vol. 20, no. 4, pp. 18-26, April 1995.
  4. C. Lu and H. Liao, “Multipurpose watermarking for image authentication and protection,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1579-1592, October 2001.
  5. J. Wu and F. Lin, “Image authentication based on digital watermarking,” Chinese Journal of Computers, vol. 27, no. 9, pp. 1153-1161, September 2004.
  6. X. Wang, “A novel adaptive semi-fragile watermarking scheme based on image content,” ACTA AUTOMATICA SINICA, vol. 33, no. 4, pp. 361-366, 2007.
  7. D. Zhang and Z. Pan, “A contour-based semi fragile image watermarking algorithm in DWT domain,” Proc. ETCS, vol. 3, pp. 228- 231, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Semi-fragile Watermarking Watermark Tamper localization Image authentication