We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Comparative Study of Various Transformations in Robust Watermarking Algorithms

by S. Poongodi, B. Kalaavathi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 58 - Number 11
Year of Publication: 2012
Authors: S. Poongodi, B. Kalaavathi
10.5120/9328-3633

S. Poongodi, B. Kalaavathi . Comparative Study of Various Transformations in Robust Watermarking Algorithms. International Journal of Computer Applications. 58, 11 ( November 2012), 36-42. DOI=10.5120/9328-3633

@article{ 10.5120/9328-3633,
author = { S. Poongodi, B. Kalaavathi },
title = { Comparative Study of Various Transformations in Robust Watermarking Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 58 },
number = { 11 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 36-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume58/number11/9328-3633/ },
doi = { 10.5120/9328-3633 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:02:13.084005+05:30
%A S. Poongodi
%A B. Kalaavathi
%T Comparative Study of Various Transformations in Robust Watermarking Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 58
%N 11
%P 36-42
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the digital world, that is currently evolving at such a rapid pace, intellectual copyright protection is becoming increasingly important. This is due to digital data being particularly simple to copy and resell without any loss of quality. Digital representation and distribution of data has increased the potential for misuse and theft and thus gives rise to problems associated with copyright protection and the enforcement of these rights. The main technical approaches to address the challenge of intellectual copyright protection are digital watermarking techniques. The spread spectrum technology has become an important technique that is not only widely used for still image and video watermarking, but also used for audio watermarking. A robust watermarking algorithm to watermark JPEG2000 compressed and encrypted images. The encryption algorithm is proposed to use a stream cipher. While the proposed technique embeds watermark(the transmission of question paper in online for a secure manner) in the compressed-encrypted domain, the extraction of watermark can be done in the decrypted domain. Based upon this application a study made for this transformation such as multiwavelet, contourlet and lifting scheme decomposition and also compare the characteristics of these transformations using LSB technique for various file formats and the spread-spectrum watermarking (SSW) technology. Experimental results show the various characteristics of different transforms, the embedding capacity,robustness, perceptual quality and security of the proposed algorithm, and their efficiency with various image formats in watermarking using LSB algorithm and spread spectrum.

References
  1. Hamid soltanian-zadeh, Farshid Rafiee-Rad,SiamakpoulabdollahnejadD' Comparision of multiwavelet, wavelet,haralick and shape features for microcalcification classification in mammograms'2004 pattern recognition society, published by Elsevier Ltd.
  2. Yuanhaishao, Wei chen, Chan liu 'Multiwavelets-based digital watermarking with support vector machine Technique ' Proceedings of control and decision conference,2008. CCDC 2008. chinese 2-4 july 2008 page(s):4557-45561
  3. M. N. Do and M. Vetterli. 'The Contourlet transform: An efficient directional multiresolution image representation'. IEEE Trans. on Image Processing, 14(12):2091–2106, Dec. 2005
  4. M. N. Do and M. Vetterli,, 'Contourlet: a directional multiresolution image representation' Proceedings of ICIP, vol. 1, 2002, pp. 357-360.
  5. Matej Kseneman1, Dušan Gleich1, Peter Planinši?, VladoKitanovski and DimitarTaskovski 'Comparison between Different Lifting Scheme Algorithms' Proceedings of systems,signals and image processing,2008 IWSSIP 2008. 15th international conference on 25-28 June 2008. page(s): 327-330.
  6. Zheng-weishen, Wei-wei Liao, Ya-nan shen 'Blind watermarking algorithm based on henon chaos system and lifting scheme wavelet'Proceedings of the 2009 International Conference on Wavelet Analysis and Pattern Recognition, Baoding, 12-15 July 2009
  7. Jinsheng Xiao, Benshun Yi, Yuan Yao 'Wavelets based on lifting scheme and its application on image Processing' Proceedings of 2008 International Symposium on Knowledge Acquisition and Modeling.
  8. A. AliceBlessie, J. Nalini and S. C. Ramesh, "Image Compression Using Wavelet Transform Based on the Lifting Scheme and its Implementation" International Journal of Computer Science Issues IJCSI, Vol. 8, Issue 3, No. 1, May 2011,page(s) : 1694-0814.
  9. F. Battisti, M. Cancellaro, G. Boato, M. Carli, and A. Neri, "Joint watermarkingand encryption of color images in the Fibonacci-Haar domain,"EURASIP J. Adv. Signal Process. , vol. 2009.
  10. M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. De Natale, and A. Neri, "A joint digital watermarking and encryption method," in Proc. SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 2008, vol. 6819, pp. 68 191C–68 191C.
  11. J. Prins, Z. Erkin, and R. Lagendijk, "Anonymous fingerprinting withrobust QIM watermarking techniques," EURASIP J. Inf. Security, vol. 2007.
  12. Z. Li, X. Zhu, Y. Lian, and Q. Sun, "Constructing secure contentdependentwatermarking scheme using homomorphic encryption," inProc. IEEE Int. Conf. Multimedia and Expo, 2007, pp. 627–630.
  13. Q. Sun, S. Chang, M. Kurato, and M. Suto, "A quantitive semi-fragileJPEG2000 image authentication system," in Proc. Int. Conf. ImageProcessing, 2002, vol. 2, pp. 921–924.
  14. R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digitalsignatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120–126, 1978.
  15. S. Goldwasser and S. Micali, "Probabilistic encryption," J. Comput. Syst. Sci. , vol. 28, no. 2, pp. 270–299, 1984.
  16. T. ElGamal, "A public key cryptosystem and a signature scheme basedon discrete logarithms," IEEE Trans. Inf. Theory, vol. 31, no. 4, pp. 469–472, Jul. 1985.
  17. P. Paillier, "Public-key cryptosystems based on composite degreeresiduosity classes," Lecture Notes in Computer Science, pp. 223–238,1999.
  18. M. Rabbani and R. Joshi, "An overview of the JPEG 2000 still imagecompression standard," Signal Process. : Image Commun. , vol. 17, no. 1, pp. 3–48, 2002. 716
Index Terms

Computer Science
Information Sciences

Keywords

Multiwavelets contourlet lifting scheme Spread spectrum SSW LSB PSNR NC