CFP last date
20 January 2025
Reseach Article

A Secure Authentication Technique using Edge Detection in Watermarking

by Ranjeet Kumar Singh, Shikha Gupta, Deepak Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Number 11
Year of Publication: 2013
Authors: Ranjeet Kumar Singh, Shikha Gupta, Deepak Gupta
10.5120/9976-4805

Ranjeet Kumar Singh, Shikha Gupta, Deepak Gupta . A Secure Authentication Technique using Edge Detection in Watermarking. International Journal of Computer Applications. 61, 11 ( January 2013), 41-44. DOI=10.5120/9976-4805

@article{ 10.5120/9976-4805,
author = { Ranjeet Kumar Singh, Shikha Gupta, Deepak Gupta },
title = { A Secure Authentication Technique using Edge Detection in Watermarking },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 61 },
number = { 11 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 41-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume61/number11/9976-4805/ },
doi = { 10.5120/9976-4805 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:08:52.558553+05:30
%A Ranjeet Kumar Singh
%A Shikha Gupta
%A Deepak Gupta
%T A Secure Authentication Technique using Edge Detection in Watermarking
%J International Journal of Computer Applications
%@ 0975-8887
%V 61
%N 11
%P 41-44
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital watermarking is a way of authentication of multimedia objects i. e. , videos, images and texts too. Watermarking functions are used not only for authentication, but also protects the data against nasty intent. In this paper the author uses the watermarking function which is purely based on the discrete cosine transform (DCT). Here the image, which is to be watermarked in the original image, is obtained from the edges of the original image using edge detection technique. On adjusting the frequency of spatial domain of the corresponding pixel in the image, the watermark image is concealed. The experimental results be evidence for this kind of the method and makes result strong robust. Here this method is bound to image only.

References
  1. C. Cachin, "An Information-Theoretic Model for Steganography", Proceedings of 2nd Workshop on Information Hiding, MIT Lab. for Computer Science, May 1998.
  2. Roberts, L. G. , Machine Perception of Three-Dimensional Solids, in optical and Electro-Optical Information Processing ( J. Tippett, Ed. ), 159-197, MIT Press, 1965.
  3. Sobel, I. , An Isotropic 3×3 Gradient Operator, Machine Vision for Three – Dimensional Scenes, Freeman, H. , Academic Pres, NY, 376-379, 1990.
  4. Sobel, I. , Camera Models and Perception, Ph. D. thesis, Stanford University, Stanford, CA, 1970.
  5. Prewitt, J. , Object Enhancement and Extraction, Picture Processing and Psychopictorics (B. Lipkin and A. Rosenfeld, Ed. ), NY, Academic Pres, 1970.
  6. Canny, J. , A Computational Approach to Edge Detection, IEEE Transactions on Pattern Analysis anad Machine Intelligence, 8, 679-700, 1986.
  7. L. G. Roberts, "Machine perception of three-dimensional solids," in Optical and Electro-Optical Information Processing,D. A. Berkowitz, L. C. Clapp, C. J. Koester, and A. Vanderburgh, Jr. , Eds. Cambridge, MA: MIT Press, 1965, pp. 159–197.
  8. O. R. Vincent, O. Folorunso, "A Descriptive Algorithm for Sobel Image Edge Detection", Proceedings of Informing Science & IT Education Conference (InSITE), pp. 97-107, 2009.
  9. S. S. Bedi, Ashwani Kumar, and Piyush Kapoor, "Robust Secure SVD Based DCT – DWT Oriented Watermarking Technique for Image Authentication", International Journal of the Computer, the Internet and Management, Vol. 17, pp. 46. 1-46. 7, March 2009
  10. Saraju P. Mohanty, K. R. Ramakrishnan, and Mohan S Kankanhalli, "A DCT Domain VisibleWatermarking Technique for Images", Indian Institute of Science, Bangalore, India.
  11. Mei Jiansheng, Li Sukang1 and Tan Xiaomei, "A Digital Watermarking Algorithm Based On DCT and DWT", International Symposium on Web Information Systems and Applications (WISA'09), pp 104-107, May 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Watermarking DCT Edge detection