CFP last date
20 December 2024
Reseach Article

A Novel Digital Watermarking Algorithm using Random Matrix Image

by Mahimn Pandya, Hiren Joshi, Ashish Jani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Number 2
Year of Publication: 2013
Authors: Mahimn Pandya, Hiren Joshi, Ashish Jani
10.5120/9900-4481

Mahimn Pandya, Hiren Joshi, Ashish Jani . A Novel Digital Watermarking Algorithm using Random Matrix Image. International Journal of Computer Applications. 61, 2 ( January 2013), 18-21. DOI=10.5120/9900-4481

@article{ 10.5120/9900-4481,
author = { Mahimn Pandya, Hiren Joshi, Ashish Jani },
title = { A Novel Digital Watermarking Algorithm using Random Matrix Image },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 61 },
number = { 2 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 18-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume61/number2/9900-4481/ },
doi = { 10.5120/9900-4481 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:07:59.717171+05:30
%A Mahimn Pandya
%A Hiren Joshi
%A Ashish Jani
%T A Novel Digital Watermarking Algorithm using Random Matrix Image
%J International Journal of Computer Applications
%@ 0975-8887
%V 61
%N 2
%P 18-21
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The availability of bandwidth for internet access is sufficient enough to communicate digital assets. These digital assets are subjected to various types of threats. [19] As a result of this, protection mechanism required for the protection of digital assets is of priority in research. The threat of current focus is unauthorized copying of digital assets which give boost to piracy. This under the copyright act is illegal and a robust mechanism is required to curb this kind of unauthorized copy. To safeguard the copyright digital assets, a robust digital watermarking technique is needed. The existing digital watermarking techniques protect digital assets by embedding a digital watermark into a host digital image. This embedding does induce slight distortion in the host image but the distortion is usually too small to be noticed. At the same time the embedded watermark must be robust enough to with stand deliberate attacks. There are various techniques of digital watermarking but researchers are making constant efforts to increase the robustness of the watermark image. The layered approach of watermarking based on Huffman coding [5] can soon increase the robustness of digital watermark. [11] Ultimately, increasing the security of copyright of protection. The proposed work is in similar direction where in RMI (Random Matrix Image) is used in place of Huffman coding. This innovative algorithm has considerably increased the robustness in digital watermark while also enhancing security of production.

References
  1. W. C. H. Fung, G. Antonio, and W. Godoy, "A Review Study on Image Digital Watermarking," The Tenth International Conference on Networks- ICN, pp. 24–28, 2011.
  2. X. Wu and Zhi-Hong Guan, "A novel digital watermark algorithm based on chaotic maps," Physics Letters A, Elsevier, vol. 365, no. 5–6, pp. 403–406, Jun. 2007.
  3. Raman, S. (2010). Image Processing Using Scilab, 1–29.
  4. Galda, H. (2011). Image Processing with Scilab and Image Processing Design Toolbox.
  5. D. L. Bhaskari, P. S. Avadhani, and M. Viswanath, "A Layered Approach for Watermarking In Images Based On Huffman Coding," International Journal on Computer Science and Engineering, vol. 02, no. 02, pp. 149–154, 2010.
  6. I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Second Edi. Morgan Kaufmann Publishers, Elsevier, 2008.
  7. R. L. de Queiroz, "Processing JPEG-compressed images and documents. ," IEEE transactions on image processing?: a publication of the IEEE Signal Processing Society, vol. 7, no. 12, pp. 1661–72, Jan. 1998.
  8. M. Barni, F. Bartolini, V. Cappellini, and A. Piva, "A DCT-domain system for robust image watermarking," Signal Processing, vol. 66, no. 3, pp. 357–372, May 1998.
  9. D. Kundur and D. Hatzinakos, "Improved robust watermarking through attack characterization. ," Optics express, vol. 3, no. 12, pp. 485–90, Dec. 1998.
  10. X. Qi and J. Qi, "A robust content-based digital image watermarking scheme," Signal Processing, Elsevier, vol. 87, no. 6, pp. 1264–1280, Jun. 2007.
  11. H. Kostopoulos, S. Kandiliotis, I. Kostopoulos, and M. Xenos, "A Digital Image Watermarking Technique Using Modulated Pascal ' S Triangles," International Conference Signal Processing, Pattern Recognition & Applications, pp. 82–86, 2003.
  12. M. A. Suhail, M. S. Obaidat, S. S. Ipson, and B. Sadoun, "A comparative study of digital watermarking in JPEG and JPEG 2000 environments," Information Sciences, Elsevier, vol. 151, pp. 93–105, May 2003.
  13. M. Sreerama Murty, D. Veeraiah, and a Srinivas Rao, "Digital Signature and Watermark Methods For Image Authentication using Cryptography Analysis," Signal & Image Processing?: An International Journal, vol. 2, no. 2, pp. 170–179, Jun. 2011.
  14. D. Kirovski and F. a. P. Petitcolas, "Blind pattern matching attack on watermarking systems," IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 1045–1053, Apr. 2003.
  15. V. M. Potdar, S. Han, and E. Chang, "A survey of digital image watermarking techniques," INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005. , no. Indin, pp. 709–716, 2005.
  16. J. -L. Liu, D. -C. Lou, M. -C. Chang, and H. -K. Tso, "A robust watermarking scheme using self-reference image," Computer Standards & Interfaces,Elsevier, vol. 28, no. 3, pp. 356–367, Jan. 2006.
  17. P. L. Lin, C. -K. Hsieh, and P. -W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, vol. 38, no. 12, pp. 2519–2529, Dec. 2005.
  18. G. Bhatnagar and B. Raman, "A new robust reference watermarking scheme based on DWT-SVD," Computer Standards & Interfaces, Elsevier, vol. 31, no. 5, pp. 1002–1013, Sep. 2009.
  19. S. Radharani and M. L. Valarmathi, "A Study on Watermarking Schemes for Image Authentication," International Journal of Computer Applications, vol. 2, no. 4, pp. 24–32, May 2010.
  20. T. Furon and P. Duhamel, "An asymmetric watermarking method," IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 981–995, Apr. 2003.
  21. M. Wu and B. Liu, "Attacks on digital watermarks," Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No. CH37020), vol. 2, pp. 1508–1512.
  22. C. -C. Lai, H. -C. Huang, and Cheng-Chih Tsai, "A Digital Watermarking Scheme Based On Singular Value Decomposition And Micro-Genetic Algorithm" International Journal of Innovative Computing, Information and Control, vol. 5, no. 7, p. 1867—1873, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Watermarking Random Matrix Image Image Processing Embedding Extraction