We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

A Multi-purpose Dual Watermarking Scheme

by Jobin Abraham
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 77 - Number 8
Year of Publication: 2013
Authors: Jobin Abraham
10.5120/13411-1066

Jobin Abraham . A Multi-purpose Dual Watermarking Scheme. International Journal of Computer Applications. 77, 8 ( September 2013), 1-4. DOI=10.5120/13411-1066

@article{ 10.5120/13411-1066,
author = { Jobin Abraham },
title = { A Multi-purpose Dual Watermarking Scheme },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 77 },
number = { 8 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume77/number8/13411-1066/ },
doi = { 10.5120/13411-1066 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:49:41.810215+05:30
%A Jobin Abraham
%T A Multi-purpose Dual Watermarking Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 77
%N 8
%P 1-4
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposes an image watermarking scheme that cater to multiple purposes of copyright protection and fingerprinting. For fingerprinting images, an ID number or a unique code pertaining to the buyer is hidden with in the digital resources at the time of resource transfer. For copyright protection of the resource, a unique signature such as a logo of the owner creator is integrated imperceptibly. In the proposed method these embedding operations are performed in the transform domain using discrete wavelet transform. The embedding algorithm works in two stages; hides the fingerprint using DWT inside the logo in the first stage and in second stage, integrates this secondary watermark in the base image to be watermarked.

References
  1. I. J Cox, Mat M Miller, Jeffrey A Bloom, "Watermarking Applications and their Properties", IEEE ITCC, March 2000.
  2. Xin Liao, Qiao-yan Wen, jie Zhang, "A Steganographic method for Digital Images with four-pixel differencing and modified LSB Substitution", 2011.
  3. Tribhuvan Kumar Tewari, Vikas Saxena, "An Improved and Robust DCT based Digital Image Watermarking Scheme", International Journal of Computer Applications, June2010.
  4. Wai Chu, "DCT based Image Watermarking using Subsampling", IEEE Transactions on Multimedia, pp 34-38, Vol. 5, March 2003.
  5. Vidyasagar m Potdar, Song Han, Elizabeth Chang, "A Survey of Digital Image Watermarking Techniques", IEEE Conference on Industrial Infomatics, pp 709-716, 2005.
  6. Latha Parameswaran, K Anbumani, "Content-based Watermarking for Image Authentication using Independent Component Analysis", Informatica 32 pp299-306, 2008.
  7. Qing Liu, Jun Ying, "Grayscale Image Digital Watermarking Technology Based on Wavelet Analysis", IEEE Symposium on Electrical & Electronics Engineering, 2012.
  8. Nagaraj V Dharwadkar, B. B Amberker, " An Efficient non-blind Watermarking Scheme for Color Images using Discrete Wavelet Transform", International Journal of Computer Applications, May 2010.
  9. Chi-Man Pun, Xiao-Chen Yuan, "Geometric Invariant Digital Image Watermarking Scheme Based on Histogram in DWT Domain", Journal of Multimedia, Vol. 5, pp 434-442, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Digital images watermarking copyright protection fingerprinting discrete wavelet transforms (DWT)