We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Multilevel Image based Data Security using Combined Approach of Lsb_Dct Watermarking

by Ranjeet Kumar Singh, Deepak Gupta, Santosh Kumar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 16
Year of Publication: 2013
Authors: Ranjeet Kumar Singh, Deepak Gupta, Santosh Kumar Singh
10.5120/13951-1392

Ranjeet Kumar Singh, Deepak Gupta, Santosh Kumar Singh . Multilevel Image based Data Security using Combined Approach of Lsb_Dct Watermarking. International Journal of Computer Applications. 80, 16 ( October 2013), 10-14. DOI=10.5120/13951-1392

@article{ 10.5120/13951-1392,
author = { Ranjeet Kumar Singh, Deepak Gupta, Santosh Kumar Singh },
title = { Multilevel Image based Data Security using Combined Approach of Lsb_Dct Watermarking },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 16 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 10-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number16/13951-1392/ },
doi = { 10.5120/13951-1392 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:54:41.497616+05:30
%A Ranjeet Kumar Singh
%A Deepak Gupta
%A Santosh Kumar Singh
%T Multilevel Image based Data Security using Combined Approach of Lsb_Dct Watermarking
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 16
%P 10-14
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital watermarking is a method which is used to verify texts, image, video etc. Watermarking Technique is not only used for Authentication, it's also used for security, image protection, rights of documents. In this perspective experiment we used edge detection technique in watermarking for the purpose of highly authentication of image. Here we used combined approach of LSB-DCT watermarking for multilevel image based data security, in LSB-DCT approach author used edge of original image as a watermark image which is calculated by sobel edge detection technique this watermark is embedded on original image with the help of LSB watermark approach. After the first watermarking process is completed author embedded next watermark on the original image with the help of DCT Watermarking. In this experiments author explain effect of noise on dual watermarked image with the help of PSNR, SNR and Correlation coefficient.

References
  1. C. Cachin "An Information-Theoretic Model for Steganography", Proceedings of 2nd Workshop on Information Hiding, MIT Lab. for Computer Science, May 1998.
  2. R. Gonzalez and Woods, "Digital Image Processing", 1998.
  3. Q. Zhang, Z. Ji, W. Zhu, J. Lu and Y. -Q. Zhang, "Joint power control and source-channel coding for video communication over wireless," IEEE VTC'01, New Jersey, October 2001
  4. Mandhani , N. K. (2004), "Watermarking Using Decimal Sequences", Master thesis submitted to the Graduate Faculty of the Louisiana State University, India
  5. SarajuP. Mohanty, K. R. Ramakrishnan, Mohan Kankanhalli" A Dual Watermarking Technique for Images"
  6. Baisa L. Gunjal , R. R. Manthalkar" an overview of transform domain robust digital image watermarking algorithms" Journal of Emerging Trends in Computing and Information Sciences, ISSN 2079-8407 Volume 2 No. 1
  7. Abdullah Bamatraf, Rosziati Ibrahim and Mohd. NajibMohd. Salleh" A New Digital Watermarking Algorithm Using Combination of Least Significant Bit (LSB) and Inverse Bit" journal of computing, volume 3, issue 4, april 2011, issn 2151-9617
  8. Tribhuwan Kumar Tewari, VikasSaxena" An Improved and Robust DCT based Digital Image Watermarking Scheme" International Journal of Computer Applications (0975 – 8887) Volume 3– No. 1, June 2010.
  9. SOBEL, I. , An Isotropic 3×3 Gradient Operator, Machine Vision for Three –Dimensional Scenes, Freeman, H. , Academic Pres, NY, 376-379, 1990.
  10. SOBEL, I. , Camera Models and Perception, Ph. D. thesis, Stanford University, Stanford, CA, 1970.
  11. PREWITT, J. , Object Enhancemet And Extraction, Picture Processing and Psychopictorics( B. Lipkin and A. Rosenfeld, Ed. ), NY, Academic Pres, 1970.
  12. ROBERTS, L. G. , Machine Perception of Three-Dimensional Solids, in optical and Electro-Optical Information Processing ( J. Tippett, Ed. ), 159-197, MIT Pres, 1965.
  13. CANNY, J. , A Computational Approach to Edge Detection, IEEE Transactions on Pattern Analysis and Machine Intelligence, 8, 679-700, 1986.
  14. ZIOU, D. And TABBONE, S. , Edge Detection Techniques - An Overview, Technical Report, No. 195, Dept. Math &Informatique, University de Sherbrooke, 1997.
  15. SHIGERU, A. , Consistent Gradient Operators, IEEE Transactions on Pattern Analysis and Machine Intelligence, 22 (3), 2000.
Index Terms

Computer Science
Information Sciences

Keywords

LSB DCT Watermarking Edge Detection PSNR SNR.