We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Compound Blind Digital Watermarking Technique for Image Authentication and Integrity using DCT and VC

by Inder Pratap, Saroj Hiranwal, N. S. Yadav
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 83 - Number 6
Year of Publication: 2013
Authors: Inder Pratap, Saroj Hiranwal, N. S. Yadav
10.5120/14455-2723

Inder Pratap, Saroj Hiranwal, N. S. Yadav . A Compound Blind Digital Watermarking Technique for Image Authentication and Integrity using DCT and VC. International Journal of Computer Applications. 83, 6 ( December 2013), 44-48. DOI=10.5120/14455-2723

@article{ 10.5120/14455-2723,
author = { Inder Pratap, Saroj Hiranwal, N. S. Yadav },
title = { A Compound Blind Digital Watermarking Technique for Image Authentication and Integrity using DCT and VC },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 83 },
number = { 6 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 44-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume83/number6/14455-2723/ },
doi = { 10.5120/14455-2723 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:58:42.025389+05:30
%A Inder Pratap
%A Saroj Hiranwal
%A N. S. Yadav
%T A Compound Blind Digital Watermarking Technique for Image Authentication and Integrity using DCT and VC
%J International Journal of Computer Applications
%@ 0975-8887
%V 83
%N 6
%P 44-48
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper we propose a multiple digital watermarking scheme using DCT and VC to achieve both image authentication and integrity. We used two watermarks for embedding in to the host image. Unlike traditional watermarking schemes, the second watermarks are not embedded directly into the host image. The proposed technique proves that it is resilient to several attacks.

References
  1. Braudaway G. W. , K. A. Magerlein, and F. Mintzer. 1996, Protecting Publicly-available Images with a Visible Image Watermark, in the Proceedings of SPIE, 2659, 126–133.
  2. Cox, I. J. ,M. L. Miller, and J. A. Bloom. 2002, Digital Watermarking, New York: Morgan Kaufmann Publishers Inc. , San Fransisco, CA.
  3. Kutter M. and F. A. P. Petitcolas. 1999, A fair benchmark for image watermarking systems, In Proceedings of Security and Watermarking of Multimedia Contents, 226–239.
  4. Cox, I. J. , Kilian, J. , Leighton, T. , and Shamoon, T. . 1997, Secure Spread Spectrum Watermarking for Multimedia, In IEEE Transactions on Image Processing, 6(12), pp. 1673?1687.
  5. M. Naor and A. Shamir. Visual cryptography. In EUROCRYPT '94, Springer-VerlagBerlin, volume LNCS 950, pages 1{12, 1995.
  6. S. F. Tu and C. S. Hsu, "A BTC-based watermarking scheme for digital images," Information & Security: An International Journal, vol. 15, no. 2, 2004, pp. 214-226.
Index Terms

Computer Science
Information Sciences

Keywords

Digital watermarking visual cryptography DCT