We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Secured Data Hiding Technique: Dual Watermarking

Published on December 2014 by Lekhashri H. Mahajan, Shailaja A. Patil
National Conference on Advances in Communication and Computing
Foundation of Computer Science USA
NCACC2014 - Number 3
December 2014
Authors: Lekhashri H. Mahajan, Shailaja A. Patil
cedeaea9-2e16-4765-982e-2b3f7cddbc70

Lekhashri H. Mahajan, Shailaja A. Patil . Secured Data Hiding Technique: Dual Watermarking. National Conference on Advances in Communication and Computing. NCACC2014, 3 (December 2014), 23-27.

@article{
author = { Lekhashri H. Mahajan, Shailaja A. Patil },
title = { Secured Data Hiding Technique: Dual Watermarking },
journal = { National Conference on Advances in Communication and Computing },
issue_date = { December 2014 },
volume = { NCACC2014 },
number = { 3 },
month = { December },
year = { 2014 },
issn = 0975-8887,
pages = { 23-27 },
numpages = 5,
url = { /proceedings/ncacc2014/number3/19413-2027/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Communication and Computing
%A Lekhashri H. Mahajan
%A Shailaja A. Patil
%T Secured Data Hiding Technique: Dual Watermarking
%J National Conference on Advances in Communication and Computing
%@ 0975-8887
%V NCACC2014
%N 3
%P 23-27
%D 2014
%I International Journal of Computer Applications
Abstract

Watermarking is a major technology to achieve copyright protection. The combinations of different mathematical tools such as Discrete Wavelet Transform (DWT) and Singular Value Decomposition(SVD) are used to embed watermark in the host image. In this dual watermarking scheme, to improve the robustness and protection of an image, number of watermarks embedded in the host image are two. These watermarks are known as primary and secondary watermark. The host image contains primary and secondary watermarks, in which secondary is embedded into primary and the resultant image is used as watermark for the host image. In this scheme, the images which are used as a watermark are visible gray scale images.

References
  1. R. Schyndel, A. Tirkel and C. Osborne, “A Digital Watermark”, Proceedings of International Conference on Image Processing, IEEE, Vol. 02, pp. 86-90, 1994.
  2. B. M. Macq and J. J. Quisquater, “Cryptology for digital TV broadcasting, Proceedings IEEE, Vol. 83, pp. 944-957, 1995.
  3. G. B. Rhoads, “Identification/authentication coding method and apparatus”, Word Intellectual Property Organization, WIPO, 1995.
  4. Bender et. al, “Techniques for data hiding”, IBM systems Journal, Vol. 35, pp. 313-336, 1996.
  5. J. Ruanaidh, W. J. Dowling and F. M. Bolad, “Watermarking digital Images for copyright protection”, Image Processing, Proceedings of International Conference on Digital Object Identifier, pp. 239-242. 1996.
  6. M. Swanson, B. Zhu and A. Tewfik, “Transparent Robust Image Watermarking”, Proceedings of International Conference on Image Processing, IEEE, Vol. 03, pp. 211-214, 1996.
  7. I. Pitas, “A Method for Signature Casting on Digital Images, International Conference on Image Processing, Vol. 3, pp. 215-218. September 1996.
  8. I. Cox, J. Kilian, F. Leighton and T. Shamoon,“Secure Spread Spectrum Watermarking for Multimedia”, IEEE Transactions on Image Processing, Vol. 06, pp. 1673-1687, 1997.
  9. X. Xia, C. Boncelet, and G. Arce, “A Multiresolution Watermark for Digital Images”, Proceedings of International Conference on Image Processing, IEEE, Vol. 01, pp. 548-551, 1997.
  10. D. Kundur and D. Hatzinakos, “A Robust Digital Image Watermarking Method Using Wavelet based Fusion”, Proceedings of International Conference on Image Processing, IEEE, Vol. 01, pp. 544-547, 1997.
  11. F. Bartolini, M. Barni, V. Cappellini and A. Piva, “Mask Building for Perceptually Hiding Frequency Embedded Watermarks”, Proceedings of International Conference on Image Processing, IEEE, Vol. 01, pp. 450-454, 1998.
  12. L. Marvel, C. Retter, and C. Boncelet, “Hiding Information in Images”, Proceedings of International Conference on Image Processing, IEEE, Vol. 02, pp. 396-398, 1998.
  13. V. S. Craver, N. Memon, B. Yeo, and M. Yeung, “Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications”, IEEE Journal on Selected Areas in Communications, Vol. 16, pp. 573-586, 1999.
  14. M. Ramkumar and A. N. Akansu, “A robust data hiding scheme for image using DFT”, Proc. International Conference on Image Processing, Vol. 02, pp. 211-215, 1999.
  15. M. Barni, F. Bartolini, A. De Rosa and A. Pivai, “Optimum Decoding and Detection of MultiplicativeWatermarks”, IEEE transactions, pp. 1118-1123, 2003.
  16. G. Bhatnagar, B. Raman and K. Swaminathan, “DWT-SVD based Dual Watermarking Scheme”, Proc. IEEE, Vol. 01, 2008.
  17. B. Jagadeesh, S. Srinivas Kumar and K. Raja Rajeswari, “A Genetic Algorithm Based Oblivious Image Watermarking Scheme using Singular Value Decomposition (SVD)”, 2009.
  18. Lintao Lv, Liang Hao ad Hui Lv, “Resisting RSTWatermarking Algorithm for Image Content Authentication”, pp. 5-10, 2010.
  19. B. Jagadeesh, S. Srinivas Kumar and K. Raja Rajeswari, “ImageWatermarking Scheme Using Singular Value Decomposition, Quantization and Genetic Algorithm”, Vol. 03, pp. 7-10, 2010.
  20. N. V. Dharwadkar, B. B. Amberker and A.Gorai, “Non-blind Watermarking scheme for color images in RGB space using DWT-SVD”, Proceedings IEEE, Vol. 04, November 2011.
  21. S. kumar, A. kumar saini and P. kumar, “SVD based Robust image digital watermarking using DWT”, IEEE, Vol. 45, 2012.
  22. J. Delaigle, C. De Vleeschouwer and B. Macq, “Psychovisual Approach to Digital Picture Watermarking”, Journal of Electronic Imaging, Vol. 7, pp. 628-640, 1998.
  23. P. Bas, J. Chassery and F. Davoine, “Using the Fractal Code to Watermark Images”, Proceedings of IEEE International Conference on Image Processing, Vol. 01, pp. 469-473, 1998.
  24. www.mathworks.com
Index Terms

Computer Science
Information Sciences

Keywords

Correlation Coefficient Discrete Wavelet Transform (DWT) Singular Value Decomposition (SVD).