CFP last date
20 December 2024
Reseach Article

An Encryption Based Technique for Invisible Digital Watermarking

Published on None 2010 by Tuhin Utsab Paul, Avishek Raychoudhury, Samir Kumar Bandyopadhyay
Computer Aided Soft Computing Techniques for Imaging and Biomedical Applications
Foundation of Computer Science USA
CASCT - Number 1
None 2010
Authors: Tuhin Utsab Paul, Avishek Raychoudhury, Samir Kumar Bandyopadhyay
36d9051f-a9fa-4a87-896d-ca91bfdeaa1f

Tuhin Utsab Paul, Avishek Raychoudhury, Samir Kumar Bandyopadhyay . An Encryption Based Technique for Invisible Digital Watermarking. Computer Aided Soft Computing Techniques for Imaging and Biomedical Applications. CASCT, 1 (None 2010), 24-28.

@article{
author = { Tuhin Utsab Paul, Avishek Raychoudhury, Samir Kumar Bandyopadhyay },
title = { An Encryption Based Technique for Invisible Digital Watermarking },
journal = { Computer Aided Soft Computing Techniques for Imaging and Biomedical Applications },
issue_date = { None 2010 },
volume = { CASCT },
number = { 1 },
month = { None },
year = { 2010 },
issn = 0975-8887,
pages = { 24-28 },
numpages = 5,
url = { /specialissues/casct/number1/995-28/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Computer Aided Soft Computing Techniques for Imaging and Biomedical Applications
%A Tuhin Utsab Paul
%A Avishek Raychoudhury
%A Samir Kumar Bandyopadhyay
%T An Encryption Based Technique for Invisible Digital Watermarking
%J Computer Aided Soft Computing Techniques for Imaging and Biomedical Applications
%@ 0975-8887
%V CASCT
%N 1
%P 24-28
%D 2010
%I International Journal of Computer Applications
Abstract

In this paper, a technique for hiding the data of images has been proposed. The proposed method is used to hide an image file entirely with in another image file keeping two considerations in mind, which are Size and Degree of Security. At the source, the image that is to be hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be of any size, which will be adjusted by our resize function thereby, removing the size constraint. Secondly, for the security of transmission over network, only the final encrypted image i.e. cover image and target image is sent over the network. This image is easily decoded at the receiver end. Results are encouraging from practical point of view.

References
  1. Dobsicek, M., Extended steganographic system. In: 8th Intl. Student Conf. on Electrical Engineering, FEE CTU 2004, Poster 04.
  2. 2. Yusuk Lim, Changsheng Xu and David Dagan Feng, “Web based Image Authentication Using Invisible Fragile Watermark”, 2001, Pan-Sydney Area Workshop on Visual Information Processing (VIP2001), Sydney, Australia, Page(s): 31 - 34
  3. 3. Min Wu, Member, IEEE, and Bede Liu, Fellow, IEEE, “Data Hiding in Binary Image for Authentication and Annotation”, IEEE Trans. Image Processing, volume 6, Issue 4, Aug. 2004 Page(s): 528 - 538
  4. 4. Rehab H. Alwan, Fadhil J. Kadhim, and Ahmad T. Al-Taani, “Data Embedding Based on Better Use of Bits in Image Pixels”, International Journal of Signal Processing Vol 2, No. 2, 2005, Page(s): 104 - 107
  5. 5. Nameer N. EL-Emam "Hiding a large amount of data with high security using steganography algorithm", Journal of Computer Science. April 2007, Page(s): 223 – 232
  6. S.K.Bandyopadhyay, Debnath Bhattacharyya, Swarnendu Mukherjee, Debashis Ganguly, PoulumiDas, "A Secure Scheme for Image Transformation", August 2008, IEEE SNPD, Page(s): 490 – 493
  7. G. Sahoo, R. K. Tiwari, "Designing an Embedded Algorithm for Data Hiding using Steganographic
  8. Technique by File Hybridization", January 2008, IJCSNS, Vol. 8, No. 1,Page(s): 228 – 2336. S.K.Bandyopadhyay, Debnath Bhattacharyya, Swarnendu Mukherjee, Debashis Ganguly, Poulumi Das, "A Secure technique for Image data hiding".
Index Terms

Computer Science
Information Sciences

Keywords

Data image Hiding Security Encryption