Generation of An Efficient Digital Watermark Key Based on Honey Comb Polynomial Interpolation Approach

Full Text (PDF, 474KB), PP.47-55

Views: 0 Downloads: 0

Author(s)

G.RoslineNesakumari 1,* V.Vijayakumar 2 B.V.Ramana Reddy 3

1. MGR University,Godavari Institute of Engineering & Technology, Rajahmundry, A.P, India

2. Computer science, Godavari Institute of Engineering & Technology, Rajahmundry, A.P, India

3. Mekapati RajaMohan Reddy Institute of Technology & Science, Udayagiri, Nellore, A.P,India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2013.03.06

Received: 27 May 2012 / Revised: 6 Oct. 2012 / Accepted: 22 Dec. 2012 / Published: 8 Mar. 2013

Index Terms

Lagrange Polynomial interpolation, Honey Comb structure, MBSPVD, DWK

Abstract

The present paper provides a new mechanism with two stages for efficient authentication based on Honey Comb Polynomial Interpolation (HCPI) and Morphological Border Sorted Pixel Value Difference (MBSPVD) scheme. A simple polynomial interpolation technique on new hexagonal structure called Honey Comb structure (HCS) is used for generating the key of the digital watermark. The polynomial interpolation gives a high secured key, which is difficult to break. HCS is used in the present paper to select pixel positions for generating the Digital Watermark key (DWK). The significant factor of the present method is, the digital watermark is generated by using DWK. The importance of HCS representation is that it possesses special computational features that are pertinent to the vision process. The HCS has features of higher degree of circular symmetry, uniform connectivity, greater angular resolution, and which leads to reduce storage and computation in image processing operations. The DWK is placed in the image by using MBSPVD method. Its guarantees high authentication, robustness, security and copyright protection. The Lagrange Polynomial interpolation (LPI) is used for retrieving the digital watermark from the DWK. The LPI accomplish the aim of image authentication and protection without reducing the image quality. The proposed HCPI-MBSPVD is tested with various attacks and compared with various existing image authentication and copyright protection methods. The comparisons and results indicate the efficacy of the proposed method.

Cite This Paper

G. Rosline Nesakumari, V. Vijayakumar, B. V. Ramana Reddy, "Generation of An Efficient Digital Watermark Key Based on Honey Comb Polynomial Interpolation Approach", International Journal of Computer Network and Information Security(IJCNIS), vol.5, no.3, pp.47-55, 2013. DOI:10.5815/ijcnis.2013.03.06

Reference

[1]Qiang Wu, Xiangjian He, Tom Hintz and Yuhuang Ye, A Novel and Uniform Image Separation on Spiral Architecture, International Journal of Computational Science and Engineering, Interscience, Vol.2, Nos.1/2, pp.57-63, 2006.
[2]Xiangjian He, Wenjing Jia, Namho Hur, Qiang Wu, Jinwoong Kim and Tom Hintz (2006), "Bi-lateral Edge Detection on a Virtual Hexagonal Structure", Lecture Notes in Computer Science, LNCS, Springer, Vol.4292, pp.1092-1101.
[3]http://mathworld.wolfram.com/Lagrange Interpolating Polynomial.html.
[4]Chung-Ming Wang a, Nan-I Wu a, Chwei-Shyong Tsaib, Min-Shiang Hwang (2007), "A high quality steganographic method with pixel-value differencing and modulus function," The Journal of Systems and Software.
[5]Maruthuperumal. S, Vijayakumar. V, Vijayakumar. B (2012), "Sorted Pixel Value Difference on Fuzzy Watermarking Scheme", Global Journal of Science and Technology, Vol.12 Issue 4 version 1.0, February.
[6]Dong-Gyu Yeo and Hae-Yeoun Lee (2012), "Block-based Image Authentication Algorithm Using Reversible Watermarking", James J. (Jong Hyuk) Park et al. (eds.), Computer Science and Convergence, Lecture Notes in Electrical Engineering 114, DOI: 10.1007/978-94-007-2792-2_69.
[7]Tribhuwan Kumar Tewari , Vikas Saxena (2010), "An Improved and Robust DCT based Digital Image Watermarking Scheme", International Journal of Computer Applications (0975 – 8887) ,Volume 3 – No.1, June .
[8]Baisa L. Gunjal, Amol D. Shelkar (2011), "Implementation of New Wavelet Based Image Watermarking Scheme With Exact Correlation and Comparison With Traditional Scheme ", IJSTM Vol. 2, Issue 2, April .
[9]L. Sumalatha V. Venkata Krishna A. Vinay Babu (2012) "Image Content Authentication based on Wavelet Edge Features" International Journal of Computer Applications (0975 – 8887) Volume 49– No.23, July.
[10]Dr. B. Eswara Reddy, P. Harini , S. MaruthuPerumal , Dr. V. VijayaKumar , " A New Wavelet Based Digital Watermarking Method for Authenticated Mobile Signals" International Journal of Image Processing (IJIP),Volume (5): Issue (1) :2011.
[11]Cox, I., M. Miller and J. Bloom," Digital Watermarking," Academic Press, USA, 2002.
[12]Potdar, V., S. Han and E. Chang, "A Survey of Digital Image Watermarking Techniques", in Proc. of the IEEE International Conference on Industrial Informatics, pp: 709-716, Perth, Australia 2005.
[13]Chu.W, "DCT-Based Image Watermarking Using Sub-sampling", IEEE Trans. Multimedia, 5(1): 34-38, 2003.
[14]G.RoslineNesaKumari , B. VijayaKumar , L.Sumalatha , and Dr V.V.Krishna, "Secure and Robust Digital Watermarking on Grey Level Images", International Journal of Advanced Science and Technology Vol. 11, October, 2009.
[15]B. Vijaya Kumar,M.Radhika Mani, G. Roseline NesaKumari, and Dr. V. Vijaya Kumar, "A New Marginal Color Image Water Marking Method based on Logical Operators ", International Journal of Security and Its Applications Vol. 3, No. 4, October, 2009.
[16]B.Vijayakumar, Dr.V.Vijayakumar, G.Rosline Nesa kumari "A Significant Root Leaf Wavelet Tree (SRLWT) Image Watermarking Technique Based on Tree Quantization" International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 ISSN 2250-3153.
[17]G.Rosline Nesa kumari, L.Sumalatha, Dr.V.Vijayakumar "A Fuzzy Based Chaotic And Logistic Method For Digital Watermarking Systems", International Journal of Scientific & Engineering Researc Publications, Volume 3 , Issue 6, June 2012.
[18]S.Maruthuperumal, G.Rosline Nesakumari, Dr.V.Vijayakumar, "Complete Qualified Significant Wavelet Tree Quantization for Image Watermarking" in International Journal of Computer Science and Technology,Vol.3, Issue 2, April-June 2012.
[19]S.Maruthuperumal, G.Rosline Nesakumari, Dr.V.Vijayakumar, "Region Based Even Odd Watermarking Method with Fuzzy Wavelet ", International Journal of computer Engineering & Science(IJCES), Volume 2 Issue 8 (August 2012.
[20]L. Sumalatha, G. RoslineNesa Kumari, V.Vijaya Kumar, "A Simple block based watermarking scheme for Image authentication & Tamper detection," International Journal of Soft Computing and Engineering (IJSCE), Volume-2, Issue-4, September 2012.
[21]G. Rosline Nesakumari, S. Rajendran, Dr.V. Vijayakumar, "Integrated Normalized Content System for Efficient Watermarking," International Journal of Computer Applications, Vol. 53-No.15 , Sept, 2012.
[22]Jiankun Hu , Fengling Han, "A pixel-based scrambling scheme for digital medical images protection", Journal of Network and Computer Applications, Published by Elsevier Ltd.,2009.
[23]Xiang-Yang Wang , Zi-Han Xu , Hong-Ying Yang, "A robust image watermarking algorithm using SVR detection", Expert Systems with Applications, Published by Elsevier Ltd.,2009.
[24]Sameh Oueslati , Adnane Cherif , and Bassel Solaiman , "A Fuzzy Watermarking System Using the Wavelet Technique for Medical Images", International Journal of Research and Reviews in Computing Engineering Vol. 1, No. 1, March 2011.
[25]Hanaa A. Abdallah, MohiyM. Hadhoud, Abdalhameed A. Shaalan, Fathi E.AbdElsamie, "Blind Wavelet-Based Image Watermarking", International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 4, No.1, March 2011.
[26]Chung-Ming Wang a, Nan-I Wu a, Chwei-Shyong Tsai b, Min-Shiang Hwang, "A high quality steganographic method with pixel-value differencing and modulus function", the Journal of Systems and Software(2007).