Novel Digital Image Water Marking Technique Against Geometric Attacks

Full Text (PDF, 255KB), PP.61-68

Views: 0 Downloads: 0

Author(s)

Anadi Ajay 1,* Pradeep Kumar Singh 2

1. Computer Science And Engineering, ASET, Amity University, Uttar Pradesh

2. ASET, Amity University, Uttar Pradesh

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2015.08.07

Received: 13 May 2015 / Revised: 10 Jun. 2015 / Accepted: 12 Jul. 2015 / Published: 8 Aug. 2015

Index Terms

Geometric attacks, Watermarking, DCT, DWT

Abstract

Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) based techniques have become prominently used in watermarking research. DCT based technique replacing the older ones have made digital watermarking based e-commerce a part of almost all business transactions. It is also being used in business communications and different solutions through computer network. DCT based technique is considered as a secured communication between two users. Verification is being provided for the origin of a watermark that traverses from sender to receiver. The cost per transmission has also reduced as the watermark is encoded in the digital watermarking itself. Here the key size is also small thus making it suitable for key exchange application. Also the security level in fragile watermark is better compared to discrete data integrity verification or authentication for the same bandwidth and key size In this paper, we have compared various geometric attacks based techniques in terms of PSNR and Attack Recovery time.

Cite This Paper

Anadi Ajay, Pradeep Kumar Singh, "Novel Digital Image Water Marking Technique Against Geometric Attacks", International Journal of Modern Education and Computer Science (IJMECS), vol.7, no.8, pp.61-68, 2015. DOI:10.5815/ijmecs.2015.08.07

Reference

[1]Y. H.-C. Wu, “A Novel digital image watermarking scheme based on the vector quantization technique,” Computers & Security, Vol. 24, pp. 460–471, 2005.
[2]Y. Wang, “Blind image data hiding based on self-reference,” Pattern Recognition Letters, Vol. 25, No. 15, pp.1681–1689, 2004.
[3]Y. Yeung, “A Novel blind multiple watermarking technique for images,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, pp. 813–830, 2011.
[4]Yonghong Chen, “A Novel Blind watermarking Scheme Based on Neural Networks for Image”, 2010 IEEE Transactions, pp. 548-552.
[5]Chang Shujuan, “An Adaptive Image Watermarking Algorithm based on Neural Network”, IEEE Computer Society, 2011, International Conference on Intelligent Computation Technology and automation, pp. 408-411.
[6]N. Chenthalir Indra, “Fine Facet Digital Watermark (FFDW) Mining from the Color Image Using Neural Networks”, International Journal of Advanced Computer Science and Applications, special Issue on Image Processing and Analysis, pp. 70-74.
[7]A. Yongqinang, “A DWT Domain Image Watermarking Scheme Using Genetic Algorithm and Synergetic Neural Network”, Academy Publisher, 2012, pp. 298-301.
[8]Samesh Oueslati, “Adaptive Image Watermarking Scheme based on Neural Network”, international Journal of Engineering Science and Technology, Vol. 3, No. 1, Jan 2011, pp. 748-756.
[9]M. Barni, “Digital Watermarking for Copyright Protection: A Communication Perspective”, IEEE Communication Magazine, Vol. 39, No. 8, pp. 90-91, 2001.
[10]A. Kumar, “A Review on Geometric Invariant Digital Image Watermarking Techniques”, International Journal of Computer Applications, Vol. 12, No. 14, pp.31-36, 2012.
[11]F. Petitcolas, “Attacks on Copyright Marking Systems in Information Hiding”, LNCS, Berlin, Vol. 1524, pp. 218-238, 1998.
[12]C.Chang, “SVD-based Digital Image Watermarking Scheme”, Pattern Recognition Letters, Vol. 26, pp. 1577-1586, 2014.
[13]T. Nguyen, “A Simple ICA based Digital Image Watermarking Scheme”, Digital Signal Processing, Vol. 18, pp. 762-776, 2013.
[14]I. Cox, “Some General Methods for Tampering With Watermark”, IEEE Journal on Selected Areas in Communications, Vol. 16, pp. 587-593, 2010.
[15]Z. Bojkovic, “Multimedia Contents Security :Watermarking Diversity and Secure Protocols”, 6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service, TELSIKS, Vol. 1, No. 3, pp. 377-383, 2003.
[16]P.K. Singh, O.P. Sangwan and A. Sharma (2013). A Systematic Review on Fault Based Mutation Testing Techniques and Tools for Aspect-J Programs, published in 3rd IEEE International Advance Computing Conference, IACC-2013 at AKGEC Ghaziabad, India, 22-23, February 2013, IEEE Xplore, pp. 1455-1461.
[17]P.K. Singh and K. Saroha, (2010). A Variant of LSB Steganography for Hiding Images in Audio, published in International Journal of Computer Applications, USA, Vol. 11, Issue 6, Pages 12-16.