Permutation-based Homogeneous Block Content Authentication for Watermarking

Full Text (PDF, 311KB), PP.25-30

Views: 0 Downloads: 0

Author(s)

S.Maruthuperumal 1,* G.RoslineNesakumari 1

1. Godavari Institute of Engineering &Technology, Rajahmundry, A.P, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2013.02.04

Received: 25 Oct. 2012 / Revised: 29 Nov. 2012 / Accepted: 27 Dec. 2012 / Published: 8 Feb. 2013

Index Terms

Homogeneous, Permutation blocks, Attacks, Watermarking

Abstract

In modern days, digital watermarking has become an admired technique for hitting data in digital images to help guard against copyright infringement. The proposed Permutation-based Homogeneous Block Content authentication (PHBC) methods develop a secure and excellence strong watermarking algorithm that combines the reward of permutation-based Homogeneous block (PHB) with that of significant and insignificant bit values with X0R encryption function using Max coefficient of least coordinate value for embedding the watermark. In the projected system uses the relationship between the permutation blocks to embed many data into Homogeneous blocks without causing solemn distortion to the watermarked image. The experimental results show that the projected system is very efficient in achieving perceptual invisibility with an increase in the Peak Signal to Noise Ratio (PSNR). Moreover, the projected system is robust to a variety of signal processing operations, such as image Cropping, Rotation, Resizing, Adding noise, Filtering , Blurring and Motion blurring.

Cite This Paper

S.Maruthuperumal, G.Rosline Nesa Kumari,"Permutation-based Homogeneous Block Content Authentication for Watermarking", IJIGSP, vol.5, no.2, pp.25-30, 2013. DOI: 10.5815/ijigsp.2013.02.04

Reference

[1]I.J. Cox, J. Killian, F.T. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia", IEEE Transactions on Image Processing, Vol.6, No. 12, 1997, pp. 1673-1678.

[2]Ruizhen Liu and Tieniu Tan, "Content-based watermarking model", in Proceedings of 15th International Conference on Pattern Recognition, Vol. 4, 2000, pp. 238-241.

[3]H. Huang, F. Wang, and J. Pan, Efficient and Robust Watermarking Algorithm with Vector Quantisation. Electron. Letter, June 2001 .

[4]T. Kalker and J. Haitsma, Efficient Detection of a Spatial Spread Spectrum Watermark in MPEG Video Streams. Proceeding of IEEE Int. Conf. Image Processing, 2000 .

[5]C. Lu, S. Huang, C. Sze, and H. Liao, Cocktail Watermarking for Digital Image Protection. IEEE Transaction on Multimedia,,4 , 2000.

[6]Alattar, A.M. (2004). Reversible watermark using the difference expansion of a generalized integer transform, IEEE Transactions on Image Processing, Vol.13, No.8, Pp.1147-1156.

[7]Tian, J. (2003) Reversible data embedding using a difference expansion, IEEE Transactions on Circuits and Systems for Video Technology, Vol.13, No.8, Pp.890-896.

[8]Qi, X. and Qi, J. (2007) A robust content-based digital image watermarking scheme, Signal Processing, Elsevier, Vol. 87, Issue 6, Pp. 1264-1280. 

[9]Sachs, D., Anand, R. and Ramchandran, K. (2000) Wireless image transmission using multiple-description based concatenated codes,Proceedings Data Compression Conference DCC 2000, P. 569. 

[10]Xie, L. and Arce, G.R. (2001) A class of authentication digital watermarks for secure multimedia communication IEEE Transactions on Image Processing, Vol.10, No.11, Pp.1754-1764. 

[11]A Xie, Z., Wang, S., Gan, L., Zhang, L. and Shu, Z. (2008) Content Based Image Watermarking in the Ridgelet Domain, International Symposium on Electronic Commerce and Security, Pp.877-881.

[12]Kim, M. and Lee, W. (2004) A Content-Based Fragile Watermarking Scheme for Image Authentication, Lecture Notes in Computer Science, Content Computing, Springer Berlin / Heidelberg, Vol. 0302/2004, Pp. 258-265.