Open Access Open Access  Restricted Access Subscription or Fee Access

Lossless Watermarking for Image Authentication

V. Seethalakshmi, Gurpadam Singh

Abstract


Data integrity and source origin authentication are essential topics for real-time multimedia systems. But the traditional methods are not very applicable to overcome the distortion introduced in multimedia data transportation. In this paper few security schemes are proposed, which rely on authentication rather than on encryption methods. The highly asymmetric architectures found in ubiquitous computing applications are exploited to provide a protection of the transmitted multimedia data by means of well known digital watermarking techniques. The advocatedapproach exemplifies the basic concept of watermarking and presents a vivid picture of various watermarking techniques. The various watermarking techniques are compared by their Peak Signal to Noise Ratio (PSNR) and provides a report of the highest PSNR in proposed Dual tree DWT(Discrete Wavelet Transform) method.


Keywords


DDWT, DWT , MSE, Encryption, PSNR, Watermarking.

Full Text:

PDF

References


M. Swanson, B. Zhu, and A. Tewfik, “Transparent Robust Image Watermarking,” Proc. IEEE Int. Conf. on Image Processing, Sept. 1996, vol. III, pp. 211-214.

I. Pitas, “A Method for Signature Casting on Digital Images,” Proc. IEEE Int. Conf. on Image Processing, Sept. 1996, vol. III, pp. 215-218.

R. Schyndel, A. Tirkel, and C. Osborne, “A Digital Watermark,” Proc.IEEE Int. Conf. on Image Processing, Nov. 1994, vol. II, pp. 86-90

X. Xia, C. Boncelet, and G. Arce, “A Multiresolution Watermark for Digital Images,” Proc. IEEE Int. Conf. on Image Processing, Oct. 1997,.

F. Bartolini, M. Barni, V. Cappellini, and A. Piva, “Mask Building for Perceptually Hiding Frequency Embedded Watermarks,” Proc. Int.Conf. on Image Processing, Oct. 1998, vol. I, pp. 450-454.

D. Kundur and D. Hatzinakos, “A Robust Digital Image Watermarking Method Using Wavelet-Based Fusion,” Proc. IEEE Int. Conf. on Image Processing, Oct. 1997, vol. I, pp. 544-547.

J. Delaigle, C. De Vleeschouwer, and B. Macq, “Psychovisual Approach to Digital Picture Watermarking,” Journal of Electronic Imaging, vol. 7,no. 3, pp. 628-640, July 1998.

S. Craver, N. Memon, B. Yeo, and M. Yeung, “Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations,Attacks, and Implications,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 573-586, May 1998.

P. Bas, J. Chassery, and F. Davoine, “Using the Fractal Code to Watermark Images,” Proc. IEEE Int. Conf. on Image Processing, vol. I Oct. 1998, pp. 469-47

L. Marvel, C. Retter, and C. Boncelet, “Hiding Information in Images,” Proc. IEEE Int. conf. on Image Processing, vol.II, Oct. 1998, pp. 396-398.

Ju Liu, Xiangang Zhang, Jiande Sun and Miguel Angel Lagaunas, "A Digital Watermarking Scheme Based on ICA det.ection", Proceedings of the 4th international Symposium on Independent Component Analysis and Blind Signal Separation(ICA2003), April 2003, Nara,Japan

Ju Liu, Xiangang Zhang, Jiande Sun and Miguel Angel Lagaunas, "A Digital Watermarking Scheme Based on ICA det.ection", Proceedings of the 4th international Symposium on Independent Component Analysis and Blind Signal Separation(ICA2003), April 2003, Nara, Japan.

A Blind Chaos-Based Complex Wavelet-Domain Image Watermarking Technique was proposed by S. Mabtoul1 , E. Ibn , E. Ibn-Elhaj2 , D.Aboutajdine11 GSCM, University Mohamed V, Rabat, Morocco 2 Institut National des Postes et Télécommunications (INPT), Rabat,Morocco in IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.3, March 2006

“A Dual Digital-Image Watermarking Technique” by Maha Sharkas,Dahlia ElShafie, and Nadder Hamdy, Senior Member in IEEE PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY VOLUME 5 APRIL 2005 ISSN 1307-6884

“Creating a robust form of stegnograph” by Joshua Michael Buchanan ,May 2004, Winston salem- north Carolina, a thesis submitted to the university on Wake forest university

A DWT Based Approach for Image Steganography, Po-Yueh Chen* and Hung-Ju Lin Department of Computer Science and Information Engineering,National Changhua University of Education, , Taiwan, in International Journal of Applied Science and Engineering 2006. 4, 3:275-90.

Digital Watermarking:A Technology Overview” WHITE PAPER by Wipro Technologies Morocco in IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.3, March 2006.

“Digital Video Watermarking Multimedia Creation and Delivery “ by CHAN Pik-Wah, Computer Science and Engineering, The Chinese University of Hong Kong, July 2004


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.