Open Access Open Access  Restricted Access Subscription or Fee Access

State-of-the-Art Invisible Watermarking Technology within Media Files

T. Suresh Padmanabhan, D. Karthikeyan, P. Arunkumar, S. Visalatchy

Abstract


This paper facilitates the techniques to be used with the images that cannot be misused by unauthorized users. This method is to provide the security for images by using key concepts. The Invisible Watermarking concept is used for secret message and images to send one node to another node with a private key. A package is developed to attain the above said technology. This package is mainly applicable for a software company which focuses on how to secure the data from the hackers while transferring the information. It gives controlled redundancy, data independence, more accuracy and integrity, privacy and security and also a good performance.

Keywords


Invisible Watermarking, Stegnography, Encryption

Full Text:

PDF

References


Vashistha, A.; Nallusamy.R: Das.: Paul.S.;” Watermarking video content using visual cryptography and scene averaged image, Multimedia and Expo (ICME)”, International Conference on IEEE, 2010, PP.: 1641 – 1646.

Xiaozhong Pan: Bo Tao Yan: Ke Niu; “Multiclass detect of current steganogrphic methods for JPEG format based re-stengoraphy,” international Conference on Advanced Computer Control (ICACC), 2010, PP.: 79- 82.

Jinsuk Baek; Kim Cheonshik; Fisher, Paul S.; Hongyang Chao; (N,I) “Secret sharing approach based on steganography with gray digital images”, IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS) 2010,pp: 325 – 329.

Ying Zhang; Jun Xiao; Ying Wang; “Side informed image watermarking algorithm with high security Information”, IEEE Youth Conference on Computing and Telecommunication, 2009, PP: 395-398

Mehboob, B. Faruqui, R.A.; “A stenography implementation” International Symposium on Biometrics and Security Technologies ISBAST, 2008, pp. 1-5.

Shu-Chien Huang: Chu-Fu-Wang; “The image Watermarking Technique Using Visual Secret Sharing Strategy”, Eight International Conference on Intelligent Systems Design and Applications ISDA,2008 vol. :2 pp: 190 – 195.

Mohanty, S.P; Sheth, R,; Pinto, A.; Chandy, M.; “Crypt Mark: A Novel Secure Invisible Watermarking Technique for Color Images”, IEEE on Consumer Electronics, 2007,

Bartlow , N.; Kalka, N.; Cukic, B.; Ross, “Protecting Iris Image through Asymmetric Digital Watermarking”, IEEE workshop on Automatic Identification Advanced Technologies, 2007 pp: 192-197.

Moon, S.K.; Kawitkar, R.S. “Data security using data hiding”, International Conference on Conference on Computational Intelligence and Multimedia Applications, 2007, pp: 247 – 251.

Au, O.C, “ Joint visual cryptogtaphy and watermarking Ming Sun Fu”; IEEE International Conference on Multimedia and Expo, ICME 2004, Vol.: 2 ,pp: 975–978.

N. Nikolaidis and I. Pitas, “Copyright protection of images using robust digital signatures,” in Proc. IEEE Int. Conf. Acoustics, Speech,Signal Processing (ICASSP ’96), vol. 4, Atlanta, GA, May 1996, pp2168–2171.

A. Piva,M. Barni, F. Bartolini, and V. Capellini, “DCT-based watermark recovering without resorting to the uncorrupted original image,” in ProcIEEE Int. Conf. Image Processing (ICIP’97), vol. 1, Santa Barbara, CA,Oct. 1997, pp. 520–523.

T. N. Pappas, “An adaptive clustering algorithm for image segmentation,”IEEE Trans. Signal Processing, vol. 40, pp. 901–914, Apr. 1992.

R. L. Devaney, An Introduction to Dynamical Systems. New York:Penjamine/Cummings, 1986.

L. Vincent and P. Soille, “Watersheds in digital spaces: An efficient algorithm based on immersion simulations,” IEEE Trans. Pattern Anal. Machine Intell., vol. 13, pp. 583–598, June 1991.

L. Vincent, “Morphological grayscale reconstruction in image analysis: Applications and efficient algorithms,” IEEE Trans. Image Processing, vol. 2, pp. 176–201, Feb. 1993.

A. S. Wright and S. T. Acton, “Watershed pyramids for edge detection,”in Proc. IEEE ICIP ’97, Santa Barbara, CA, Oct. 1997, pp. 578–581.

D. Cortez, P. Nunes, M. M. de Sequeira, and F. Pereira, “Image segmentation toward new image representation models,” Signal Process.:Image Commun., vol. 6, no. 6, pp. 485–498, 1995.

J. Besag, “On the statistical analysis of dirty pictures,” J. R. Statist. SocB, vol. 48, no. 3, pp. 259–302, 1986.

J. Luo, R. T. Gray, and H.-C. Lee, “Incorporation of derivative priors in adaptive Bayesian color image segmentation,” in Proc. ICIP ’98, vol. 3,Chicago, IL, Oct. 1998, pp. 780–784.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.