Open Access Open Access  Restricted Access Subscription Access

Digital Watermarking Technique For Protecting Data and Image Authentication

Nidhi Jain, M.P.S. Chawla

Abstract


Due to immense growth in the online data storage, security of the important information has become a keen point of interest. Hiding of an information involves its concealment, so that an eavesdropper does not trace out the existence of that information. In the field of image processing, the data hiding techniques play a vital role for authenticating the digital data and its copyright protection. Digital watermarking is one of the efficient technique for embedding significant information over the digital signals in order to check and maintain the authenticity of it’s author and to safeguard it from being used illegally.In this paper, a creamer framework utilizing three individual watermarking systems i.e. Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) is proposed. This strategy abuses the upsides of the three individual frameworks and in this way gives a prevalent security arrangement when appeared differently in relation to various techniques. The examination of scale segment used as a part of the proposed procedure close by the graphical results is moreover done.            


Full Text:

PDF

References


P. Parashar and R.K. Singh, “A Survey: Digital Image Watermarking Techniques”, International Journal of Signal Processing, Image Processing and Pattern Recognition(IJSIP), vol. 7 , no. 6, 2014, pp. 111-124

Shraddha S. Katariya,, “Digital Watermarking: Review”,International Journal of Engineering and Innovative Technology (IJEIT), vol. 1, issue 2, Feb. 2012.

Dhara D. Shah and Dr. Manish M. Doshi, “Secured Information Model for Color Image Authentication”, Journal of Information. Knowledge and Research in Electronics and Communication Engineering, vol.1, issue 2, Nov 10 to Oct. 2011

W. C. Seng, “Digital Image Watermarking Methods For Copyright Protection And Authentication”, University of Malaya, 2007, http://www.researchgate.net/publication/27475568

D. Gupta and S.Choubey, “Discrete Wavelet Transform for Image Processing”, International Journal of Emerging Technology and Advanced Engineering(IJETAE), vol.4, issue 3, March 2015

V. Tomar, D.Mehrotra and A. Choudhary, “ A Statistical comparison of Digital Image Watermarking Techniques”, International Journal of Computer Applications, 3rd International IT Summit Confluence , 2012

P. Sharma and T. Jain, “Robust Digital Watermarking for Coloured Images using SVD and DWT Technique”, IEEE International Advanced Computing Conference, 2014

Seema and S. Sharma, “DWT-SVD based Efficient Image Watermarking Algorithm to Achieve High Robustness and Perpetual Quality”, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, issue 4, April 2012

S Sirmour and A. Tiwari, “A Hybrid DWT-SVD Based Digital Image Watermarking Algorithm for Copyright Protection”, International Journal of P2P Network Trends and Technology, vol. 6 March 2014

M. Jiansheng, L. Sukang and T. Xiaomei, “A Digital Watermarking Algorithm Based on DCT and SVD”, Proceedings of the 2009 International Symposium on Web Information Systems and Applications, May 22-24, 2009, pp 104-107

A. Sverdlov, S. Dexter and A. M. .Eskicioglu, “Robust DCT-SVD Domain Image Watermarking for Copyright Protection: Embedding Data in All Frequencies”, Brooklyn College, http://kilyos.ee.bilkent.edu.tr/~signal/defevent/papers/cr1023.pdf

Md. M. Rahman, “A DWT, DCT And SVD Based Watermarking Technique To Protect The Image Piracy”, International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT), Vol. 4, No. 2, June 2013

N. Chaturvedi and Dr. S. J. Basha, “Comparison of Digital image Watermarking Methods DWT and DWT-DCT on the Basis of PSNR”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 1, Issue 2, Dec. 2012

S. Murty P. and Dr. P. R. Kumar, “A Robust Digital Image Watermarking Scheme Using Hybrid DWT-DCT-SVD Technique”, International Journal of Computer Science and Network Security, Vol. 10,No.10, Oct 2010


Refbacks

  • There are currently no refbacks.