CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Comparison and Analysis of Self-Reference Image with Meaningful Image for Robust Watermarking Algorithm based on Visual Quality and Fidelity

by S.M.Ramesh, Dr.A.Shanmugam, B.Gomathy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 15 - Number 5
Year of Publication: 2011
Authors: S.M.Ramesh, Dr.A.Shanmugam, B.Gomathy
10.5120/1947-2604

S.M.Ramesh, Dr.A.Shanmugam, B.Gomathy . Comparison and Analysis of Self-Reference Image with Meaningful Image for Robust Watermarking Algorithm based on Visual Quality and Fidelity. International Journal of Computer Applications. 15, 5 ( February 2011), 8-13. DOI=10.5120/1947-2604

@article{ 10.5120/1947-2604,
author = { S.M.Ramesh, Dr.A.Shanmugam, B.Gomathy },
title = { Comparison and Analysis of Self-Reference Image with Meaningful Image for Robust Watermarking Algorithm based on Visual Quality and Fidelity },
journal = { International Journal of Computer Applications },
issue_date = { February 2011 },
volume = { 15 },
number = { 5 },
month = { February },
year = { 2011 },
issn = { 0975-8887 },
pages = { 8-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume15/number5/1947-2604/ },
doi = { 10.5120/1947-2604 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:03:20.117844+05:30
%A S.M.Ramesh
%A Dr.A.Shanmugam
%A B.Gomathy
%T Comparison and Analysis of Self-Reference Image with Meaningful Image for Robust Watermarking Algorithm based on Visual Quality and Fidelity
%J International Journal of Computer Applications
%@ 0975-8887
%V 15
%N 5
%P 8-13
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a comparison and analysis of recently developed watermarking algorithms. Digital watermarking has been regarded as a vital technique for safeguarding the copyright of digital contents. A digital watermarking method is said to be effective if the watermark embedded in an image by it could survive against diverse attacks ranging from compression, filtering to cropping. The performance of the watermarking algorithms is analyzed and to estimate and compare robustness of watermarking algorithms by considering the visual quality of the original and watermarked images in terms of Peak Signal to Noise Ratio. Furthermore, the extracting fidelity of the watermarking algorithms is compared by taking the Normalized Correlation value between the original watermark and the extracted watermark. The experimental results showed the accuracy of different watermarking algorithms in terms of visual quality and fidelity.

References
  1. F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, “Information hiding-a survey,” Proc. IEEE Vol: 87, No: 7, pp: 1062-1078, 1999.
  2. Shelby Pereia and Thierry Pun, "Fast Robust Template Matching for Affine Resistant Image Watermarks," Proceedings of the Third International Workshop on Information Hiding, Lecture Notes in Computer Science (LNCS), Vol. 1768, pp. 199 - 210, 1999.
  3. G. C. Langelaar, I. Setywan, and R. L. Lagendijk, “Watermarking digital image and video data,” IEEE Signal Process. Mag., Vol. 17, No. 5, pp. 20-46, Sep. 2000.
  4. Cox I. J., Miller, M. L. and Bloom J. A., “Digital Watermarking”, Morgan Kaufmann Publishers, USA, 2002.
  5. Xiang-Yang Wang and Hong Zhao, "A Novel Synchronization Invariant Audio Watermarking Scheme Based on DWT and DCT", IEEE Transactions On Signal Processing, Vol. 54, No. 12, December 2006.
  6. Jiang-Lung Liu, Der-Chyuan Lou, Ming-Chang Chang and Hao-Kuan Tso, "A robust watermarking scheme using self-reference image", Computer Standards & Interfaces, Vol. 28, no. 3, pp.356-367, January 2006.
  7. Lino Coria, Panos Nasiopoulos, Rabab Ward and Mark Pickering. “An Access Control Video Watermarking Method that is Robust to Geometric Distortions”, Journal of Information Assurance and Security, Vol: 2, pp: 266-274, 2007.
  8. Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk. “Steganographic Routing in Multi Agent System Environment”, Journal of Information Assurance and Security, Vol: 2, pp: 235-243, 2007.
  9. Zbigniew Piotrowski, Piotr Gajewski. “Voice spoofing as an impersonation attack and the way of protection”, Journal of Information Assurance and Security, Vol: 2, pp: 223-225, 2007.
  10. Grace C.-W. Ting, Bok-Min Goi and Swee-Huay Heng, “Attacks on a robust watermarking scheme based on self-reference image”, Computer Standards & Interfaces, Vol. 30, No. 1-2, pp. 32-35, January 2008.
  11. Ji Xiang Ye, Guan Zheng Tan, "An Improved Digital Watermarking Algorithm for Meaningful Image", in proceedings of International Conference on Computer Science and Software Engineering, pp. 822 - 825, Wuhan, Hubei, 2008.
  12. B Surekha, Dr GN Swamy, Dr K Srinivasa Rao, A Ravi Kumar. “A Watermarking Technique based on Visual Cryptography”, Journal of Information Assurance and Security, Vol: 4, pp: 470-473, 2009.
  13. Zorana Bankovic, José M. Moya, Álvaro Araujo, Slobodan Bojanic and Octavio Nieto-Taladriz. “A Genetic Algorithm-based Solution for Intrusion Detection”,. Journal of Information Assurance and Security, Vol: 4, pp: 192-199, 2009.
  14. Sanjeev kumar, Balasubramanian Raman, Manoj Thakur, "Real coded genetic algorithm based stereo image watermarking", IJSDIA Intl. Journal of secure digital information Age, Vol:1, No:1, 2009.
  15. Chih-Chin Lai, Hsiang-Cheh Huang and Cheng-Chih Tsai, “A Digital Watermarking Scheme Based On Singular Value Decomposition And Micro-Genetic Algorithm”, International Journal of Innovative Computing, Information and Control, Vol. 5, No. 7, July 2009.
  16. Yu-Ting Pai, Shanq-Jang Ruan and Jurgen Gotze, “A High Quality Robust Watermarking Scheme”, Lecture Notes in Computer Science, Vol. 4261, pp. 650-657, 2006.
  17. Amit Bohra, Omar Farooq and Izharuddin, “Blind self-authentication of images for robust watermarking using integer wavelet transform”, AEU - International Journal of Electronics and Communications, Vol. 63, No. 8, pp. 703-707, August 2009.
  18. Chih-Ming Kung, Shu-Tsung Chao, Yen-Chen Tu, Yu-Hua Yan, Chih-Hsien Kung, "A Robust Watermarking and Image Authentication Scheme used for Digital Contant Application", Journal of Multimedia, Vol 4, No 3, pp. 112-119, June 2009.
  19. Wei Lu, Hongtao Lu and Fu-Lai Chung, “Feature based robust watermarking using image normalization”, Computers & Electrical Engineering, Vol. 36, No. 1, pp. 2-18, January 2010.
  20. Shinfeng D. Lin, Shih-Chieh Shie and J.Y. Guo, "Improving the robustness of DCT-based image watermarking against JPEG compression", Computer Standards & Interfaces, Vol. 32, no. 1-2, pp. 54-60, January 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Robust Watermarking Image Compression Wavelet Transform PSNR (Peak Signal to Noise Ratio) NC (Normalized Correlation)