CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Article:Multiple Watermarking Scheme for Image Authentication and Copyright Protection using Wavelet based Texture Properties and Visual Cryptography

by S. Radharani, Dr. M.L. Valarmathi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 23 - Number 3
Year of Publication: 2011
Authors: S. Radharani, Dr. M.L. Valarmathi
10.5120/2868-3716

S. Radharani, Dr. M.L. Valarmathi . Article:Multiple Watermarking Scheme for Image Authentication and Copyright Protection using Wavelet based Texture Properties and Visual Cryptography. International Journal of Computer Applications. 23, 3 ( June 2011), 29-36. DOI=10.5120/2868-3716

@article{ 10.5120/2868-3716,
author = { S. Radharani, Dr. M.L. Valarmathi },
title = { Article:Multiple Watermarking Scheme for Image Authentication and Copyright Protection using Wavelet based Texture Properties and Visual Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { June 2011 },
volume = { 23 },
number = { 3 },
month = { June },
year = { 2011 },
issn = { 0975-8887 },
pages = { 29-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume23/number3/2868-3716/ },
doi = { 10.5120/2868-3716 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:09:14.703104+05:30
%A S. Radharani
%A Dr. M.L. Valarmathi
%T Article:Multiple Watermarking Scheme for Image Authentication and Copyright Protection using Wavelet based Texture Properties and Visual Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 23
%N 3
%P 29-36
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Advancement in communication medium is producing large volume of digital information which needs to be protected. Watermarking is a technique that is used to hide secret signal into digital signal in a manner that does not reduce overall quality of the original signal. In relation to digital image watermarking, another area that is drawing attention is the multiple watermarking, where more than one watermark is embedded into single multimedia object. Multiple watermarks are normally proposed as a method to provide extra security to an image by embedding two or more secret messages into the cover image. In the present research work, the concept of multiple watermarking is used to hide both copyright and authentication information into a color image. For this purpose a wavelet transformation based on texture properties and secret sharing using visual cryptography is used. Experimental results indicate that the proposed watermarking scheme is highly robust and does not degrade the original signal.

References
  1. Piva, A., Bartolini, F. and Barni, M. (2002) Managing copyright in open networks, IEEE Transactions on Internet Computing, Vol. 6, Issue. 3, Pp. 18-26.
  2. Lin, E., Podilchuk, C., Kalker, T. and Delp, E. (2001) Streaming Video and Rate Scalable Compression: What Are the Challenges for Watermarking?, Proceedings the SPIE International Conference on Security and Watermarking of Multimedia Contents III, Vol. 4314, San Jose, CA, 22-25.
  3. Lu, C., Huang, S., Sze, C. and Liao, H. Y. M. (2000a) Cocktail watermarking for digital image protection,” IEEE Transactions on Multimedia, Vol. 2, Pp. 209-224.
  4. Kim, Y., Moon, K. and Oh, I. (2003) A text watermarking algorithm based on word classification and inter-word space statistics, Proceedings Seventh International Conference on Document Analysis and Recognition, Pp. 775 -779.
  5. Xuehua, J. (2010) Digital Watermarking and its Application in Image Copyright Protection, International Conference on Intelligent Computation Technology and Automation (ICICTA), Pp.114 - 117.
  6. Checcacci, N., Barni, M., Bartolini, F. and Basagni, S. (2000) Robust video watermarking for wireless multimedia communications, Proceedings IEEEE Wireless Communications and Networking Conference 2000, WCNC. 2000, Vol. 3, Pp. 1530-1535.
  7. Hartung, F. and Kutter, M.(1999) Multimedia Watermarking Techniques, Proc. of IEEE, Tutorial, Survey, and Special Issue on Data Hiding & Security, Pp.1079-1107.
  8. Wang, C., Nie, X., Wan, X., Wan, W.B. and Chao, F. (2009) A Blind Video Watermarking Scheme Based on DWT," iih-msp, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Pp.434-437,
  9. Mohammed, A.A. and Hussein, J.A. (2009) Efficient Video Watermarking Using Motion Estimation Approach, 2009 Eight IEEE/ACIS International Conference on Computer and Information Science (icis 2009), Pp.593-598.
  10. Jiang, J. and Weng, Y. (2008) Robust multiple watermarking in color images with correlation coefficient detector, Proceeding of the 8th IASTED International Conference on Visualization, Imaging and Image Processing (VIIP 2008), Palma de Mallorca, Spain, Pp.280-285.
  11. Dharwadkar, N.V. and Amberker, B.B. (2010) Watermarking Scheme for Color Images using Wavelet Transform based Texture Properties and Secret Sharing, International Journal of Information and Communication Engineering, No. 6, Issue 2, Pp. 94-101.
  12. Wong, P.H.W., Au, O.C. and Yeung, Y.M.(2003) Novel blind multiple watermarking technique for images, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, Issue 8, Pp. 813 - 830.
  13. Chen, W.Y., Lin, J.T., Lin, C.Y. and Liu, J.R. (2007) Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique, The 23rd Workshop on Combinatorial Mathematics and Computation Theory, Vol. 46, No. 6, Pp.067002-1~12
  14. Wang, B., Sun, X., Ruan, Z. and Ren.H. (2011) Multi-mark: Multiple watermarking method for privacy data protection in wireless sensor networks, Information Technology Journal, Vol. 10, No. 4, Pp. 833-840.
  15. Sheppard, N.P., Safavi-Naini, R, and Ogumbona, P. (2001) On Multiple Watermarking, ACM Workshop Proceedings on Multimedia and Security – New Challenges, Pp. 1-3.
  16. Cox, I.J. , Kilian, J., Leighton, T. and Shamoon, T. (1997) Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, Vol. 6, No. 12, Pp. 1673–1687.
  17. Mintzer, F. and Braudaway, G.W. (1999) If one watermark is good, are more better?, Proceedings of IEEE International Conference in Acoustics, Speech, and Signal Processing,Vol. 4, Pp. 2067–2069.
  18. Stankovic, S., Djurovic, I. and Pitas, I. (2001) Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon-Wigner Distribution, IEEE Transactions of Image Processing, Vol. 10, No. 4, Pp. 650-658.
  19. Hsu, C.T. and Wu, J.L. (1999) Hidden digital watermarks in images, IEEE Transactions on Image Processing, Vol. 8, No. 1, Pp. 58–68, Jan. 1999.
  20. Trichili, H., Boublel, M., Derbel, N., Kamoun, L. (2002) A new medical image watermarking scheme for a better telediagnosis, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics 2002, Vol.1, Pp. 556–559.
  21. Sun, J., Cao, Z. and Hu, Z. (2008) Multiple Watermarking Relational Databases Using Image, 2008 International Conference on MultiMedia and Information Technology, Pp.373-376.
  22. Behnia, S., Teshnehlab, M. and Ayubi, P. (2010) Multiple-watermarking scheme based on improved chaotic maps, Communications in Nonlinear Science and Numerical Simulation, Vol. 15, Issue 9, Pp. 2469-2478.
  23. Liu, C.C. and Chen, W.Y. (2006) Multiple-watermarking scheme for still images using the discrete cosine transform and modified code division multiple-access techniques, Optical Engineering, Vol. 45, No.07, 077006
  24. Giakoumaki, A., Pavlopoulos, S., Koutouris, D., (2003) A medical image watermarking scheme based on wavelet transform, Proceedings of the 25th Annual International Conference of the Engineering in Medicine and Biology Society IEEE, Vol.1, Pp.856–859.
  25. Ratha, N.K., Connell, J.H. and Bolle, R.M. (2000) Secure data hiding in wavelet compressed fingerprint images, Proc.ACM Multimedia 2000 Workshops, Los Angeles, CA, Pp. 127-130
  26. Zebbiche, K. and Ghouti, L. et al. (2006) Protecting fingerprint data using watermarking, First NASA/ESA Conf. on Adaptive Hardware and Systems (AHS’06), Pp.451–456.
  27. Ateniese, G., Blundo, C., De Santis, A. and Stinson, D.R. (1996) Visual cryptography for general access structures, Information Computation, Vol. 129, Pp.86-106. Naor, M. and Pinkas, B. (1997) Visual authentication and identification, Advances in Cryptology CRYPTO’97, Lecture Notes in Computer Science, Vol. 1294, Pp. 322–336.
  28. Yang, C.N. (2010) Visual cryptography: An introduction to visual secret sharing schemes, Department of Computer Science and Information Engineering National Dong Hwa University Shoufeng, Hualien 974, TAIWAN, Last accessed on July 04, 2010, http://sna.csie.ndhu.edu.tw/~cnyang/vss/sld001.htm
  29. Luo, H., Lu, Z.M. and Pan, J.S. (2008) Multiple watermarking in visual cryptography, IWDW 2007, LNCS 5041, Shi, Y.Q., Kim, H.J. and Katzenbeisser, S. (Eds.), Springer-Verlag Berlin Heidelberg, Pp.60-70.
  30. Yang, C. (2002) A note on Efficient Color Visual Encryption, Vol.18, Pp 367- 372.
  31. Arivazhagan, S. and Ganesan, L. (2003) Texture classification using wavelet transform, Elsevier, Pattern Recognition letter, Vol.24, Pp.1513-1521.
  32. Naor, M. and Shamir, A. (1995) Visual cryptography, Advances in Cryptology - EUROCRYPT '94, A. De Santis, ed., Lecture Notes in Computer Science, Vol. 950, Pp. 1-12.
  33. Tai, G.C., Chang, L.W. Visual Cryptography for Digital Watermarking in Still Images, Advances in Multimedia Information Processing - PCM 2004, Category – Watermarking I, Lecture Notes in Computer Science, Springer Berlin / Heidelberg, vol. 3332, pp.50-57 (2005).
  34. Paul, N., Evans, D., Rubin, A., Wallach, D.: Authentication for remote voting, workshop on human-computer interaction and security systems, Fort Lauderdale, Florida, April (2003).
  35. Hawkes, L., Yasinsac, A., Cline, C.: An Application of Visual Cryptography to Financial Documents; technical report TR001001, Florida State University (2000).
  36. Bonnis, A., Santis, A.: Randomness in secret sharing and visual cryptography schemes, Theor. Comput. Sci, 314, pp 351-374 (2004).
  37. Naor, M., Pinkas, B.: Visual authentication and identification, Advances in Cryptology CRYPTO’97, Lecture Notes in Computer Science, vol. 1294, pp. 322–336 (1997).
  38. Houmansadr, A., Ghaemmaghami, S.: A Digital Image Watermarking Scheme Based on Visual Cryptography, International Symposium on Telecommunications, pp. 1-5 (2005).
  39. Zhang, Y. (1997) Adaptive Ordered Dither, Graphical, Models and Image Processing, Vol. 59, No. 1, Pp. 49-53.
  40. Velho, L. and Gomes, J. (1995) Stochastic screening dithering with adaptive clustering, Proceedings of SIGGRAPH-95, ACM Computer Graphics, Annual Conference Series, Pp. 273-276.
  41. Venkatesan, M., MeenakshiDevi, P., Duraiswamy, K. and Thyagarajah, K. (2008) Secure Authentication Watermarking for Binary Images using Pattern Matching, IJCSNS International Journal of Computer Science and Network Security, Vol.8, No.2, Pp. 241-250.
  42. Schneier, M. and Abdel-Mottaleb, M. (1996) Exploiting the JPEG compression scheme for image retrieval. IEEE Trans. Pattern Anal. Mach. Intell., Vol.18, No. 8, Pp. 849–853.
  43. Zhang, Y. (1998) Space-Filling Curve Ordered Dither, Elsevier, Computer & Graphics Journal, Vol. 22, No. 4, Pp. 559-563.
Index Terms

Computer Science
Information Sciences

Keywords

Discrete Wavelet Transformation Visual Cryptography Fingerprint Human Visual System Adaptive Order Dithering Algorithm