CFP last date
20 May 2024
Reseach Article

Multiple Watermark for Authentication and Tamper Detection using Mixed scales DWT

by M.El Hajji, H. Ouaha, K. Afdel, H.Douzi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 28 - Number 6
Year of Publication: 2011
Authors: M.El Hajji, H. Ouaha, K. Afdel, H.Douzi
10.5120/3389-4704

M.El Hajji, H. Ouaha, K. Afdel, H.Douzi . Multiple Watermark for Authentication and Tamper Detection using Mixed scales DWT. International Journal of Computer Applications. 28, 6 ( August 2011), 34-38. DOI=10.5120/3389-4704

@article{ 10.5120/3389-4704,
author = { M.El Hajji, H. Ouaha, K. Afdel, H.Douzi },
title = { Multiple Watermark for Authentication and Tamper Detection using Mixed scales DWT },
journal = { International Journal of Computer Applications },
issue_date = { August 2011 },
volume = { 28 },
number = { 6 },
month = { August },
year = { 2011 },
issn = { 0975-8887 },
pages = { 34-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume28/number6/3389-4704/ },
doi = { 10.5120/3389-4704 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:14:05.010313+05:30
%A M.El Hajji
%A H. Ouaha
%A K. Afdel
%A H.Douzi
%T Multiple Watermark for Authentication and Tamper Detection using Mixed scales DWT
%J International Journal of Computer Applications
%@ 0975-8887
%V 28
%N 6
%P 34-38
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Authentication of multimedia contents is introduced as a tool to improve the security against unauthorized manipulation and misappropriation. The risks increased when dealing with an open environment like the Internet. This paper proposes a multiple watermarking techniques using dominant blocks of wavelet coefficients in mixed scales and moment invariant methods as a complementary safety measure. The logic of use the blocks dominants map is that local features such as contours or edges are unique to each image. In addition, these dominants blocks have proven to be useful in detecting possible alteration in the temperate region of the image-based data.

References
  1. Jagadish Nayak, P Subbanna Bhat, Rajendra Acharya and Niranjan UC, Simultaneous storage of medical images in the spatial and frequency domain: A comparative study, BioMedical Engineering OnLine, 2004.
  2. Cox J, Miller ML, Bloom JA: Digital Watermarking. San Fransisco, CA: Morgan Kauffman, 2002.
  3. Knopp R, Robert A: Detection Theory and Digital Watermarking. Proceedings of SPIE, 2000, 3971:14-23.
  4. G. Coatrieux, H. Maitre, B. Sankur, Y. Rolland, R. Collorec, Relevance of Watermarking in Medical Imaging, in Proceedings of the IEEE EMBS Conf. on Information Technology Applications in Biomedicine, Arlington, USA, Nov. 2000, p. 250-255.
  5. Y. I. Khamlichi, M. Machkour, K. Afdel and A. Moudden, Multiple watermark for tamper detection in mammography image, WSEAS Trans. on Computers, Issue 6, Vol. 5, ISSN 1109-2750, pp. 1222-1226, June 2006.
  6. Samia Boucherkha and Mohamed Benmohamed, A Lossless Watermarking Based Authentication System For Medical Images, International Journal of signal processing, Vol. 1 Num. 4, 2004, 278-281, ISSN: 1304-4494.
  7. X. Q. Zhou, H. K. Huang, and S. L. Lou, Authenticity and Integrity of Digital Mammography Images, IEEE Transactions on Medical Imaging, Vol. 20, No. 8, August 2001, 784-791.
  8. H. Douzi, D. Mammass, F. Nouboud, Faber-Schauder wavelet transformation application to edge detection and image characterization, Journal of Mathematical Imaging and Vision, Kluwer Academic Press, pp 91-102 ,Volume 14, no2, (2001).
  9. S. G. Mallat. Multifrequency channel decompositions of images and wavelet models. IEEETrans. Acoust. Speech Signal Process., 37(12):2091, 2110, 1989.
  10. M. El hajji, H. Douzi, R. Harba , Watermarking based on the density coefficients of Faber-Schauder wavelets, ICISP 2008: Lecture Notes in Computer Science, 455-462.
  11. Chang-Tsun Li, Der-Chyuan Lou, and Jiang-Lung Liu , Image Integrity and Authenticity Verification via Content-Based Watermarks and a Public Key Cryptosystem, in Journal of Chinese Institute of Electrical Engineering, vol 10, no. 1, 2003, pp 99-106.
  12. J. Daemen, V. Rijmen, (1999, September 03). AES Proposal Rijndael, Networks (2nd)
  13. Online.Available: http://csrc.nist.gov/CryptoToolkit/aes/index.html.
Index Terms

Computer Science
Information Sciences

Keywords

Watermarking Authentication Content-Based Wavelet