CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Integrated Normalized Content System for Efficient Watermarking

by G. Rosline Nesakumari, S. Rajendran, V. Vijayakumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 53 - Number 15
Year of Publication: 2012
Authors: G. Rosline Nesakumari, S. Rajendran, V. Vijayakumar
10.5120/8500-2448

G. Rosline Nesakumari, S. Rajendran, V. Vijayakumar . Integrated Normalized Content System for Efficient Watermarking. International Journal of Computer Applications. 53, 15 ( September 2012), 33-39. DOI=10.5120/8500-2448

@article{ 10.5120/8500-2448,
author = { G. Rosline Nesakumari, S. Rajendran, V. Vijayakumar },
title = { Integrated Normalized Content System for Efficient Watermarking },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 53 },
number = { 15 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 33-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume53/number15/8500-2448/ },
doi = { 10.5120/8500-2448 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:54:12.572794+05:30
%A G. Rosline Nesakumari
%A S. Rajendran
%A V. Vijayakumar
%T Integrated Normalized Content System for Efficient Watermarking
%J International Journal of Computer Applications
%@ 0975-8887
%V 53
%N 15
%P 33-39
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In contemporary years, different watermarking schemes are proposed for image authentication and copyright protection. In images, any tiny change to the content is not acceptable; the embedding distortion has to be compensated for perfectly. In this paper a powerful Image watermarking method using DWT based on integrated normalized content based chaotic (DWT- INCC) system is proposed, to obtain better digital content authentication, originality, higher embedding capacity, quality of the information and better robustness. The objective of the proposed integrated scheme is to examine how content image normalization and discrete wavelet domain based chaotic system procedure are used to enhance robustness of a digital image watermark especially for statistical attacks. The proposed integrated scheme consists of four stages. In the stage two image normalization is performed, to achieve the scaling and rotational invariance. In stage two DWT is applied on the normalized image. In stage three a block based content authentication scheme is adopted on the normalized image of stage one for image authentication and tamper localization. In stage four chaotic models is adopted on the stage three to achieve excellent robustness against any statistical attacks and to increase the security of the digital watermarking system. The experimental result shows that the proposed DWT-INCC method is more robust and effective even in the presence of various attacks when compared with many existing methods.

References
  1. S. W. Foo, H. S. Muh, and N. M. Mei "Image watermarking using timefrequency compression expansion" IEEE International Symposium on Circuits and Systems, 2004, pp. 201-204.
  2. S. W. Foo, X. Feng, and M. Li "A blind imagewatermarking scheme using peak point extraction", IEEE International Symposium on Circuits and Systems, 2005, pp. 4409-4412.
  3. M. Acevedo, "Image watermarking: properties, techniques and evaluation. ultimedia security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property, Idea Group Publishing. Pennsylvania, 2005.
  4. S. W. Foo, Y. T. Hee, and H. D. Yan, "An adaptive image watermarking system", IEEE Tencon 2005, pp. 509-513.
  5. N. Cvejic and T. Seppänen, "Audio watermarking: requirement, algorithms, and benchmarking". Digital watermarking for digital media, Information Science Publishing, Pennsylvania, 2005.
  6. A. Michael, M. Schmucker and D. Wolthusen, "Techniques and applications and Digital Watermarking and content protection", Brithich library Cataloguing in publication data, Artech House computer security series, ISBN 1-58053-111-3. 685 Canton Street, Norwood, MA 02062.
  7. Z. Xiong, K. Ramchandran, M. T. Orchard and Y Zhang, "A comparative study of DCT- and wavelet-based image coding", IEEE Trans. on Circuits and Systems for Video Technology, Vol. 9 No. 5, August, 1999
  8. K. Matsui and K. Tanaka. "Video-Steganography: How to secretly embed a signature in a picture" in IMA Intellectual Property Project Proceedings, January 1994, pp. 187-206.
  9. S. Pereira and T. Pun, "Robust Template Matching for Affine Resistant Image Watermarks", IEEE Transactions on Image Processing, Vol. 9 No. 6, 2000, pp. 1123-1129.
  10. D. Zheng, Y. Liu, J. Zhao, and A. E. Saddik, "A survey of RST invariant image watermarking algorithm," ACM Comput. Surv. , vol. 39, no. 2, pp. 1–91, Jun. 2007, Article 5.
  11. S. Maruthuperumal , Dr. V. Vijayakumar & B. Vijayakumar (2012)," Sorted Pixel Value Difference on Fuzzy Watermarking Scheme ", Global Journal of Computer Science and Technology,Volume 12 Issue 4 Version 1. 0 Fabruary.
  12. S. Maruthuperumal, B. Vijayakumar, Dr. V. Vijayakumar , " Significant Wavelet Hierarchical Approach Using Even Odd Method for Watermarking, International Journal of Scientific & Engineering Research Volume 3, Issue 4, April-2012.
  13. S. MaruthuPerumal, Dr. V. Vijayakumar, L. Sumalatha, "Image Watermarking Based on Simplified Significant Wavelet Tree Quantization", (IJCSIS) International Journal of Computer Science and Information Security Vol. 10, No. 2, 2012.
  14. Yeung. M. M. , et al. (1997), "Digital Watermarking for High-Quality Imaging", Proc. IEEE First Workshop on Multimedia Signal Processing, June Princeton, New Jersey, pp- 357-362
  15. Yamanaka. O, Yamaguchi. T, Maeda. J, Suzuki. Y (2008), "Image compression using wavelet transform and vector quantization with variable block size", IEEE Conference on Soft Computing in Industrial Applications (SMCia),, Page(s): 359 – 364.
  16. Xie. L and Arce. G. R (1998), "Joint wavelet compression and authentication watermarking," in Proc. IEEE Int. Conf. Image Processing, vol. 2, Oct. , pp. 427–431.
  17. Walton, S. , (1995), "Information authentication for a slippery new age", Dr. Dobbs J. 20 (4), 18–26.
  18. X. Dai and S. Khorram, "A feature-based image registration algorithm using improved chain-code representation combined with invariant moments," IEEE Trans. Geosci. emote Sens. , vol. 37, no. 5, pp. 2351–2362, May 1999.
  19. M. Alghoniemy and A. H. Tewfik, "Geometric invariance in image watermarking,"IEEE Trans. Image Process. , vol. 13, no. 2, pp. 145– 153,Feb. 2004.
  20. M. Alghoniemy and A. H. Tewfik, "Image Watermarking by moment Invariants" Proceedings of IEEE international conference on Image Processing, Vancouver, 2000.
  21. P. Bas, J. M. Chassery and B. Macq, "Geometrically Invariant Watermarking using Feature Points", IEEE Trans. on Image Processing, Vol. 9, 2002.
  22. Ping Dong and Galatsanos, N. P. , "Affine transformation resistant watermarking based on image normalization", Image Processing. 2002. Proceedings. 2002 International Conference on, vol. 3, 24-28 June 2002
  23. Rothe, I. ; Susse, H. ; Voss, K. , "The method of normalization to determine invariants", in IEEE Trans. on Pattern Analysis andMachine Intelligence, vol. 18, no. 4, April 1996, pp. 366 – 376
  24. Latha Parameswaran, and K. Anbumani (2006)," A Robust Image Watermarking Scheme using Image Moment Normalization " , World Academy of Science and Technology 19,PP. 112-116.
  25. Say Wei Foo, Qi Dong (2010)," A Normalization-based Robust Image Watermarking Scheme Using SVD and DCT", International Journal of Information and Communication Engineering 6:4 pp. 207-210.
  26. Chun-Shien Lu (2004), "Towards Robust Image Watermarking Combining Content-Dependent Key, Moment Normalization, and Side-Informed Embedding", Technical Report ,Istitute of Information science,Taiwan.
  27. C. C. Chang, Y. S. Hu, T. C. Lu, "A Watermarking based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27(5) (2006) 439-446.
  28. Xianyong Wu , Zhi-Hong Gua (2007) , "A novel digital watermark algorithm based on chaotic maps," Physics Letters A .
Index Terms

Computer Science
Information Sciences

Keywords

Discrete Wavelet Transformation Normalization Content authentication and Chaotic System