![]() |
10.5120/8835-3053 |
Chittaranjan Pradhan, Vilakshan Saxena and Ajay Kumar Bisoi. Article: Imperceptible Watermarking Technique using Arnold’s Transform and Cross Chaos Map in DCT Domain. International Journal of Computer Applications 55(15):50-53, October 2012. Full text available. BibTeX
@article{key:article, author = {Chittaranjan Pradhan and Vilakshan Saxena and Ajay Kumar Bisoi}, title = {Article: Imperceptible Watermarking Technique using Arnold’s Transform and Cross Chaos Map in DCT Domain}, journal = {International Journal of Computer Applications}, year = {2012}, volume = {55}, number = {15}, pages = {50-53}, month = {October}, note = {Full text available} }
Abstract
Digital watermarking is the process of embedding secret information into a digital signal which may be used to verify its authenticity or the identity of its owners. In this paper, we have taken image as the medium of watermarking. Here, we have discussed an imperceptible watermarking technique by using double encryptions in DCT domain. For the encryption process, Arnold's transform and Cross chaos map are used. Like other algorithms, this one is also evaluated by Peak signal to noise ratio (PSNR). From the experimental results, it can be proved that this algorithm gives better PSNR value, which makes the algorithm to imperceptible.
References
- A. Nag, S. Biswas, D. Sarkar, P. P. Sarkar, "A novel technique for image steganography based on Block-DCT and Huffman Encoding", International Journal of Computer Science and Information Technology, June 2010, vol. 2, no. 3, pp. 103-112
- Frank Y. Shih, Digital Watermarking and Steganography, CRC Press, 2012, isbn: 1-4200-4757-4
- Gabriel Peterson, "Arnold's cat map survey", Math 45-Linear Algebra, Fall 1997, pp. 1-7
- Jianhu Song and Yong Zhu, "A Digital Watermarking Method by Double Encryption Based on Arnold and Chaos in DCT domain", Applied Mechanics and Materials, 2011, vol. 65, pp. 104-107
- Kuldeep Singh, Komalpreet Kaur, "Image Encryption using Chaotic Maps and DNA Addition Operation and Noise Effects on it", International Journal of Computer Applications, June 2011, vol. 23, no. 6, pp. 17-24
- M. Al Baloshi, M. E. Al-Maulla, "A DCT-Based Watermarking Technique for Image Authentication", International Conference on Computer Systems and Applications", IEEE, 2007, pp. 754-760
- S. Singh, T. J. Siddiqui, R. Singh, H. V. Singh, "DCT-domain robust data hiding using chaotic sequence", International Conference on Multimedia, Signal Processing and Communication Technologies, IEEE, 2011, pp. 300-303
- Siddharth Singh, Tanveer J. Siddiqui, "A Security Enhanced Robust Steganography Algorithm for Data Hiding", International Journal of Computer Science Issues, May 2012, vol. 9, issue. 3, no. 1, pp. 131-139