Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of Elliptic Curve Cryptography (ECC)

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 57 - Number 6
Year of Publication: 2012
Authors:
Arathi Chitla
M. Chandra Mohan
10.5120/9118-3275

Arathi Chitla and Chandra M Mohan. Article: Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of Elliptic Curve Cryptography (ECC). International Journal of Computer Applications 57(6):17-25, November 2012. Full text available. BibTeX

@article{key:article,
	author = {Arathi Chitla and M. Chandra Mohan},
	title = {Article: Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of Elliptic Curve Cryptography (ECC)},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {57},
	number = {6},
	pages = {17-25},
	month = {November},
	note = {Full text available}
}

Abstract

A novel lossless watermarking image authentication technique is proposed in this paper. The proposed method allows exact recovery of the original information from the image without loss in their quality. For authenticating the information, a well known Elliptic Curve Cryptography (ECC) is utilized. The ECC method authenticates the information by generating signature and signed messages. After the authentication process, the data embedding process is performed, in which the computed information is inserted into the image data. The data embedding process is accomplished by the well known LSB (least significant bit) modification, which embeds the information bits to the image data. Subsequently, the recovery and the verification processes are carried out to find out whether the watermarked image is authenticated or not. The effectiveness of the proposed technique using ECC image authentication along with lossless Least Significant Bit (LSB) data embedding is evaluated. Also, the proposed LWM image authentication technique is compared with the conventional LWM technique. The comparison result shows that our proposed technique can retrieve the image with high PSNR value than the image retrieved by the conventional technique.

References

  • Rosline Nesa Kumari, Vijaya Kumar, Sumalatha and Krishna, "Secure and Robust Digital Watermarking on Grey Level Images", International Journal of Advanced Science and Technology, Vol. 11, October, 2009
  • Ashish Bansal , Sarita Singh Bhadauria, "Watermarking Using Neural Network and Hiding the Trained Network within the Cover Image", Journal of Theoretical and Applied Information Technology, pp63-670, 2008
  • A. Arulmurugan, N. Arul, P. Santhosh kumar, "Robust Image Watermarking in contourlet Domain Using Genetic Algorithm", Global Journal of Computer Science and Technology, Vol. 11, No. 9 , May 2011
  • Mir Shahriar Emami, Ghazali Bin Sulong, "Set Removal Attack: A New Geometric Watermarking Attack", 2011 International Conference on Future Information Technology IPCSIT, vol. 13, IACSIT Press, Singapore, 2011
  • K. Ganesan and Tarun Kumar Guptha, "Multiple Binary Images Watermarking in Spatial and Frequency Domains", Signal & Image Processing : An International Journal(SIPIJ), Vol. 1, No. 2, December 2010
  • Eugene T. Lin and Edward J. Delp, "A Review of Fragile Image Watermarks", Proceedings of the Multimedia and Security Workshop, 1999
  • Jian-Guo Cao, James E. Fowler and Nicholas H. Younan, "An Image-Adaptive Watermark Based On A Redundant Wavelet Transform", Proceedings of the IEEE International Conference on Image Processing, , pp. 277-280 , Thessaloniki, Greece, October 2001
  • Suhad Hajjara, Moussa Abdallah, Amjad Hudaib, "Digital Image Watermarking Using Localized Biorthogonal Wavelets", European Journal of Scientific Research, Vol. 26, No. 4 , pp. 594-608, 2009
  • Ersin ELBAS¸ "Robust multimedia watermarking: Hidden Markov model approach for video sequences", Turk J Elec Eng & Comp Sci, Vol. 18, No. 2, 2010
  • F?nd?k, smail Baba and Erkan Ülker, "A digital robust image watermarking against desynchronization attacks", Scientific Research and Essays, Vol. 5, No. 16, pp. 2288-2294, 18 August, 2010
  • Sachin Goyal, Roopam Gupta, Ashish Bansal, "Application of Genetic Algorithm to Optimize Robustness and Fidelity of Watermarked Images", /International Journal on Computer Science and Engineering Vol. 1, No. 3, pp. 239-242, 2009
  • Jaseena K. U. , Anita John, "An Invisible Zero Watermarking Algorithm using Combined Image and Text for Protecting Text Documents", International Journal on Computer Science and Engineering (IJCSE), Vol. 3, No. 6 , June 2011
  • A. Essaouabi1, E. Ibnelhaj2,F. regragui, "Digital Image Watermarking for Arbitrarily Shaped Objects Based On SA-DWT", IJCSI International Journal of Computer Science , Vol. 5, 2009
  • Aree Ali Mohammed, Haval Mohammed Sidqi, "Robust Image Watermarking Scheme Based on Wavelet Technique", International Journal of Computer Science and Security (IJCSS), Vol. 5, No. 4, 2011
  • Sangeeta Jadhav, Anjali Bhalchandra, "Robust Digital Image-Adaptive Watermarking Using BSS Based Extraction Technique", International Journal of Image Processing (IJIP) , Vol. 4, No. 1, pp77-88, 2010
  • Todor Todorov, "Spread Spectrum Watermarking Technique for Information System Securing", International Journal of Information Theories & Applications, Vol. 11, No. 4, pp. 405-408, 2004
  • J. Samuel Manoharan, Kezi C. Vijila, A. Sathesh, "Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding Techniques towards Geometric Attacks", International Journal of Security (IJS), Vol. 4, No. 3, 2009
  • Mona M. Soliman, Aboul Ella Hassanien, Neveen I. Ghali and Hoda M. Onsi, "An adaptive Watermarking Approach for Medical Imaging Using Swarm Intelligent", International Journal of Smart Home, Vol. 6, No. 1, pp. 37-50, January, 2012
  • Umaamaheshvari and Thanushkodi, "High Performance and Effective Watermarking Scheme for Medical Images", European Journal of Scientific Research, Vol. 67, No. 2, pp. 283-293, 2012
  • Sajjad Dadkhah, Azizah Abd Manaf and Somayeh Sadeghi, "Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking", International Journal of Computer Science , Vol. 9, No 2, January 2012
  • Sujatha and Mohamed Sathik, "A Novel DWT Based Blind Watermarking for Image Authentication", International Journal of Network Security, Vol. 14, No. 4, PP. 223-228, July 2012
  • Amal Khalifa and Safwat Hamad, "A Robust Non-blind Algorithm for Watermarking Color Images using Multi-resolution Wavelet Decomposition", International Journal of Computer Applications, Vol. 37, No. 8, January 2012
  • Mehmet Utku Celik, Gaurav Sharma, and A. Murat Tekalp, "Lossless Watermarking for Image Authentication: A New Framework and an Implementation", IEEE Transactions on Image Processing, Vol. 15, No. 4, pp. 1042-1049, April 2006
  • Mehmet Utku Celik, Gaurav Sharma and Murat Tekalp, "Lossless Watermarking for Image Authentication: A New Framework and an Implementation", IEEE Transactions on Image Processing, Vol. 15, No. 4, pp. 1042-1049, 2006