CFP last date
20 May 2024
Reseach Article

Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of Elliptic Curve Cryptography (ECC)

by Arathi Chitla, M. Chandra Mohan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 6
Year of Publication: 2012
Authors: Arathi Chitla, M. Chandra Mohan
10.5120/9118-3275

Arathi Chitla, M. Chandra Mohan . Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of Elliptic Curve Cryptography (ECC). International Journal of Computer Applications. 57, 6 ( November 2012), 17-25. DOI=10.5120/9118-3275

@article{ 10.5120/9118-3275,
author = { Arathi Chitla, M. Chandra Mohan },
title = { Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of Elliptic Curve Cryptography (ECC) },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 6 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 17-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number6/9118-3275/ },
doi = { 10.5120/9118-3275 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:59:43.950979+05:30
%A Arathi Chitla
%A M. Chandra Mohan
%T Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of Elliptic Curve Cryptography (ECC)
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 6
%P 17-25
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A novel lossless watermarking image authentication technique is proposed in this paper. The proposed method allows exact recovery of the original information from the image without loss in their quality. For authenticating the information, a well known Elliptic Curve Cryptography (ECC) is utilized. The ECC method authenticates the information by generating signature and signed messages. After the authentication process, the data embedding process is performed, in which the computed information is inserted into the image data. The data embedding process is accomplished by the well known LSB (least significant bit) modification, which embeds the information bits to the image data. Subsequently, the recovery and the verification processes are carried out to find out whether the watermarked image is authenticated or not. The effectiveness of the proposed technique using ECC image authentication along with lossless Least Significant Bit (LSB) data embedding is evaluated. Also, the proposed LWM image authentication technique is compared with the conventional LWM technique. The comparison result shows that our proposed technique can retrieve the image with high PSNR value than the image retrieved by the conventional technique.

References
  1. Rosline Nesa Kumari, Vijaya Kumar, Sumalatha and Krishna, "Secure and Robust Digital Watermarking on Grey Level Images", International Journal of Advanced Science and Technology, Vol. 11, October, 2009
  2. Ashish Bansal , Sarita Singh Bhadauria, "Watermarking Using Neural Network and Hiding the Trained Network within the Cover Image", Journal of Theoretical and Applied Information Technology, pp63-670, 2008
  3. A. Arulmurugan, N. Arul, P. Santhosh kumar, "Robust Image Watermarking in contourlet Domain Using Genetic Algorithm", Global Journal of Computer Science and Technology, Vol. 11, No. 9 , May 2011
  4. Mir Shahriar Emami, Ghazali Bin Sulong, "Set Removal Attack: A New Geometric Watermarking Attack", 2011 International Conference on Future Information Technology IPCSIT, vol. 13, IACSIT Press, Singapore, 2011
  5. K. Ganesan and Tarun Kumar Guptha, "Multiple Binary Images Watermarking in Spatial and Frequency Domains", Signal & Image Processing : An International Journal(SIPIJ), Vol. 1, No. 2, December 2010
  6. Eugene T. Lin and Edward J. Delp, "A Review of Fragile Image Watermarks", Proceedings of the Multimedia and Security Workshop, 1999
  7. Jian-Guo Cao, James E. Fowler and Nicholas H. Younan, "An Image-Adaptive Watermark Based On A Redundant Wavelet Transform", Proceedings of the IEEE International Conference on Image Processing, , pp. 277-280 , Thessaloniki, Greece, October 2001
  8. Suhad Hajjara, Moussa Abdallah, Amjad Hudaib, "Digital Image Watermarking Using Localized Biorthogonal Wavelets", European Journal of Scientific Research, Vol. 26, No. 4 , pp. 594-608, 2009
  9. Ersin ELBAS¸ "Robust multimedia watermarking: Hidden Markov model approach for video sequences", Turk J Elec Eng & Comp Sci, Vol. 18, No. 2, 2010
  10. F?nd?k, smail Baba and Erkan Ülker, "A digital robust image watermarking against desynchronization attacks", Scientific Research and Essays, Vol. 5, No. 16, pp. 2288-2294, 18 August, 2010
  11. Sachin Goyal, Roopam Gupta, Ashish Bansal, "Application of Genetic Algorithm to Optimize Robustness and Fidelity of Watermarked Images", /International Journal on Computer Science and Engineering Vol. 1, No. 3, pp. 239-242, 2009
  12. Jaseena K. U. , Anita John, "An Invisible Zero Watermarking Algorithm using Combined Image and Text for Protecting Text Documents", International Journal on Computer Science and Engineering (IJCSE), Vol. 3, No. 6 , June 2011
  13. A. Essaouabi1, E. Ibnelhaj2,F. regragui, "Digital Image Watermarking for Arbitrarily Shaped Objects Based On SA-DWT", IJCSI International Journal of Computer Science , Vol. 5, 2009
  14. Aree Ali Mohammed, Haval Mohammed Sidqi, "Robust Image Watermarking Scheme Based on Wavelet Technique", International Journal of Computer Science and Security (IJCSS), Vol. 5, No. 4, 2011
  15. Sangeeta Jadhav, Anjali Bhalchandra, "Robust Digital Image-Adaptive Watermarking Using BSS Based Extraction Technique", International Journal of Image Processing (IJIP) , Vol. 4, No. 1, pp77-88, 2010
  16. Todor Todorov, "Spread Spectrum Watermarking Technique for Information System Securing", International Journal of Information Theories & Applications, Vol. 11, No. 4, pp. 405-408, 2004
  17. J. Samuel Manoharan, Kezi C. Vijila, A. Sathesh, "Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding Techniques towards Geometric Attacks", International Journal of Security (IJS), Vol. 4, No. 3, 2009
  18. Mona M. Soliman, Aboul Ella Hassanien, Neveen I. Ghali and Hoda M. Onsi, "An adaptive Watermarking Approach for Medical Imaging Using Swarm Intelligent", International Journal of Smart Home, Vol. 6, No. 1, pp. 37-50, January, 2012
  19. Umaamaheshvari and Thanushkodi, "High Performance and Effective Watermarking Scheme for Medical Images", European Journal of Scientific Research, Vol. 67, No. 2, pp. 283-293, 2012
  20. Sajjad Dadkhah, Azizah Abd Manaf and Somayeh Sadeghi, "Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking", International Journal of Computer Science , Vol. 9, No 2, January 2012
  21. Sujatha and Mohamed Sathik, "A Novel DWT Based Blind Watermarking for Image Authentication", International Journal of Network Security, Vol. 14, No. 4, PP. 223-228, July 2012
  22. Amal Khalifa and Safwat Hamad, "A Robust Non-blind Algorithm for Watermarking Color Images using Multi-resolution Wavelet Decomposition", International Journal of Computer Applications, Vol. 37, No. 8, January 2012
  23. Mehmet Utku Celik, Gaurav Sharma, and A. Murat Tekalp, "Lossless Watermarking for Image Authentication: A New Framework and an Implementation", IEEE Transactions on Image Processing, Vol. 15, No. 4, pp. 1042-1049, April 2006
  24. Mehmet Utku Celik, Gaurav Sharma and Murat Tekalp, "Lossless Watermarking for Image Authentication: A New Framework and an Implementation", IEEE Transactions on Image Processing, Vol. 15, No. 4, pp. 1042-1049, 2006
Index Terms

Computer Science
Information Sciences

Keywords

Lossless Watermarking (LWM) Elliptic Curve Cryptography (ECC) Signature Generation Algorithm Raster Scanning Image Authentication