CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

The Effect of Watermark Embedding on Signature Generation in Image Association Technique of Copyright Protection System

by Mamoun Suleiman Al Rababaa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 11
Year of Publication: 2014
Authors: Mamoun Suleiman Al Rababaa
10.5120/15922-4148

Mamoun Suleiman Al Rababaa . The Effect of Watermark Embedding on Signature Generation in Image Association Technique of Copyright Protection System. International Journal of Computer Applications. 91, 11 ( April 2014), 1-8. DOI=10.5120/15922-4148

@article{ 10.5120/15922-4148,
author = { Mamoun Suleiman Al Rababaa },
title = { The Effect of Watermark Embedding on Signature Generation in Image Association Technique of Copyright Protection System },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 11 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number11/15922-4148/ },
doi = { 10.5120/15922-4148 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:12:26.458191+05:30
%A Mamoun Suleiman Al Rababaa
%T The Effect of Watermark Embedding on Signature Generation in Image Association Technique of Copyright Protection System
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 11
%P 1-8
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The current research enhances the performance of an already proposed image protection system presented earlier. The former system relies on an association technique instead of embedding owner signature inside an image like traditional watermarking methods. Thus, it retains secured image characteristics against any type of tampering two additional units are involved at the second phase of the former system operation. The main functions of those two units are to resize and reform the image as a preprocessing before submitting it to common processing of signature generation. Neural network structures are used to build those two units. A method of data compression is used to save time and generalization feature of neural network. Samples of pixels with their encoded coordinates are used to construct a data base used for the training purpose where the relative coordinate is used instead of the absolute address of the pixels and then encoded to determine a useful data suitable for neural network processing. Major conclusion remarks are discussed to highlight the most significant recommendations needed for future work.

References
  1. Hsiang-Cheh Huang and etal. , "Copyright Protection with EXIF Metadata and Error Control Codes", International Conference on Security Technology, 2008.
  2. Aditya Vashistha, Rajarathnam Nallusamy, and Sanjoy Paul," NoMark: A Novel Method for Copyright Protection of Digital Videos Without Embedding Data", IEEE International Symposium on Multimedia 2010.
  3. Mn-Ta Lee and Shih-Syong Chen, "Image Copyright Protection Scheme Using Sobel Technology and Genetic Algorithm "International Symposium on Computer, Communication, Control and Automation2010.
  4. Charlie Obimbo and Behzad Salami, "DIGICOP: A Copyright Protection Algorithm for Digital Images", TIC-STH 2009.
  5. Cox I. J. , M. L. Miller, J. M. G. Linnartz, T. Kalker, "A Review of Watermarking Principles and Practices" in Digital Signal Processing for Multimedia Systems, Ed, K. K. Parhi, T. Nishitani, New York, Marcel Dekker, Inc. , 1999, pp 461-482.
  6. M. Kutter, F. Hartung, "Introduction to Watermarking Techniques", in Information Techniques for Steganography and Digital Watermarking, S. C. Katzenbeisser et al. , Eds. Northwood, MA: Artec House, Dec. 1999, pp 97-119.
  7. Abdallah Saleem Nawaf Al-Tahan Al-Nu'aimi and Rami Qahwaji, "Green Channel Watermarking to Overcome the Problem of Multiple Claims of Ownership for Digital Coloured Images", 2009 International Conference on CyberWorlds, International Conference on CyberWorlds, 7-11 Sep. , 2009, Bradford, UK , PP339-344, ISBN: 978-0-7695-3791-7. DOI 10. 1109/CW. 2009. 60
  8. Rongen, P. M. J. , Maes, M. J. , van Overveld, K. W. : Digital image watermarking by salient point modification: practical results. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents, vol. 3657, pp. 273-282 (1999).
  9. Ali Al-Haj and Ahmad Mohammad, "Digital Audio Watermarking Based on the Discrete Wavelets Transform and Singular Value Decomposition", European Journal of Scientific Research, Vol. 39 No. 1 (2010), pp. 6-21, ISSN 1450-216X, http://www. eurojournals. com/ejsr. htm
  10. Tilki, JF, & Beex, A. (1996). Encoding a hidden digital signature using psychoacoustic masking. Proceedings of the 7th International Conference on Signal Processing Applications and Technology, 476-480.
  11. Tao B. and Dickinson B. , "Adaptive, "Watermarking in DCT Domain", Proc. Of IEEE International Conf. on Acoustics, Speech and Signal Processing, ICASSP-97, Vol. 4, pp. 1985-2988, 1997.
  12. Mei Jiansheng, Li Sukang and Tan Xiaomei, "A Digital Watermarking Algorithm Based On DCT and DWT", Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA'09), Nanchang, P. R. China, May 22-24, 2009, pp. 104-107, ISBN 978-952-5726-00-8.
Index Terms

Computer Science
Information Sciences

Keywords

Watermarking Copyright Digital Signature.