CFP last date
22 April 2024
Reseach Article

Protection Mechanism Using Cryptography and Robust Watermarking for Color images

Published on May 2012 by Rajesh Malik, Sonal Chugh
National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
Foundation of Computer Science USA
RTMC - Number 9
May 2012
Authors: Rajesh Malik, Sonal Chugh
42ef948e-4258-4c68-8e25-e8e45a0208fe

Rajesh Malik, Sonal Chugh . Protection Mechanism Using Cryptography and Robust Watermarking for Color images. National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 9 (May 2012), 27-29.

@article{
author = { Rajesh Malik, Sonal Chugh },
title = { Protection Mechanism Using Cryptography and Robust Watermarking for Color images },
journal = { National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 },
issue_date = { May 2012 },
volume = { RTMC },
number = { 9 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 27-29 },
numpages = 3,
url = { /proceedings/rtmc/number9/6687-1074/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%A Rajesh Malik
%A Sonal Chugh
%T Protection Mechanism Using Cryptography and Robust Watermarking for Color images
%J National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%@ 0975-8887
%V RTMC
%N 9
%P 27-29
%D 2012
%I International Journal of Computer Applications
Abstract

Exchange of large amount of multimedia data have become feasible with the explosive growth of internet technology. People can easily copy and modify the digital product which leads to the piracy problems which is spreading over the internet and thus poses a great threat to the ownership rights. Digital Right Management (DMR) has emerged to raise the issues regarding intellectual property rights. In this paper, a two tier protection mechanism has been proposed that uses both cryptography and robust watermarking simultaneously to provide effective protection mechanism for DMR. In this the binary information is kept hidden in the color image using a secret key by firstly converting into a scrambled code that can be securely extracted and authenticated. Compare the two images to access its quality and to check if the quality needs improvement. Also to check if the proposed method can survive under various intentional or unintentional attacks.

References
  1. Effective and Ineffective Digital Watermarks by Fred Mintzer,Gordon W. Braudaway and Minerva M. Yeung IBM T. J. Watson Research Center,P. O Box 218,Yorktown Heights, NY10598 1997 IEEE
  2. An Asymmetric Watermarking Scheme based on Visual Cryptography Young-Chang HOU+ Department of Information Management, National Central University, e-mail: ychou@im. mgt. ncu. edu. tw and Pei-Min Chen*Department of Computer and Information Science, SooChow University, e-mail: cpm@cis. scu. edu. tw. Proceedings of ICSP2000. .
  3. Blind Watermarking Method Using Partitioned DCT Cchannels Zolthn Rozsnyik( l), Istv6n LovAnyi(2) Budapest University of Technology and Economics Dept. of Control Engineering and Information Technology VIPromCom-2002,4th EURASIP - IEEE Region 8 International Symposium on Video I Image Processing and Multimedia Communications, 16-19 June 2002, Zadar, Croatia.
  4. Joint Visual Cryptography and Watermarking Ming Sun Fu. Oscar C. Au* Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong, China. 2004 IEEE International Conference on Multimedia and Expo (ICME.
  5. A New Blind Image Watermarking Technique for Dual Watermarks Using Low-Frequency Band DCT Coefficients Ahmed N. Al-Gindy, Ayman Tawfik Hussain Al Ahmad and Rami A. Qahwaji 1-4244-1378-8/07/$25. 00 ©2007 IEEE.
  6. A New Blind Image Watermarking Technique for Dual Watermarks Using Low-Frequency Band DCT Coefficients Ahmed N. Al-Gindy, Ayman Tawfik Hussain Al Ahmad and Rami A. Qahwaji 1-4244-1378-8/07/$25. 00 ©2007 IEEE
  7. CryptMark: A Novel Secure Invisible Watermarking Technique for Color Images Saraju P. Mohanty Dept. of Computer Science and Engineering R. Sheth, A. Pinto, and M. Chandy Dept. of Information Technology in IEEE 2007
Index Terms

Computer Science
Information Sciences

Keywords

Digital Right Management Robust Watermarking Cryptography Discrete Cosine Transform.