Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

An Encryption Based Technique for Invisible Digital Watermarking

Print
PDF
CASCT
© 2010 by IJCA Journal
Number 1 - Article 5
Year of Publication: 2010
Authors:
Samir Kumar Bandyopadhyay
Tuhin Utsab Paul
Avishek Raychoudhury
10.5120/995-28

Samir Kumar Bandyopadhyay Tuhin Utsab Paul Avishek Raychoudhury. Article: An Encryption Based Technique for Invisible Digital Watermarking. IJCA,Special Issue on CASCT (1):24–28, 2010. Published By Foundation of Computer Science. BibTeX

@article{key:article,
	author = {Tuhin Utsab Paul, Avishek Raychoudhury, Samir Kumar Bandyopadhyay},
	title = {Article: An Encryption Based Technique for Invisible Digital Watermarking},
	journal = {IJCA,Special Issue on CASCT},
	year = {2010},
	number = {1},
	pages = {24--28},
	note = {Published By Foundation of Computer Science}
}

Abstract

In this paper, a technique for hiding the data of images has been proposed. The proposed method is used to hide an image file entirely with in another image file keeping two considerations in mind, which are Size and Degree of Security. At the source, the image that is to be hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be of any size, which will be adjusted by our resize function thereby, removing the size constraint. Secondly, for the security of transmission over network, only the final encrypted image i.e. cover image and target image is sent over the network. This image is easily decoded at the receiver end. Results are encouraging from practical point of view.

Reference

  • Dobsicek, M., Extended steganographic system. In: 8th Intl. Student Conf. on Electrical Engineering, FEE CTU 2004, Poster 04.
  • 2. Yusuk Lim, Changsheng Xu and David Dagan Feng, “Web based Image Authentication Using Invisible Fragile Watermark”, 2001, Pan-Sydney Area Workshop on Visual Information Processing (VIP2001), Sydney, Australia, Page(s): 31 - 34
  • 3. Min Wu, Member, IEEE, and Bede Liu, Fellow, IEEE, “Data Hiding in Binary Image for Authentication and Annotation”, IEEE Trans. Image Processing, volume 6, Issue 4, Aug. 2004 Page(s): 528 - 538
  • 4. Rehab H. Alwan, Fadhil J. Kadhim, and Ahmad T. Al-Taani, “Data Embedding Based on Better Use of Bits in Image Pixels”, International Journal of Signal Processing Vol 2, No. 2, 2005, Page(s): 104 - 107
  • 5. Nameer N. EL-Emam "Hiding a large amount of data with high security using steganography algorithm", Journal of Computer Science. April 2007, Page(s): 223 – 232
  • S.K.Bandyopadhyay, Debnath Bhattacharyya, Swarnendu Mukherjee, Debashis Ganguly, PoulumiDas, "A Secure Scheme for Image Transformation", August 2008, IEEE SNPD, Page(s): 490 – 493
  • G. Sahoo, R. K. Tiwari, "Designing an Embedded Algorithm for Data Hiding using Steganographic
  • Technique by File Hybridization", January 2008, IJCSNS, Vol. 8, No. 1,Page(s): 228 – 2336. S.K.Bandyopadhyay, Debnath Bhattacharyya, Swarnendu Mukherjee, Debashis Ganguly, Poulumi Das, "A Secure technique for Image data hiding".