Research Article

Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of Elliptic Curve Cryptography (ECC)

by  Arathi Chitla, M. Chandra Mohan
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Issue 6
Published: November 2012
Authors: Arathi Chitla, M. Chandra Mohan
10.5120/9118-3275
PDF

Arathi Chitla, M. Chandra Mohan . Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of Elliptic Curve Cryptography (ECC). International Journal of Computer Applications. 57, 6 (November 2012), 17-25. DOI=10.5120/9118-3275

                        @article{ 10.5120/9118-3275,
                        author  = { Arathi Chitla,M. Chandra Mohan },
                        title   = { Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of Elliptic Curve Cryptography (ECC) },
                        journal = { International Journal of Computer Applications },
                        year    = { 2012 },
                        volume  = { 57 },
                        number  = { 6 },
                        pages   = { 17-25 },
                        doi     = { 10.5120/9118-3275 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2012
                        %A Arathi Chitla
                        %A M. Chandra Mohan
                        %T Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of Elliptic Curve Cryptography (ECC)%T 
                        %J International Journal of Computer Applications
                        %V 57
                        %N 6
                        %P 17-25
                        %R 10.5120/9118-3275
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

A novel lossless watermarking image authentication technique is proposed in this paper. The proposed method allows exact recovery of the original information from the image without loss in their quality. For authenticating the information, a well known Elliptic Curve Cryptography (ECC) is utilized. The ECC method authenticates the information by generating signature and signed messages. After the authentication process, the data embedding process is performed, in which the computed information is inserted into the image data. The data embedding process is accomplished by the well known LSB (least significant bit) modification, which embeds the information bits to the image data. Subsequently, the recovery and the verification processes are carried out to find out whether the watermarked image is authenticated or not. The effectiveness of the proposed technique using ECC image authentication along with lossless Least Significant Bit (LSB) data embedding is evaluated. Also, the proposed LWM image authentication technique is compared with the conventional LWM technique. The comparison result shows that our proposed technique can retrieve the image with high PSNR value than the image retrieved by the conventional technique.

References
  • Rosline Nesa Kumari, Vijaya Kumar, Sumalatha and Krishna, "Secure and Robust Digital Watermarking on Grey Level Images", International Journal of Advanced Science and Technology, Vol. 11, October, 2009
  • Ashish Bansal , Sarita Singh Bhadauria, "Watermarking Using Neural Network and Hiding the Trained Network within the Cover Image", Journal of Theoretical and Applied Information Technology, pp63-670, 2008
  • A. Arulmurugan, N. Arul, P. Santhosh kumar, "Robust Image Watermarking in contourlet Domain Using Genetic Algorithm", Global Journal of Computer Science and Technology, Vol. 11, No. 9 , May 2011
  • Mir Shahriar Emami, Ghazali Bin Sulong, "Set Removal Attack: A New Geometric Watermarking Attack", 2011 International Conference on Future Information Technology IPCSIT, vol. 13, IACSIT Press, Singapore, 2011
  • K. Ganesan and Tarun Kumar Guptha, "Multiple Binary Images Watermarking in Spatial and Frequency Domains", Signal & Image Processing : An International Journal(SIPIJ), Vol. 1, No. 2, December 2010
  • Eugene T. Lin and Edward J. Delp, "A Review of Fragile Image Watermarks", Proceedings of the Multimedia and Security Workshop, 1999
  • Jian-Guo Cao, James E. Fowler and Nicholas H. Younan, "An Image-Adaptive Watermark Based On A Redundant Wavelet Transform", Proceedings of the IEEE International Conference on Image Processing, , pp. 277-280 , Thessaloniki, Greece, October 2001
  • Suhad Hajjara, Moussa Abdallah, Amjad Hudaib, "Digital Image Watermarking Using Localized Biorthogonal Wavelets", European Journal of Scientific Research, Vol. 26, No. 4 , pp. 594-608, 2009
  • Ersin ELBAS¸ "Robust multimedia watermarking: Hidden Markov model approach for video sequences", Turk J Elec Eng & Comp Sci, Vol. 18, No. 2, 2010
  • F?nd?k, smail Baba and Erkan Ülker, "A digital robust image watermarking against desynchronization attacks", Scientific Research and Essays, Vol. 5, No. 16, pp. 2288-2294, 18 August, 2010
  • Sachin Goyal, Roopam Gupta, Ashish Bansal, "Application of Genetic Algorithm to Optimize Robustness and Fidelity of Watermarked Images", /International Journal on Computer Science and Engineering Vol. 1, No. 3, pp. 239-242, 2009
  • Jaseena K. U. , Anita John, "An Invisible Zero Watermarking Algorithm using Combined Image and Text for Protecting Text Documents", International Journal on Computer Science and Engineering (IJCSE), Vol. 3, No. 6 , June 2011
  • A. Essaouabi1, E. Ibnelhaj2,F. regragui, "Digital Image Watermarking for Arbitrarily Shaped Objects Based On SA-DWT", IJCSI International Journal of Computer Science , Vol. 5, 2009
  • Aree Ali Mohammed, Haval Mohammed Sidqi, "Robust Image Watermarking Scheme Based on Wavelet Technique", International Journal of Computer Science and Security (IJCSS), Vol. 5, No. 4, 2011
  • Sangeeta Jadhav, Anjali Bhalchandra, "Robust Digital Image-Adaptive Watermarking Using BSS Based Extraction Technique", International Journal of Image Processing (IJIP) , Vol. 4, No. 1, pp77-88, 2010
  • Todor Todorov, "Spread Spectrum Watermarking Technique for Information System Securing", International Journal of Information Theories & Applications, Vol. 11, No. 4, pp. 405-408, 2004
  • J. Samuel Manoharan, Kezi C. Vijila, A. Sathesh, "Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding Techniques towards Geometric Attacks", International Journal of Security (IJS), Vol. 4, No. 3, 2009
  • Mona M. Soliman, Aboul Ella Hassanien, Neveen I. Ghali and Hoda M. Onsi, "An adaptive Watermarking Approach for Medical Imaging Using Swarm Intelligent", International Journal of Smart Home, Vol. 6, No. 1, pp. 37-50, January, 2012
  • Umaamaheshvari and Thanushkodi, "High Performance and Effective Watermarking Scheme for Medical Images", European Journal of Scientific Research, Vol. 67, No. 2, pp. 283-293, 2012
  • Sajjad Dadkhah, Azizah Abd Manaf and Somayeh Sadeghi, "Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking", International Journal of Computer Science , Vol. 9, No 2, January 2012
  • Sujatha and Mohamed Sathik, "A Novel DWT Based Blind Watermarking for Image Authentication", International Journal of Network Security, Vol. 14, No. 4, PP. 223-228, July 2012
  • Amal Khalifa and Safwat Hamad, "A Robust Non-blind Algorithm for Watermarking Color Images using Multi-resolution Wavelet Decomposition", International Journal of Computer Applications, Vol. 37, No. 8, January 2012
  • Mehmet Utku Celik, Gaurav Sharma, and A. Murat Tekalp, "Lossless Watermarking for Image Authentication: A New Framework and an Implementation", IEEE Transactions on Image Processing, Vol. 15, No. 4, pp. 1042-1049, April 2006
  • Mehmet Utku Celik, Gaurav Sharma and Murat Tekalp, "Lossless Watermarking for Image Authentication: A New Framework and an Implementation", IEEE Transactions on Image Processing, Vol. 15, No. 4, pp. 1042-1049, 2006
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Lossless Watermarking (LWM) Elliptic Curve Cryptography (ECC) Signature Generation Algorithm Raster Scanning Image Authentication

Powered by PhDFocusTM