Research Article

A Compound Blind Digital Watermarking Technique for Image Authentication and Integrity using DCT and VC

by  Inder Pratap, Saroj Hiranwal, N. S. Yadav
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 83 - Issue 6
Published: December 2013
Authors: Inder Pratap, Saroj Hiranwal, N. S. Yadav
10.5120/14455-2723
PDF

Inder Pratap, Saroj Hiranwal, N. S. Yadav . A Compound Blind Digital Watermarking Technique for Image Authentication and Integrity using DCT and VC. International Journal of Computer Applications. 83, 6 (December 2013), 44-48. DOI=10.5120/14455-2723

                        @article{ 10.5120/14455-2723,
                        author  = { Inder Pratap,Saroj Hiranwal,N. S. Yadav },
                        title   = { A Compound Blind Digital Watermarking Technique for Image Authentication and Integrity using DCT and VC },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 83 },
                        number  = { 6 },
                        pages   = { 44-48 },
                        doi     = { 10.5120/14455-2723 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Inder Pratap
                        %A Saroj Hiranwal
                        %A N. S. Yadav
                        %T A Compound Blind Digital Watermarking Technique for Image Authentication and Integrity using DCT and VC%T 
                        %J International Journal of Computer Applications
                        %V 83
                        %N 6
                        %P 44-48
                        %R 10.5120/14455-2723
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper we propose a multiple digital watermarking scheme using DCT and VC to achieve both image authentication and integrity. We used two watermarks for embedding in to the host image. Unlike traditional watermarking schemes, the second watermarks are not embedded directly into the host image. The proposed technique proves that it is resilient to several attacks.

References
  • Braudaway G. W. , K. A. Magerlein, and F. Mintzer. 1996, Protecting Publicly-available Images with a Visible Image Watermark, in the Proceedings of SPIE, 2659, 126–133.
  • Cox, I. J. ,M. L. Miller, and J. A. Bloom. 2002, Digital Watermarking, New York: Morgan Kaufmann Publishers Inc. , San Fransisco, CA.
  • Kutter M. and F. A. P. Petitcolas. 1999, A fair benchmark for image watermarking systems, In Proceedings of Security and Watermarking of Multimedia Contents, 226–239.
  • Cox, I. J. , Kilian, J. , Leighton, T. , and Shamoon, T. . 1997, Secure Spread Spectrum Watermarking for Multimedia, In IEEE Transactions on Image Processing, 6(12), pp. 1673?1687.
  • M. Naor and A. Shamir. Visual cryptography. In EUROCRYPT '94, Springer-VerlagBerlin, volume LNCS 950, pages 1{12, 1995.
  • S. F. Tu and C. S. Hsu, "A BTC-based watermarking scheme for digital images," Information & Security: An International Journal, vol. 15, no. 2, 2004, pp. 214-226.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Digital watermarking visual cryptography DCT

Powered by PhDFocusTM