Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Nair, Jayashree
- Secure Watermarking using Diophantine Equations for Authentication and Recovery
Abstract Views :206 |
PDF Views:0
Authors
Jayashree Nair
1,
T. Padma
2
Affiliations
1 Acharya Institute of Management & Sciences, Peenya, Bangalore, Karnataka, IN
2 Sona College of Engineering, Salem, Tamil Nadu, IN
1 Acharya Institute of Management & Sciences, Peenya, Bangalore, Karnataka, IN
2 Sona College of Engineering, Salem, Tamil Nadu, IN
Source
Journal of Network and Information Security, Vol 3, No 2 (2015), Pagination: 1-9Abstract
This paper describes an authentication scheme that uses Diophantine equations based generation of the secret locations to embed the authentication and recovery watermark in the DWT sub-bands. The security lies in the difficulty of finding a solution to the Diophantine equation. The scheme uses the content invariant features of the image as a selfauthenticating watermark and a quantized down sampled approximation of the original image as a recovery watermark for visual authentication, both embedded securely using secret locations generated from solution of the Diophantine equations formed from the PQ sequences. The scheme is mildly robust to Jpeg compression and highly robust to Jpeg2000 compression. The scheme also ensures highly imperceptible watermarked images as the spatio - frequency properties of DWT are utilized to embed the dual watermarks.Keywords
Diophantine Equations, Content Authentication, Authentication Watermark, Recovery Watermark, PQ Vector, DWT.- Performance Analysis of a Novel Image Content Authentication Scheme Using Multiple Watermarks in Dual Domains
Abstract Views :243 |
PDF Views:148
Authors
Jayashree Nair
1,
T. Padma
2
Affiliations
1 AIMS Institutes, Bangalore, IN
2 Sona College of Technology, Salem, IN
1 AIMS Institutes, Bangalore, IN
2 Sona College of Technology, Salem, IN
Source
Adarsh Journal of Information Technology, Vol 5, No 2 (2016), Pagination: 10-16Abstract
This paper presents a multiple watermark based semi-fragile watermarking scheme that tries to balance the requirements of an effective authentication scheme ensuring imperceptibility, tamper detection and localization of tampered areas. The proposed scheme uses multiple watermarks to enable authentication at multiple levels in the wavelet domain. The scheme is flexible and permits the user to decide on the number of watermarks to be embedded based on the nature of the application. It can also accurately locate the tampered locations.Keywords
Content Authentication, Authentication Watermark, Recovery Watermark, DWT, Tamper Localization, Robustness, Feature Vector.References
- Hu M., Lou D. and Chang M., “DualWrapped Digital Watermarking Scheme for Image Copyright Protection,” Computers & Security, Vol.26, pp.319-330, 2007.
- Lin, C.Y. and S.F. Chang, “SARI: SelfAuthentication-and-Recovery Image Watermarking System,” ACM Multimedia, Ottawa, Canada: ACM Press. pp.628-629, 2001
- Woo Chaw Seng1 et.al., “Semi-Fragile Watermark with Self Authentication and Self Recovery, “ Malaysian Journal of Computer Science, Vol. 22(1), pp 64-84, 2009.
- Yuping, H., Guangjun, G.: Watermarkingbased authentication with recovery mechanism. In: 2nd International Workshop on Computer Science and Engineering. doi:10.1109/WCSE. 2009.856 (2009)
- D. Kundur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1167–1180,1999.
- C. S. Lu and H. Y. M. Laio, “Multipurpose watermarking for image authentication and protection,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 435-439, 2001
- Hui, L., Yuping, H.: A wavelet-based watermarking scheme with authentication and recovery mechanism. In: International Conference on Electrical and Control Engineering (ICECE). doi:10.1109/iCECE. 2010.86 (2010)
- Chen, T.S., Chen, J., Chen, J.G.: Tamper detection and retrieval technique based on JPEG 2000 with LL subband. In Proceedings of IEEE International Conference OD Networking, Sensing & Control, Taipei, Taiwan (2004)
- J. C. Patra, J. E. Phua and C. Bornand, “Anovel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression,” Digital Signal Processing, vol. 20, no. 6, pp. 1597–1611, 2010.
- X. Qi and X. Xin, “A quantization-based semi-fragile watermarking scheme for image content authentication,” Journal of Visual Communication and Image Representation, vol. 22, no. 2, pp. 187–200, 2011.
- Tsai, M.J., Chien, C.C.: A wavelet-based semi-fragile watermarking with recovery mechanism. In: IEEE International Symposium on Circuits and Systems, ISCAS 2008. doi:10.1109/ISCAS.2008. 4542097 (2008)
- De Rosa A., Barni M., Bartolini F., Cappellini V. and Piva A., “Optimum Decoding of Non-additive Full Frame DFT Watermarks”, Proceedings of the 3rd Workshop of Information Hiding, pp.159-171,1999.
- Parthasarathy A. K. and Subhash Kak, “An Improved Method of Content Based Image Watermarking.” IEEE Transactions on Broadcasting, Vol.53, No.2, pp.468-479, 2007.
- Chamlawi R., Khan A., Idris A. and Munir Z., “A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform,” World Academy of Science, Engineering and Technology, Vol.23, pp.49-53, 2006.
- Qi, X., Xin, X., Chang, R. “Image authentication and tamper detection using two complementary watermarks,” 16th IEEE International Conference on Image Processing (ICIP). doi:10.1109/ICIP.2009. 5413681, 2009.
- A Chen, B., Wornell, G.W., “Digital watermarking and information embedding using dither modulation,” Proceedings of the IEEE workshop on Multimedia Signal Processing, Redondo Beach, CA, December, 1998.Transl. J. Magn. Japan, vol. 2, pp. 740-741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 198.
- J. S. Pillai, T. Padma. “The analysis of PQ sequences generated from continued fractions for use as pseudorandom sequences in Cryptographic Applications.” In Proc. Advances in Intelligent Systems and Computing, Springer, Vol. 394, Dec. 2015, pp. 633-644.