A Modified Approach in Watermarked Image using Fractal Technology

International Journal of Computer Trends and Technology (IJCTT)          
© 2017 by IJCTT Journal
Volume-47 Number-3
Year of Publication : 2017
Authors : Astha Shrivatava, Sunil Sharma
DOI :  10.14445/22312803/IJCTT-V47P122


Astha Shrivatava, Sunil Sharma "A Modified Approach in Watermarked Image using Fractal Technology". International Journal of Computer Trends and Technology (IJCTT) V47(3):156-160, May 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Now a day’s means of communication refers to digitization of communication i.e. digital communication or digital media which can be in the form of Image, Audio, and Video. Since the digitization is making human life easier so take the security concern. The main issue is to make your life digital but with protection and highest security. In this paper we are going to implement our idea which concern about secure communication. For this we proposed an algorithm which will use video watermarking with a new technology called fractal technology. We will be using fractal images as watermarked images to make this work more effective since the fractal images is itself motion images it will be tough for unauthorized personal to breach the owner identification of copyright contents.

[1] G. Langelaar and R. Lagendijk, “Optimal differential energy water-marking of DCT encoded images and video,” IEEE Trans. Signal Process, vol. 10, no. 1, pp. 148–158, Jan. 2001.
[2] F. Hartung and B. Girod, “Watermarking of uncompressed and compressedvideo,” Signal Process., vol. 66, no. 3, pp. 283–301, May 1998.
[3] S. Arena, M. Caramma, and R. Lancini, “Digital watermarking appliedto MPEG-2 coded video sequences exploiting space and frequency masking,” in Proc. IEEE Int. Conf. Image Process., Sep. 2000, pp.1987–1990.
[4] A. Giannoula, N. V. Boulgouris, D. Hatzinakos, and K. N. Plataniotis,“Watermark detection for noisy interpolated images,” IEEE Trans. CircuitsSyst. II, Analog Digit. Signal Process., vol. 53, no. 5, pp. 359–363,May 2006.
[5] A. M. Alattar, E. T. Lin, and M. U. Celik, “Digital watermarking of lowbit-rate advanced simple profile MPEG-4 compressed video,” IEEETrans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 787–800, Aug.2003.
[6]T. Wiegang and G. J. Sullivan, Study of final committee draft of jointvideo specification (ITU-T rec. H.264/ISO/IEC 14496-10 AVC) Doc.JVT-G050d2, Joint video Team (JVT) of ISO/IEC MEPG & ITU-TVCEG(ISO/IECJTC1/SC29/WG11 and ITU-T SG16 Q.6), Dec. 2002.
[7] C.-P. Fan, “Fast 2-dimensional 4_4 forward integer transform implementationfor H.264/AVC,” IEEE Trans. Circuits Syst. II, Exp. Briefs,vol. 53, no. 3, pp. 174–177, Mar. 2006.
[8] C.-Y. Chen, S.-Y. Chien, Y.-W. Huang, T.-C. Chen, T.-C. Wang, andL.-G. Chen, “Analysis and architecture design of variable block-sizemotion estimation for H.264/AVC,” IEEE Trans. Circuits Syst. I, Reg.Papers, vol. 53, no. 3, pp. 578–593, Mar. 2006.
[9] T. Wiegang, G. J. Sullivan, G. Bjøntegaard, and A. Luthra, “Overviewof the H.264/AVC video coding standard,” IEEE Trans. Circuits Syst.V Video Technol., vol. 13, no. 7, pp. 560–576, Jul. 2003.
[10] J. Zhang and A. T. S. Ho, “An efficient digital image-in-image watermarking algorithm using the integer discrete cosine transform (IntDCT),” in Proc. IEEE Joint Conf. 4th Int. Conf. Info., Commun.Signal Process. and 4th Pacific-Rim Conf. Multimedia, Dec. 2003, vol.2, pp. 1163–1167.
[11] G. Qiu, P. Marziliano, A. T. S. Ho, D. J. He, and Q. B. Sun, “A hybrid watermarking scheme for H.264/AVC video,” in Proc. 17th Int. Conf.Pattern Recogn., Cambridge, U.K., Aug. 2004.
[12] K. Hühring, H.264/AVC Joint Model 8.6 (JM-8.6) Reference Software [Online]. Available: http://iphome.hhi.de/suehring/tml/
[13] Q. Li and E.-C. Change, , J. , Ed., “On the possibility of noninvertible watermarking schemes,” in IH 2004, Lecture notes in Computer science (LNCS). Berlin: Springer-Verlag, 2004, vol. 3200, pp. 13–24.
[14]“Digital watermarking of uncompressed and compressed video,” Signal Processing (Special Issue on Copyright Protection and Access Control for Multimedia Services), vol. 66, no. 3, pp. 283–301, 1998.
[15] G. C. Langelaar, R. L. Lagendijk, and J. Biemond, “Realtime labeling methods for MPEG compressed video,” in Proc. 18th Symp.Information Theory in the Benelux, Veldhoven, The Netherlands, May 1997.
[17] J. S. Pan, H. C. Huang, L. C. Jain, “Intelligent WatermarkingTechniques”.
[18] J. A. Bloom, I. J. Cox, T. Kalker, J. –P. M. G. Linnartz, M. L. Miller,and C. B. S. Traw, “Copy protection of DVD video”, Proceeding of the IEEE, vol. 87, pp. 1267-1276, (1999).
[19] T. Kalker, G. Depovere, J. Haitsma, M. Maes, “A video watermarking system for broadcast monitoring”, proceedings of theSPIE, vol. 3657, pp. 103-112, (1999).
[20]Digimarc Company Website: http://www.digimarc.com
[21] K. Su, D. Kundur and D. Hatzinakos, “A novel approach to collusion-resistant video watermarking”, Proceedings of the SPIE, vol. 4675, pp. 491-502.

Image watermarking, fractal, video frames Extraction, Audio Extraction, copyrights, Authentication.