Robust Watermarking Framework with DCT Based Encryption

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - November Issue 2013 by IJCTT Journal
Volume-5 Issue-5                           
Year of Publication : 2013
Authors :L.Sri Lakshmi , Mrs. SK. Salma Begum

MLA

L.Sri Lakshmi , Mrs. SK. Salma Begum"Robust Watermarking Framework with DCT Based Encryption"International Journal of Computer Trends and Technology (IJCTT),V5(5):268-274 November Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:- Since several years,, the protection of multimedia data is becoming extremely important. The protection of the multimedia data might be performed with encryption or data hiding algorithms. To address the transmission time, information compression is required. If you take benefit from the character of cryptographic schemes and digital watermarking, the copyright of multimedia contents can possibly be well protected. Our objective will be to give access to the outcomes of one`s image integrity and of their origin regardless of the fact that the reputation is stored encrypted. If watermarking and encryption are conducted jointly for the protection stage, watermark extraction and decryption might be applied independently. With the source end original image and watermarked encrypted image is processed. This encrypted watermark image is finally decoded at the receiver end. This proposed work proposes a novel encryption algorithm to encrypt image. The entropy of this very watermarked image and correlation coefficient of extracted watermark image is amazingly not far away from ideal values, proving the correctness of proposed algorithm. In the proposed system, a Watermarking Scheme based on DWT with encryption algorithm, will be developed to improve the robustness and protection along with security. Also experimental results show resiliency of a given scheme against large blurring attack like mean and Gaussian filtering, linear filtering Thus proving the security, effectiveness and robustness of a given proposed watermarking algorithm.

References

-
[1] A. V. Subramanyam, Sabu Emmanuel and Mohan S. Kankanhalli, “Robust Watermarking of Compressed and Encrypted JPEG2000 Images”, IEEE Transactions on Multimedia, Vol. 14, no. 3, pp. 703-716, June 2012.
[2] Anjan Pal and Snehasish Banerjee, “Embedment of Encrypted Text and Secret Images for Digital Image Watermarking,” World Applied Programming, Vol .1, no. 3, pp. 132-137 ,August 2011.
[3] S. Hwang, K. Yoon, K. Jun, and K. Lee, “Modeling and implementation of digital rights,” J. Syst. Softw., vol. 73, no. 3, pp. 533–549, 2004.
[4] A. Subramanyam, S. Emmanuel, and M. Kankanhalli, “Compressed decrypted domain JPEG2000 image watermarking,” in Proc. IEEE Int. Conf. Multimedia and Expo, pp. 1315–1320, 2010.
[5] S. Lian, Z. Liu, R. Zhen, and H. Wang, “Commutative Watermarking and encryption for media data,” Opt. Eng., vol. 45, pp. 1–3, 2006.
[6] Ricardo L. de Queiroz, ” Processing JPEG-Compressed Images and Documents,” IEEE Transactions on Image Processing, vol. 7, no. 12, pp. 1661-1672, Dec 1998.
[7] Hossam El-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah, “Implementation of RC5 Block Cipher Algorithm for Image Cryptosystems,” International Journal of Information and Communication Engineering, 3:8, pp. 537-542, 2007.
[8] Abdullah Bamatraf, Rosziati Ibrahim and Mohd. Najib Mohd. Salleh, “Journal of Computing, vol. 3, Issue 4, ISSN 2151-9617, pp. 1-8, , April 2011.

Keywords :— Watermark, Encryption, JPEG.