International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 24 | Number 1 | Year 2015 | Article Id. IJCTT-V24P116 | DOI : https://doi.org/10.14445/22312803/IJCTT-V24P116

Piecewise Watermarking by clustering using similarity measure in Images


Mrs.S.Kavitha, Dr.N.Subhash Chandra

Citation :

Mrs.S.Kavitha, Dr.N.Subhash Chandra, "Piecewise Watermarking by clustering using similarity measure in Images," International Journal of Computer Trends and Technology (IJCTT), vol. 24, no. 1, pp. 76-79, 2015. Crossref, https://doi.org/10.14445/22312803/IJCTT-V24P116

Abstract

With the growth of sharing the personal pictures in social media publically has urged the researchers to protect the ownership rights on the images from morphing, Copying, Misusing etc., Techniques that are already in use are prone to various attacks like geometric attacks, removal attack, Cryptographic attack, protocol attack etc., In this paper a better technique is proposed that can successfully prove the ownership rights on the images and can sustain many types of attacks.

Keywords

Watermarking, Digital Rights Management, Clustering.

References

[1] S. Voloshynovskiy, S. Pereira, V. Iquise and T. Pun, “Attack modelling: Towards a second generation watermarking benchmark,” Signal Processing, Special Issue on Information Theoretic Issues in Digital Watermarking, 2001.
[2] J. K. Su, J.J. Eggers and B. Girod, “Analysis of digital watermarks subjected to optimum linear filtering and additive noise,” Signal Processing, Special Issue on Information Theoretic Issues in Digital Watermarking, 2001.
[3] S. Voloshynovskiy, A. Herrigel, N. B. and T. Pun, “A stochastic approach to content adaptive digital image watermarking,” In International Workshop on Information Hiding, Vol. LNCS 1768 of Lecture Notes in Computer Science, pp. 212-236, Springer Verlag, Dresden, Germany, 29 September -1 October 1999.
[4] P. Moulin and J. O`Sullivan, “Information-theoretic analysis of information hiding,” submitted to IEEE Trans. Inform. Theory.
[5] S. Craver, N. Memon, B. Yeo, and M. Young, “On the invertibility of invisible watermarking techniques,” Proc. Of the IEEE Int. Conf. On Image Processing 1997, Vol. 1, p. 540-543.
[6] F. Hartung, J.K. Su, and B. Girod, “Spread Spectrum Watermarking: Malicious Attacks and Counter-Attacks,” [7] Jen-Sheng Tsai, Win-Bin Huang, and Yau-Hwang Kuo,” On the Selection of Optimal Feature Region Set for Robust Digital Image Watermarking”, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 3, MARCH 2011
[8] Xiaolong Li, Bin Yang, and Tieyong Zeng Efficient ”ReversibleWatermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection” IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 12, DECEMBER 2011
[9] Ehsan Nezhadarya, Z. Jane Wang ,Rabab Kreidieh Ward,” Robust Image Watermarking Based on Multiscale Gradient Direction Quantization”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 4, DECEMBER 2011