Research Article | Open Access | Download PDF
Volume 4 | Issue 6 | Year 2013 | Article Id. IJCTT-V4I6P135 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I6P135
A Robust Watermarking of Compressed and Encrypted JPEG 2000 Images
M.Veni, Dr.P.Eswaran
Citation :
M.Veni, Dr.P.Eswaran, "A Robust Watermarking of Compressed and Encrypted JPEG 2000 Images," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 6, pp. 1717-1721, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I6P135
Abstract
In this paper we present a secure patient medical images and authentication scheme which enhances the security, confidentiality and integrity of medical images transmitted through the Internet. The medical images are secured using the digital image watermarking scheme. If any attacker try to access the secret medical images, that connection is immediately rejected. The proposed approach is used to provide the robustness against the wide variety of attacks and the visible quality of the reconstructed secret image is too clear as the original image.
Keywords
Digital Image Watermarking, Watermark insertion, Compressed and Encrypted, JPEG 2000, DWT.
References
[1] Dr.V.R.Anitha and Dilip Kumar,” Extending the visual cryptography algorithm without removing cover images”, International Journal of Engineering Trends & Technology, Vol.4, Issue 4, April 2013.
[2] Arindam Dasgupta and Amit Kute,”A robust blind watermarking using fractional fourier rework and visual cryptography”, IJETAE, Vol.3, Issue 3, March 2013.
[3] Ayan Banerjee and Sreya Banerjee,”A robust visual cryptography technique for photographic grayscale images using block optimization and blind invisible watermarking”, International Journal of Computer Theory and Engineering,Vol.4,No.2,April 2012.
[4] Latha Parameswaran, and K. Anbumani, “A Robust Image Watermarking Scheme using Image Moment Normalization”, World Academy of Science, Engineering and Technology 19 2006.
[5] Li Fan,Tiegang Gao and Qunting Yang, “A novel watermarking scheme for copyright protection based on adaptive joint image feature and visual secret sharing”, International Journal of Innovative Computing, Information and Control,Vol.7,Number 7(A), July 2011.
[6] Mohsen Ashourian, Peyman Moallem and Yo-Sung Ho,” A Robust Method for Data Hiding in Color Images”, LNCS 3768, pp. 258 – 269, 2005.
[7] M.Monish and S.Iwin Thanakumar,”Visual secret sharing-A Pandect”, International Journal of Computer Science and Management Research, Vol.2, Issue 2, February 2013.
[8] Natasa Terzija, “Robust digital image watermarking algorithms for copyright protection”.
[9] Nazanin Askari, Cecilia Moloney and H.M.Heys,”A novel visual secret sharing scheme without image size expansion”.
[10] Neelam Yadav,Dhiraj Kumar and Ravi Yadav,”Key sharing schemes using visual cryptography”, International Journal of New Innovations in Engineering and Technology,Vol.1,Issue 4,April 2013.
[11] Pankaj U.Lande Sanjay, N.Talbar and G.N.Shinde,”FPGA prototype of robust watermarking JPEG 2000 encoder”, International Journal of Circuits, Systems and Signal Processing, Vol.4, Issue 3, 2010.
[12] Radovan Ridzon and Dusan Levicky,”Robust digital watermarking based on the log-polar mapping”, Radio engineering, Vol.16, No.4, Dec 2007.
[13] Rafael C.Gonzalez and Richard E. Woods, “Digital image processing”.
[14] K.M.M. Rao*, Deputy Director, NRSA, Hyderabad-500 037, “Overview of image processing”.
[15] P.S.Revenkar, Anisa Anjum and W.Z.Gandhare, “Survey of visual cryptography schemes”, International Journal of Security and its Applications, Vol.4, No.2, April 2010.
[16] Shaik.Mahaboob Basha, Dr. B.C.Jinaga, “A Novel Optimum Technique for JPEG 2000 Post Compression Rate Distortion Algorithm”, ACEEE Int.J.on Information Technology, Vol.1, No.2, Sep 2011.
[17] Shen-Chuan Tai, Chuen-Ching Wang and Chong-Shou Yu,”Visual Secret Sharing Watermarking for Digital Image”, Informatica 26(2002) 381-388.
[18] Shu-Fen Tu and Ching-Sheng Hsu,”A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography”, The International Arab Journal of Information Technology, Vol.9, No.3, May 2012. [19] V.Srinivas, Dr.E.V.Krishna Rao, Ch.Madhava Rao and K.Anitha,”A (2, 2) Effective Secret Sharing Scheme”, IJECT, Vol.3, Issue 1, JanMarch 2012.
[20] R.Yadagiri Rao,”Secure Visual Cryptography”, International Journal of Engineering and Computer Science, Volume 2, Issue 1, Jan 2013.