Piecewise Watermarking by clustering using similarity measure in Images

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-24 Number-2
Year of Publication : 2015
Authors : Mrs.S.Kavitha, Dr.N.Subhash Chandra
DOI :  10.14445/22312803/IJCTT-V24P116

MLA

Mrs.S.Kavitha, Dr.N.Subhash Chandra "Piecewise Watermarking by clustering using similarity measure in Images". International Journal of Computer Trends and Technology (IJCTT) V24(2):76-79, June 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
With the growth of sharing the personal pictures in social media publically has urged the researchers to protect the ownership rights on the images from morphing, Copying, Misusing etc., Techniques that are already in use are prone to various attacks like geometric attacks, removal attack, Cryptographic attack, protocol attack etc., In this paper a better technique is proposed that can successfully prove the ownership rights on the images and can sustain many types of attacks.

References
[1] S. Voloshynovskiy, S. Pereira, V. Iquise and T. Pun, “Attack modelling: Towards a second generation watermarking benchmark,” Signal Processing, Special Issue on Information Theoretic Issues in Digital Watermarking, 2001.
[2] J. K. Su, J.J. Eggers and B. Girod, “Analysis of digital watermarks subjected to optimum linear filtering and additive noise,” Signal Processing, Special Issue on Information Theoretic Issues in Digital Watermarking, 2001.
[3] S. Voloshynovskiy, A. Herrigel, N. B. and T. Pun, “A stochastic approach to content adaptive digital image watermarking,” In International Workshop on Information Hiding, Vol. LNCS 1768 of Lecture Notes in Computer Science, pp. 212-236, Springer Verlag, Dresden, Germany, 29 September -1 October 1999.
[4] P. Moulin and J. O`Sullivan, “Information-theoretic analysis of information hiding,” submitted to IEEE Trans. Inform. Theory.
[5] S. Craver, N. Memon, B. Yeo, and M. Young, “On the invertibility of invisible watermarking techniques,” Proc. Of the IEEE Int. Conf. On Image Processing 1997, Vol. 1, p. 540-543.
[6] F. Hartung, J.K. Su, and B. Girod, “Spread Spectrum Watermarking: Malicious Attacks and Counter-Attacks,” [7] Jen-Sheng Tsai, Win-Bin Huang, and Yau-Hwang Kuo,” On the Selection of Optimal Feature Region Set for Robust Digital Image Watermarking”, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 3, MARCH 2011
[8] Xiaolong Li, Bin Yang, and Tieyong Zeng Efficient ”ReversibleWatermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection” IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 12, DECEMBER 2011
[9] Ehsan Nezhadarya, Z. Jane Wang ,Rabab Kreidieh Ward,” Robust Image Watermarking Based on Multiscale Gradient Direction Quantization”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 4, DECEMBER 2011

Keywords
Watermarking, Digital Rights Management, Clustering.