A Novel Compressed Encrypted and Encoded Watermark Embedding Scheme for Digital Images
-
2018-07-20 https://doi.org/10.14419/ijet.v7i3.12.17842 -
Spatial domain watermarking, Lozi mapping, Logistic mapping, Huffman code, repetition code. -
Abstract
In this research work a novel idea of compressed, encrypted and encoded watermark embedding scheme for digital images is proposed. Initially watermark is compressed using Huffman encoder. Compressed watermark is encrypted using combined binary key sequence {Ki} derived from sequence of logistic map and Lozi map. The compressed and encrypted binary watermark is encoded using (n,1) repetition code. This compressed, encrypted and encoded binary watermark is embedded in alternate locations of cover image pixels using of Least Significant Bit (LSB) and Second Least Significant Bit (SLSB). To study the watermarked image quality, parameters such as Signal to Noise Ratio (SNR) and Mean Square Error (MSE) are used. Also performance of the proposed system is compared with uncompressed, encrypted, encoded watermark embedding scheme. There is a significant improvement in MSE, SNR of watermarked image, when compressed watermark embedding scheme is compared to uncompressed watermark embedding scheme.
Â
Â
-
References
[1]. F.M. Boland, J.J.K. O Ruanaidh, C. Dautzenberg, "Watermarking Digital images for Copyright Protection", Proceedings of the 5th IEEE International Conference on Image Processing and its Applications, no. 410, Edinburgh, July, 1995, pp. 326-330.
[2]. H. Berghel , L. O’Gorman, “Protecting Ownership Rights through Digital Watermarkingâ€, IEEE Computer Mag., Volume:29 , Issue: 7, pp.101-103, July 1996.
[3]. M. Abdullatif, A. M. Zeki, J. Chebil, and T. S. Gunawan, “Properties of Digital Image Watermarking,†proceedings of IEEE 9th International Colloquium on Signal Processing and its Applications, 8 - 10 Mac. 2013, Kuala Lumpur, Malaysiapp.
[4]. A.Z.Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J.Ho, N.R.A.Mee, C.F.Osborne. “Electronic Water Mark†DICTA-1993, Macquarie University. pp. 666-673.
[5]. An, ZhiYuan, and Haiyan Liu. "Research on digital watermark technology based on LSB algorithm." Proceedings of Fourth International Conference on Computational and Information Sciences, 2012.
[6]. Agung, B. W. R., and Febri Puguh Permana. "Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression." Proceedings of IEEE International Conference on Communication, Networks and Satellite (ComNetSat), 2012.
[7]. El Kerek, Bilal, et al. "A New Technique to Multiplex Stereo Images: LSB Watermarking and Hamming Code." Proceedings of first International Conference on.Artificial Intelligence, Modelling and Simulation (AIMS), 2013
[8]. Yahaya, Cik Ku Haroswati Che Ku, Harnani Hassan, and Mohd Izwan Bin Md Kahmi. "Investigation on perceptual and robustness of LSB digital watermarking scheme on Halal Logo authentication." Proceedings of International Conference on System Engineering and Technology (ICSET), 2012.
[9]. Kumar, S., & Singh, T. “Performance improvement of simple LSB watermarking using SVD†Proceeding of Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 (pp. 133-137). IEEE, (2014, November).
[10]. Zhong, Qian-Chuan, Qing-xin Zhu, and Ping Zhang. "A spatial domain color watermarking scheme based on chaos." Proceedings of IEEE International Conference on Apperceiving Computing and Intelligence Analysis, 2008. ICACIA.
[11]. Zhang Xueyi, Jin Lu,Wang Kejun and Li Dianpu “Logistic-Map Chaotic Spreading Spectrum Sequences Under Linear transformation†Proceedings of the 3“ World Congress on Intelligent Control and Automation June 28-July 2,2000, Hefei, P.R China.
[12]. Lozi R 1978 Un attracteur _etrange (?) du type attracteur de H_enon Journal de Physique.
[13]. Rohith.S, K.N. Hari Bhat, “A Simple Robust Digital Image Watermarking against Salt and Pepper Noise using Repetition Codes†ACEEE International Journal on Signal & Image Processing, pp-48-54 Vol. 03, No. 01, Jan 2012.
[14]. S Rohith, B K Sujatha “Image encryption and decryption using combined key sequence of Logistic map and Lozi mapâ€, Proceedings of IEEE International Conference on Communications and Signal Processing (ICCSP),2015, pp.1053-1058.
[15]. S Rohith, KN Hari Bhat, BK Sujatha“A secure and robust digital image watermarking scheme using repetition codes for copyright protection†Proceedings of 2014 International Conference on Advances in Electronics, Computers and Communications (ICAECC),2014, Bangalore, pp-1-8.
[16]. Shu Lin, Daniel J. Costello “Error Control Coding: Fundamentals and Applications†Pearson-Prentice Hall, 2004.
[17]. K Sayood “Introduction to Data Compressionâ€, Morgan Kaufmann,3rd Edition,2005
[18]. H.Zhang, H.Z.Shu, J. G.Coatrieux and L.M.Luo, "Affine Legendre Moment invariants for image watermark robust to geometric distortions," IEEE Trans. Image Process, vol. 20, no. 8, pp. 2189-2199, 2011.
-
Downloads
-
How to Cite
S, R., & K Sujatha, B. (2018). A Novel Compressed Encrypted and Encoded Watermark Embedding Scheme for Digital Images. International Journal of Engineering & Technology, 7(3.12), 1222-1227. https://doi.org/10.14419/ijet.v7i3.12.17842Received date: 2018-08-18
Accepted date: 2018-08-18
Published date: 2018-07-20