Application of Invisible Image Watermarking

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Copyright to an image is very important so that it is not misused by irresponsible parties, many ways can be done to provide copyright information in an image. Watermarking is a technique commonly used to mark a picture that the image already has copyright and whose owner is known, but in addition to visible watermarking there is also an invisible watermarking to indicate an image on a pixel or also in byte code and this is invisible. The Patchwork Algorithm is an algorithm that can be used to give an image to the image as an authenticity image so that many parties cannot claim it and are quite good from various modifications of image, application that has been created are purpose to embedded information as invisible watermarking in the image.

     


  • Keywords


    Application Watermarking, Watermarking, Secure Image

  • References


      [1] H. Nurdiyanto et al., “Authentication Security in Radio Frequency Identification with IDEA Algorithm,” IOP Conf. Ser. Mater. Sci. Eng., vol. 384, p. 012042, Jul. 2018.

      [2] D. Abdullah et al., “Super-Encryption Cryptography with IDEA and WAKE Algorithm,” J. Phys. Conf. Ser., vol. 1019, no. 1, p. 012039, Jun. 2018.

      [3] S. Sriadhi, R. Rahim, and A. S. Ahmar, “RC4 Algorithm Visualization for Cryptography Education,” J. Phys. Conf. Ser., vol. 1028, no. 1, p. 012057, Jun. 2018.

      [4] M. Mesran et al., “Combination Base64 and Hashing Variable Length for Securing Data,” J. Phys. Conf. Ser., vol. 1028, p. 012056, Jun. 2018.

      [5] H. Nurdiyanto, R. Rahim, A. S. Ahmar, M. Syahril, M. Dahria, and H. Ahmad, “Secure a Transaction Activity with Base64 Algorithm and Word Auto Key Encryption Algorithm,” J. Phys. Conf. Ser., vol. 1028, no. 1, p. 012053, Jun. 2018.

      [6] M. Mesran, M. Syahrizal, and R. Rahim, “Enhanced Security for Data Transaction with Public Key Schnorr Authentication and Digital Signature Protocol,” ARPN J. Eng. Appl. Sci., vol. 13, no. 11, pp. 3839–3846, 2018.

      [7] R. Rahim, “Man-in-the-middle-attack prevention using interlock protocol method,” ARPN J. Eng. Appl. Sci., vol. 12, no. 22, pp. 6483–6487, 2017.

      [8] R. Rahim, N. Kurniasih, M. Mustamam, L. Andriany, U. Nasution, and A. H. Mu-, “Combination Vigenere Cipher and One Time Pad for Data Security,” Int. J. Eng. Technol., vol. 7, no. 2.3, pp. 92–94, 2018.

      [9] H. Nurdiyanto, R. Rahim, and N. Wulan, “Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement,” J. Phys. Conf. Ser., vol. 930, no. 1, p. 012005, Dec. 2017.

      [10] A. Putera, U. Siahaan, and R. Rahim, “Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm,” Int. J. Secur. Its Appl., vol. 10, no. 8, pp. 173–180, Aug. 2016.

      [11] R. Rahim et al., “Combination Base64 Algorithm and EOF Technique for Steganography,” J. Phys. Conf. Ser., vol. 1007, no. 1, p. 012003, Apr. 2018.

      [12] H. Nurdiyanto and R. Rahim, “Enhanced pixel value differencing steganography with government standard algorithm,” in 2017 3rd International Conference on Science in Information Technology (ICSITech), 2017, pp. 366–371.

      [13] R. Rahim, D. Adyaraka, S. Sallu, E. Sarimanah, and M. M. Rahman, “Tiny encryption algorithm and pixel value differencing for enhancement security message,” Int. J. Eng. Technol., vol. 7, no. 2.9, pp. 82–85, 2018.

      [14] D. Kaur, H. K. Verma, and R. K. Singh, “A hybrid approach of image steganography,” in Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016, 2017.

      [15] R. Bhardwaj and V. Sharma, “Image Steganography Based on Complemented Message and Inverted Bit LSB Substitution,” in Procedia Computer Science, 2016, vol. 93, pp. 832–838.

      [16] N. Pohan, R. Saragih, and R. Rahim, “Invisible Watermarking Audio Digital with Discrete Cosine Transform,” Int. J. Sci. Res. Sci. Technol., vol. 3, no. 1, pp. 21–25, 2017.

      [17] X. Li, “Watermarking in secure image retrieval,” Pattern Recognit. Lett., vol. 24, no. 14, pp. 2431–2434, 2003.

      [18] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3. pp. 727–752, 2010.

      [19] A. Swaminathan, Y. Mao, and M. Wu, “Robust and secure image hashing,” IEEE Trans. Inf. Forensics Secur., vol. 1, no. 2, pp. 215–230, 2006.

      [20] J. Fridrich, Steganography in digital media: Principles, algorithms, and applications. 2012.

      [21] I. K. Yeo and H. J. Kim, “Modified Patchwork Algorithm: A novel audio watermarking scheme,” in Proceedings - International Conference on Information Technology: Coding and Computing, ITCC 2001, 2001.

      [22] N. K. Kalantari, M. A. Akhaee, S. M. Ahadi, and H. Amindavar, “Robust multiplicative patchwork method for audio watermarking,” IEEE Trans. Audio, Speech Lang. Process., 2009.

      [23] M. V. R. Krishna and D. Ghosh, “Audio Watermarking In The FFT Domain Using Perceptual Masking,” in the National Conference on Communication, 2003.

      [24] H. Kim, “Robustness Analysis of Patchwork Watermarking Schemes,” Inf. Secur., 2006.

      [25] R. Gonzalez and R. Woods, Digital image processing. 2002.

      [26] B. Purna Kumari and V. P. Subramanyam Rallabandi, “Modified patchwork-based watermarking scheme for satellite imagery,” Signal Processing, 2008.

      [27] H. Kang, K. Yamaguchi, B. Kurkoski, K. Yamaguchi, and K. Kobayashi, “Full-index-embedding patchwork algorithm for audio watermarking,” IEICE Trans. Inf. Syst., 2008.

      [28] I. K. Yeo and H. J. Kim, “Generalized patchwork algorithm for image watermarking,” Multimed. Syst., 2003.


 

View

Download

Article ID: 18749
 
DOI: 10.14419/ijet.v7i3.2.18749




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.