Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Digital Image Watermarking Using Different Levels of
Intermediate Significant Bits with Zig-zag Embedding Approach
Ali Sharifara, Ghazali Bin Sulong, Mehran Ranjbar Seraydashti
Pages - 62 - 71 | Revised - 15-01-2013 | Published - 28-02-2013
Published in International Journal of Image Processing (IJIP)
MORE INFORMATION
KEYWORDS
Digital Image Watermarking, Invisible Watermarking, Imperceptibility In Watermarking, Copyright Protection, Intermediate Significant Bits (ISB)
ABSTRACT
The rapid growths of computer technologies have been increased over the last half century in
terms of amount and complexity of data. Broadcasting of digital contents on the networks
(especially Internet) has become more important and access to the data also has become much
easier than before. Digital watermarking techniques are used to protect the copyrights of
multimedia data by embedding secret information inside them. For example, embedding
watermark in images, audios, and videos. Digital Image watermarking also has been using to
detect original images against forged images by embedding an evidence of the owner of the
digital image. Imperceptibility, on the other hand, is one of the problems in digital image
watermarking which a repeated method in different bit planes of cover image has been presented
to improve the imperceptibility of watermarking in both embedding and extracting processes.
Moreover, embedding process aims to embed watermark in different bit planes by using a nonsequential
method to improve security of image rather than simple sequential embedding.
Akram M. Zeki. Khedher, Azizah Abdul Manaf. “Digital watermarking and data hiding techniques”. Proceedings of the Postgraduate Annual Research Seminar p. 79-84, 2006. | |
Arya, D.,“A Survey of Frequency and Wavelet Domain Digital Watermarking Techniques”. 2010. 1(2). | |
Bamatraf,A.Ibrahim,R.Salleh, M.N.B.M, “Digital watermarking algorithm using LSB”, in Computer Applications and Industrial Electronics (ICCAIE), Kuala Lumpur, 2010. | |
Chin-Shiuh Shieh, Hsiang-Cheh Huang, Feng-Hsing Wang, Jeng-Shyang Pan,“Genetic watermarking based on transform-domain techniques”. Pattern Recognition,. 37(3): p.555-565, 2004. | |
Dehkordi, A.B., Esfahani, S.N., Avanaki, A.N. , “Robust LSB watermarking optimized for local structural similarity”, in Electrical Engineering (ICEE), 2011 19th Iranian Conference.Tehran, 2011. | |
Dharwadkar, N.V., Amberker, B.B,Gorai, A., “Non-blind watermarking scheme for color images in RGB space using DWT-SVD”, in Communications and Signal Processing (ICCSP), 2011 International Conference, Calicut, 2011. | |
Gil-Je Lee, “A New LSB Based Digital Watermarking Scheme with Random Mapping Function”, in Ubiquitous Multimedia Computing. UMC '08. International Symposium:Hobart, ACT, Oct 2008. | |
Golea, N.E.-H., “A bind RGB color image watermarking based on singular value decomposition”, in Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010, IEEE Computer Society. p. 1-5. 2010. | |
Hu, M.-C., D.-C. Lou, and M.-C. Chang, “Dual-wrapped digital watermarking scheme for image copyright protection". Computers & Security 26 (4) , 319-330, 2007. | |
Jian Cao; Jiwu Huang; , "Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security," Information Forensics and Security, IEEE Transactions on , vol.7, no.2, pp.821-826, April 2012. | |
Ker, A., “Improved Detection of LSB Steganography in Grayscale Images Information Hiding”, J. Fridrich, Editor, Springer Berlin / Heidelberg, 2005. | |
Kumar, N.M., Manikandan, T.,Sapthagirivasan, V. , “Non blind image watermarking based on similarity in contourlet domain”, in Recent Trends in Information Technology (ICRTIT), 2011 International Conference, Chennai, Tamil Nadu, 2011. | |
M.Padmaa, “ZIG-ZAG PVD – A Nontraditional Approach”. International Journal of Computer Applications. Volume 5– No.7, August 2010. | |
Maity, S.P. and M.K. Kundu, “DHT domain digital watermarking with low loss in image informations”. AEU - International Journal of Electronics and Communications. 64(3): p.243-257,2010. | |
Mir Shahriar Emami , Ghazali Bin Sulong, “Set Removal Attack: A New Geometric Watermarking Attack” in 2011 International Conference on Future Informatio Technology IPCSIT. 2011, IACSIT Press: Singapore. 2011. | |
MohammadReza Keyvanpour, Farnoosh Merrikh Bayat, “Blind image watermarking method based on chaotic key and dynamic coefficient quantization in the DWT domain”,Mathematical and Computer Modelling, Available online 27 July 2012, ISSN 0895-7177,2012. | |
Potdar, V.M., Han, S.,Chang, “A survey of digital image watermarking techniques”. 2005.p. 709- 716. | |
Yongjian Hu,Guangzhou, China Kwong, S. “Using invisible watermarks to protect visibly watermarked images” ,p. 584-587. 2004. | |
Zhao Xingyang, “A novel color image fragile watermarking based on the extended channel”, in Broadband Network & Multimedia Technology, 2009. IC-BNMT '09. 2nd IEEE International Conference, Beijing, Oct. 2009. | |
Mr. Ali Sharifara
Dept. of Software engineering, faculty of computing
UTM – Malaysia – Skudai 81310 - Malaysia
a.sharifara@gmail.com
Dr. Ghazali Bin Sulong
Dept. of Software engineering, faculty of computing
UTM – Malaysia – Skudai 81310 - Malaysia
Mr. Mehran Ranjbar Seraydashti
Dept. of Software engineering, faculty of computing
UTM – Malaysia – Skudai 81310 - Malaysia
|
|
|
|
View all special issues >> | |
|
|