Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding Techniques towards Geometric Attacks
J.Samuel Manoharan, Kezi C.Vijila, A.Sathesh
Pages - 28 - 37 | Revised - 30-06-2010 | Published - 10-08-2010
Published in International Journal of Security (IJS)
MORE INFORMATION
KEYWORDS
Luminance, DCT, DWT, Correlation , Coefficient
ABSTRACT
Data hiding is an age-old technique used to hide data in an image. Several attacks are prevalent to hack the data hidden inside the image. Considerable researches are going on in this area to protect the hidden data from unauthorized access. The current work is focused towards studying the behavior of Spatial and Frequency Domain Multiple data embedding techniques towards noise prone channels enabling the user to select an optimal embedding technique. The Performance of the above techniques is also focused towards multiple embedded data inside a single cover image. The robustness of the watermark is tested by incorporating several attacks and testing the watermark strength.
1 | Ahmad, F. (2015). Copyright Protection for Surveillance System Multimedia Stream with Cellular Automata Watermarking. Control Theory and Informatics, 5(1), 10-15. |
2 | Jayanthi, V. E. (2014). Design and implementation of vlsi Architecture algorithms for digital Image watermarking. |
3 | Koley, S., Pal, K., Ghosh, G., & Bhattacharya, M. (2014). Secure Transmission and Recovery of Embedded Patient Information from Biomedical Images of Different Modalities through a Combination of Cryptography and Watermarking. International Journal of Image, Graphics and Signal Processing (IJIGSP), 6(4), 18. |
4 | Joseph, A., & Jayasingh, J. R. (2013). Digital Watermarking using Least Significant Bit Insertion Method. Digital Image Processing, 5(2), 76-85. |
5 | Kavadia, C. (2013). A Review on Spatial & Transform Domain Digital Watermarking Techniques. International Journal of Advanced Research in Computer Science, 4(3). |
6 | Hussein, J. A. (2012). Luminance-based embedding approach for color image watermarking. International Journal of Image, Graphics and Signal Processing (IJIGSP), 4(3), 49. |
7 | Chitla, A., & Mohan, M. C. (2012). Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of Elliptic Curve Cryptography (ECC). International Journal of Computer Applications, 57(6). |
8 | Kaur, R. (2012). Developing a Benchmark Model for Image Digital Watermarking. In International Journal of Applied Information Systems (IJAIS)–ISSN: 2249-0868 Foundation of Computer Science FCS. |
9 | Kaur, R. Article: Developing a Benchmark Model for Image Digital Watermarking}. International Journal of Applied, 3, 30-34. |
1 | Google Scholar |
2 | Academic Index |
3 | CiteSeerX |
4 | refSeek |
5 | iSEEK |
6 | Socol@r |
7 | Bielefeld Academic Search Engine (BASE) |
8 | Scribd |
9 | WorldCat |
10 | SlideShare |
11 | PDFCAST |
12 | PdfSR |
A.Lumini, D.Maio, “A Wavelet Based Image watermarking scheme”, The International Conference on Information Technology: Coding and Computing (ITCC), pp. 122-127, 2000 | |
Ali Al-Haj, “Combined DWT – DCT Digital Image Watermarking”, Journal of Computer Science, Vol.3, Issue.9, pp.740-746, 2007. | |
Chun Shien Lu, H.Y.M.Liao, “Multipurpose watermarking for image authentication and protection”, IEEE Transactions on Image Processing., Vol.10, Issue 10, pp.1579-1592, 2001. | |
Jamal Hussein, “Spatial domain Watermarking scheme for color images based on log average luminance”, Int’l Journal of Computing, Volume 2, Issue 1, 2010 | |
Juan Hernandez, Martin Amado, Fernando Perez, “DCT Domain Watermarking Techniques for Still Images: Detector Performance analysis and new structure”, IEEE Transactions on Image Processing, Vol. 9, No.1, pp. 55 – 68, 2000. | |
Mauro Barni. Franco Bartolini, Vito Cappellini, Alessandro Piva., “A DCT domain system for robust image watermarking”, International Conference on Signal Processing, Vol.66, Issue.3, pp. 357-372, 1998. | |
Nikolaidis, Pitas, “Robust Image Watermarking the Spatial Domain”, International Journal of Signal Processing”, Vol.66, Issue 3, pp. 385 – 403, 1998. | |
Saraju P.Mohanty, K. R. Ramakrishnan and Mohan S. Kankanhalli, “A DCT Domain Visible Watermarking Technique for Images” by ICME, vol.2 , pp. 1029 - 1032, 2000 | |
Sathesh, Samuel Manoharan, “A Dual Tree Complex Wavelet Transform Construction and its application to Image Denoising, International Journal of Image Processing, Vol.3, Issue.6, pp.293 – 300,2010. | |
V. Licks and R. Jordan, “On Digital Image Watermarking Robust to Geometric Transformations,” Proceedings of 2000 International Conference Image Processing (ICIP 2000), Vol. 3, pp. 690-693, 2000. | |
Verma P, D.P. Agarwal, Jain S, “Spatial Domain Robust Blind Watermarking for Color Image”, Asian Journal of Information Technology, Vol. 6, Issue. 4, pp. 430 – 435, 2007. | |
Wu, D. C., Tsai, W. H., “Spatial-Domain Image Hiding Using an Image Differencing”, IEEE Proceedings -Vision, Image and Signal Processing, Vol. 147, Issue. 1, pp. 29 – 37, 2000. | |
Y. Wang, J. F. Doherty and R. E. Van Dyck, “A Wavelet-Based Watermarking Algorithm for Ownership Verification of Digital Images”, IEEE Transactions on Image Processing, Vol. 11, Issue 2, pp. 77-88, 2002 | |
]. Dipti Prasad Mukherjee, Subhamoy Maitra, Scott T. Acton, “Spatial domain Digital Watermarking of Multimedia Object for Buyer Authentication”, IEEE Transactions on Multimedia, Volume 6, No.1, pp. 1- 15, 2004 | |
Mr. J.Samuel Manoharan
- India
samuel1530@gmail.com
Dr. Kezi C.Vijila
- India
Mr. A.Sathesh
- India
|
|
|
|
View all special issues >> | |
|
|