A Frame Work for Various Watermarking Algorithms

Authors

  • S. Thabasu Kannan Principal, Pannai College of Engineering and Technology, Sivagangai - 630 561, Tamil Nadu, India
  • S. Azhagu Senthil Research Scholar & Lecturer, Dept. of Computer Science, Raja Doraisingam Govt Arts College, Sivagangai - 630 561, Tamil Nadu, India

DOI:

https://doi.org/10.51983/ajcst-2015.4.1.1746

Abstract

Now-a-days watermarking plays a pivotal role in most of the industries for providing security to their own as
well as hired or leased data. This paper its main aim is to study Spatial and Fractal watermarking algorithms and also choosing the effective and efficient one for improving the resistance in data compression. In the Spatial domain method, there is no costly transforms needed to be computed for watermark embedding. The luminance values will be manipulated directly. The fractal domain is to determine a set of contractive transformation to approximate each block of the image with a larger block. The composition of all these transformations has the image as its fixed point. Starting with any image hence to apply the composition of the transformations repeatedly and get an approximation of the original image. For the implementation, we have used minimum nine coordinate positions. The watermarking algorithms to be taken for this study are Bruyn algorithm and Langelaar algorithm. In all graph, we have plotted X axis as peak signal to noise ratio (PSNR) and y axis as Correlation with original watermark. The threshold value ά is set to 5. The result is smaller than the threshold value then it is feasible, otherwise it is not.

References

R.C. Gonzalez and R.E. Woods, "Digital Image Processing," Addison-Wesley Publishing Company, Inc., 2008.

B. Pfitzmann, "Information Hiding Terminology," Proc. First Int. Workshop on Information Hiding, Cambridge, UK, May 30 - June 1, 2009, Lecture Notes in Computer Science, Vol. 1174, Ross Anderson (Ed.), pp. 347-350.

F.A.P. Petitcolas et al., "Information Hiding - A Survey," Proceedings of the IEEE, Vol. 87, No. 7, July 1999, pp. 1062-1078.

Hal Berghel, "Watermarking Cyberspace," Communications of the ACM, Nov. 2009, Vol. 40, No. 11, pp. 19-24.

F. Mintzer et al., "Effective and Ineffective Digital Watermarks," IEEE Intl. Conference on Image Processing, ICIP-97, Vol. 3, pp. 9-12.

J.M. Acken, "How Watermarking Adds Value to Digital Content?," Communications of the ACM, July 1998, Vol. 41, No. 7, pp. 75-77.

I.J. Cox and M. Miller, "A Review of Watermarking and Importance of Perceptual Modelling," Proc. SPIE Human Vision and Imaging, SPIE-3016, Feb 2008.

R. Barnett, "Digital Watermarking: Application, Techniques, and Challenges," IEE Electronics and Communication Engineering Journal, August 1999, pp. 173-183.

R.G. Van Schyndel et al., "A Digital Watermark," Proc. IEEE Intl. Conf. on Image Processing, ICIP-94, Vol. 2, pp. 86-90.

W. Bendor et al., "Techniques for Data Hiding," IBM Systems Journal, Vol. 35, No. 3 and 4, pp. 313-336, 1996.

E. Franz et al., "Computer-Based Steganography," Proc. First Intl. Workshop on Information Hiding, Cambridge, UK, May 30 - June 1, 1996, Lecture Notes in Computer Science, Vol. 1174, Ross Anderson (Ed.).

F.A.P. Petitcolas et al., "Information Hiding - A Survey," Proceedings of the IEEE, Vol. 87, No. 7, July 1999, pp. 1062-1078.

J. Cox and M. Miller, "A Review of Watermarking and Importance of Perceptual Modelling," Proc. SPIE Human Vision and Imaging, SPIE-3016, Feb 1997.

F. Mintzer et al., "Opportunities for Watermarking Standards," Communications of the ACM, July 1998, Vol. 41, No. 7, pp. 57-64.

G. Voyatzis and I. Pitas, "The Use of Watermarks in the Protection of Digital Multimedia Products," Proceedings of the IEEE, Vol. 87, No. 7, July 1999, pp. 1197-1207.

Downloads

Published

26-04-2015

How to Cite

Thabasu Kannan, S., & Azhagu Senthil, S. (2015). A Frame Work for Various Watermarking Algorithms. Asian Journal of Computer Science and Technology, 4(1), 21–28. https://doi.org/10.51983/ajcst-2015.4.1.1746