Comparative Analysis of Digital Watermarking Scheme using Enhanced Playfair Cipher in DCT & DWT

被引:0
作者
Pradhan, Chittaranjan [1 ]
Kabi, Kunal Kumar [1 ]
Saha, Bidyut Jyoti [1 ]
Arun [1 ]
机构
[1] KIIT Univ, Sch Comp Engn, Bhubaneswar, Odisha, India
来源
2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT | 2014年
关键词
Digital Watermarking; Playfair; Encryption; Decryption; Embedding; Extraction; Key Generation; Discrete Cosine Transform (DCT); Discrete Wavelet Transform (DWT);
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
During past few decades, communication over internet increased to transfer digital data across worldwide. The development of communication media over untrusted network bring lot of challenges for the developers. The algorithms and techniques should be robust, complex, and secure as well as ease of use and implementation in order to secure digital content over from potential risk and threats. In this paper, we have compared new encryption techniques as a preprocessing step for digital watermarking in Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) using the basics of playfair cipher. The proposed preprocessing step is implemented in different transform domain techniques to find the robust and secure way to embed ownership details in a cover media. The watermark image is encrypted using modified playfair cipher to form encrypted image which is further hidden in host media using DCT and DWT. The comparisons between different approaches are analyzed with the encrypted watermark information. The results and analysis show the robustness and security of these algorithms.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Digital Image Watermarking Based on DWT-DCT: Evaluate for a New Embedding Algorithm
    Akter, Afroja
    Nur-E-Tajnina
    Ullah, Muhammad Ahsan
    2014 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2014,
  • [32] A Joint DWT-DCT Based Robust Digital Watermarking Algorithm for Ownership Verification of Digital Images
    Laskar, R. H.
    Choudhury, Madhuchanda
    Chakraborty, Krishna
    Chakraborty, Shoubhik
    COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 482 - 491
  • [33] Robust adaptive image watermarking using visual models in DWT and DCT domain
    Abdulfetah A.A.
    Sun X.
    Yang H.
    Mohammad N.
    Information Technology Journal, 2010, 9 (03) : 460 - 466
  • [34] A digital audio watermarking scheme using selective mid band DCT coefficients and energy threshold
    Tewari, Tribhuwan
    Saxena, Vikas
    Gupta, J.
    INTERNATIONAL JOURNAL OF SPEECH TECHNOLOGY, 2014, 17 (04) : 365 - 371
  • [35] A hybrid digital image watermarking algorithm based on DCT-DWT and auto-thresholding
    Al-maweri, Nasr Addin Ahmed Salem
    Adnan, Wan Azizun Wan
    Ramli, Abd Rahman
    Samsudin, Khairulmizam
    Ahmad, Sharifah Mumtazah Syed
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4373 - 4395
  • [36] Unbreakable Digital Watermarking using combination of LSB and DCT
    Mathur, Etti
    Mathuria, Manish
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 351 - 354
  • [37] Z-Transform Based Digital Image Watermarking Scheme with DWT and Chaos
    Jayashree, N.
    Bhuvaneswaran, R. S.
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS (ICACNI 2015), VOL 1, 2016, 43 : 289 - 297
  • [38] Secure and authentic DCT image steganography through DWT - SVD based Digital watermarking with RSA encryption
    Patel, Palak
    Patel, Yask
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 736 - 739
  • [39] Robust Digital Image Watermarking Scheme Based on RDWT-DCT-SVD
    Khare, Priyank
    Srivastava, Vinay Kumar
    2018 5TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2018, : 88 - 93
  • [40] DWT-SVD-Based Watermarking Scheme Using Optimization Technique
    Nandi, Sarthak
    Santhi, V.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2015, 2016, 394 : 69 - 77