Comparative Analysis of Digital Watermarking Scheme using Enhanced Playfair Cipher in DCT & DWT

被引:0
作者
Pradhan, Chittaranjan [1 ]
Kabi, Kunal Kumar [1 ]
Saha, Bidyut Jyoti [1 ]
Arun [1 ]
机构
[1] KIIT Univ, Sch Comp Engn, Bhubaneswar, Odisha, India
来源
2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT | 2014年
关键词
Digital Watermarking; Playfair; Encryption; Decryption; Embedding; Extraction; Key Generation; Discrete Cosine Transform (DCT); Discrete Wavelet Transform (DWT);
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
During past few decades, communication over internet increased to transfer digital data across worldwide. The development of communication media over untrusted network bring lot of challenges for the developers. The algorithms and techniques should be robust, complex, and secure as well as ease of use and implementation in order to secure digital content over from potential risk and threats. In this paper, we have compared new encryption techniques as a preprocessing step for digital watermarking in Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) using the basics of playfair cipher. The proposed preprocessing step is implemented in different transform domain techniques to find the robust and secure way to embed ownership details in a cover media. The watermark image is encrypted using modified playfair cipher to form encrypted image which is further hidden in host media using DCT and DWT. The comparisons between different approaches are analyzed with the encrypted watermark information. The results and analysis show the robustness and security of these algorithms.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Digital watermarking technique using block correlation of DCT coefficients
    Choi, Y
    Aizawa, K
    [J]. ELECTRONICS AND COMMUNICATIONS IN JAPAN PART II-ELECTRONICS, 2002, 85 (09): : 23 - 31
  • [42] Digital Image Watermarking in Color Models Using DCT Transformation
    Hovancak, Rastislav
    Levicky, Dusan
    [J]. RADIOENGINEERING, 2004, 13 (01) : 22 - 25
  • [43] A DWT-based Digital Watermarking Scheme for Image Tamper Detection, Localization, and Restoration
    Som, Sukalyan
    Palit, Sarbani
    Dey, Kashinath
    Sarkar, Dipabali
    Sarkar, Jayeeta
    Sarkar, Kheyali
    [J]. APPLIED COMPUTATION AND SECURITY SYSTEMS, VOL 2, 2015, 305 : 17 - 37
  • [44] Optimization of MSFs for watermarking using DWT-DCT-SVD and fish migration optimization with QUATRE
    Xiao-Xue Sun
    Jeng-Shyang Pan
    Shaowei Weng
    Chia-Cheng Hu
    Shu-Chuan Chu
    [J]. Multimedia Tools and Applications, 2023, 82 : 2255 - 2276
  • [45] Robust Digital Watermarking for Coloured Images using SVD and DWT Technique
    Sharma, Preeti
    Jain, Tapan
    [J]. SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 1024 - 1027
  • [46] Optimization of MSFs for watermarking using DWT-DCT-SVD and fish migration optimization with QUATRE
    Sun, Xiao-Xue
    Pan, Jeng-Shyang
    Weng, Shaowei
    Hu, Chia-Cheng
    Chu, Shu-Chuan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (02) : 2255 - 2276
  • [47] Digital watermarking based on fractal image coding using DWT and HVS
    Ohga, Satoshi
    Hamabe, Ryuji
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2014, 18 (02) : 81 - 89
  • [48] A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks
    Fazli, Saeid
    Moeini, Masoumeh
    [J]. OPTIK, 2016, 127 (02): : 964 - 972
  • [49] Conception & Implementation of a Novel Digital Image Watermarking Algorithm using Cascading of DCT and LWT
    Tomar, Vivek
    Kumar, Arvind
    Choudhary, Ankur
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 501 - 505
  • [50] Analysis and Comparison of Holographic and Traditional Digital Image Watermarking in DWT Domain
    Yong, Xie
    Shan, Wu-yang
    Cao, Xiao-long
    Feng, Qi-qin
    [J]. PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 790 - 793