Providing Security for E-Government Document Images Using Digital Watermarking in the Frequency Domain

被引:0
作者
Al-Haj, Ali [1 ]
Farfoura, Mahmoud [2 ]
机构
[1] Princess Sumaya Univ Technol, Amman 11941, Jordan
[2] Royal Sci Soc, Amman 11941, Jordan
来源
5TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2019) | 2019年
关键词
e-government; information security; digital watermarking; COPYRIGHT PROTECTION; SCHEME;
D O I
10.1109/infoman.2019.8714674
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Many countries around the world have realized the benefits of the e-government platform in peoples' daily life, and accordingly have already made partial implementations of the key e-government processes. However, before full implementation of all potential services can be made, governments demand the deployment of effective information security measures to ensure secrecy and privacy of their citizens. In this paper, a robust watermarking algorithm is proposed to provide copyright protection for e-government document images. The proposed algorithm utilizes two transforms: the Discrete Wavelet Transformation (DWT) and the Singular Value Decomposition (SVD). Experimental results demonstrate that the proposed e-government document images watermarking algorithm performs considerably well compared to existing relevant algorithms.
引用
收藏
页码:77 / 81
页数:5
相关论文
共 16 条
[11]   Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics [J].
Makbol, Nasrin M. ;
Khoo, Bee Ee ;
Rassem, Taha H. .
IET IMAGE PROCESSING, 2016, 10 (01) :34-52
[12]   Computable Bounds for Rate Distortion With Feed Forward for Stationary and Ergodic Sources [J].
Naiss, Iddo ;
Permuter, Haim H. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (02) :760-781
[13]  
Perez-Gonzalez F., 2011, FUNDAMENTALS DIGITAL
[14]   Copyright Protection for E-Government Document Images [J].
Rosiyadi, Didi ;
Horng, Shi-Jinn ;
Fan, Pingzhi ;
Wang, Xian ;
Khan, Muhammad Khurram ;
Yi, Pan .
IEEE MULTIMEDIA, 2012, 19 (03) :62-73
[15]  
Stallings W., 2017, Cryptography and Network Security: Principles and Practice
[16]   Adaptive blind watermarking based on improved noise sensitivity [J].
Xue, Shengjun ;
Teng, Xuan .
FOURTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 4, PROCEEDINGS, 2007, :731-734