Dual plane multiple spatial watermarking with self-encryption

被引:0
|
作者
ROOPAM SADH
NISHCHOL MISHRA
SANJEEV SHARMA
机构
[1] Rajiv Gandhi Proudyogiki Vishwavidyalaya,School of Information Technology
来源
Sadhana | 2016年 / 41卷
关键词
Spatial domain watermarking; multiple watermarking; dual plane watermarking; copyright protection; selfencryption.;
D O I
暂无
中图分类号
学科分类号
摘要
Watermarking has established itself as a promising solution in the context of digital image copyright protection. Frequency domain watermarking is mainly preferred due to associated robustness and perceptual issues but requires a large amount of computation. On the other hand spatial domain watermarking is much faster but lacks when robustness is concerned. In this paper a block based spatial domain watermarking technique for color images is proposed that is fast and robust. Two-way embedding introduced in the paper provides capability to previously estimate perceptual degradation in host image due to watermark embedding. Multiple watermarking in two component images is used to achieve better imperceptibility and better robustness. Self-encryption introduced aims to remove dependency over external secret key however optional encryption with random secret keys is proposed for providing better security. Proposed embedding technique is an effort to achieve proper balance between robustness and quality degradation of image. Experiments suggest proposed method is robust against processing attacks such as spatial filtering transformations image enhancement and loss compression.
引用
收藏
页码:1 / 14
页数:13
相关论文
共 50 条
  • [1] Dual plane multiple spatial watermarking with self-encryption
    Sadh, Roopam
    Mishra, Nishchol
    Sharma, Sanjeev
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2016, 41 (01): : 1 - 14
  • [2] A New Design for Self-Encryption
    Kromes, Roland
    Rodrigues, Joao
    Nascimento, Duarte
    Cadete, Goncalo
    Verdier, Francois
    Liang, Kaitai
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1645 - 1652
  • [3] Self-encryption for paper document authentication
    Fournel, T.
    Becker, J. M.
    Boutant, Y.
    ANTI-COUNTERFEIT IMAGE ANALYSIS METHODS (A SPECIAL SESSION OF ICSXII), 2007, 77
  • [4] Self-encryption will lock down your data
    Shurkin, Joel
    NEW SCIENTIST, 2011, 209 (2797) : 17 - 17
  • [5] A self-encryption mechanism for authentication of roaming and teleconference services
    Hwang, KF
    Chang, CC
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2003, 2 (02) : 400 - 407
  • [6] Self-Encryption Scheme for Data Security in Mobile Devices
    Chen, Yu
    Ku, Wei-Shinn
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 850 - +
  • [7] Fast handoff authentication scheme of WLAN based on self-encryption
    Research Centre of Information Security, Southeast University, Nanjing 210096, China
    Dongnan Daxue Xuebao, 2007, 6 (945-949):
  • [8] A self-encryption authentication protocol with identity anonymity for teleconference services
    Jiang, YX
    Lin, C
    Shi, MH
    Shen, XM
    GLOBECOM '05: IEEE Global Telecommunications Conference, Vols 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1706 - 1710
  • [9] Self-encryption remote user anonymous authentication scheme using smart cards
    Lu, Rong-Xing
    Cao, Zhen-Fu
    Su, Ren-Wang
    Journal of Shanghai Jiaotong University (Science), 2006, 11 E (02) : 210 - 214
  • [10] A Self-Encryption Remote User Anonymous Authentication Scheme Using Smart Cards
    陆荣幸
    曹珍富
    苏仁旺
    Journal of Shanghai Jiaotong University(Science), 2006, (02) : 210 - 214