Image Security through DWT &SVD based Watermarking and masking with Encryption

نویسندگان

  • Tapas Bandyopadhyay
  • B Bandyopadhyay
  • B N Chatterji
چکیده

The rapid growth in the digital technology, image processing tools and communication revolution through Internet has made the reproduction of digitally created artifacts simple and within reach very easily. This new trend has several advantages in terms of flexibility, cost effectiveness, convenience etc., but at the same time, also raised some serious concerns in actual real life situation. Information security is an evolving phenomenon and no single technique seems sufficient enough to provide security of the images in the internet environment [1][12]. Encryption and digital watermarking techniques may be incorporated together in digital right management to achieve better security [2][3]. These two technologies are complimenting each other, and the increased security of the digital artifacts can be achieved by using benefits of the both. Encryption transforms the original digital contain into human unreadable format and watermarking leaves the digital object intact and recognizable with a permanent embedded tag of user specific information or logo embedded into it[7]. To hide the secret user specific information in the form of watermark it is encrypted using secret key based congruently generated pseudorandom number and then bitxoring to generate the encrypted watermark. The encrypted watermark is embedded in the host image using DWT and SVD based techniques and the watermarked image is further encrypted using key hashed based encryption techniques. This will prevent man in the middle attack by intercepting the watermarked image by the malicious attacker who may try to remove or distort the watermark and use it for malicious purpose. This technique makes the image human unreadable format and reduced in size while distribution and the user specific information is encrypted and permanently tagged with the host image through watermarking for authentication purpose [11]. The experimental results demonstrate the high robustness of the proposed algorithm to various image processing attacks like noise additions, rotations, cropping, filtering, compression etc. Keywords-watermarking, encryption, entropy, pseudorandom number, PSNR, normalized cross correlation (NCC), Normalized Hamming Distance (NHD))

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Digital Image Watermarking using DWT, SVD and Chaotic Encryption with Genetic Algorithm

Watermarking is very useful to secure multimedia and personal data. The protection of watermark image is an issue these days. There are various threats occurs which can change watermark image. This paper is proposing a security mechanism for watermark image using DWT-SVD and optimized chaotic based image encryption through genetic algorithm with high level of robustness and security. The propos...

متن کامل

Dual Watermarking Scheme with Encryption

Digital Watermarking is used for copyright protection and authentication. In the proposed system, a Dual Watermarking Scheme based on DWT-SVD with chaos encryption algorithm, will be developed to improve the robustness and protection along with security. DWT and SVD have been used as a mathematical tool to embed watermark in the image. Two watermarks are embedded in the host image. The secondar...

متن کامل

Research on Color Watermarking Algorithm Based on RDWT-SVD

In this paper, a color image watermarking algorithm based on Redundant Discrete Wavelet Transform (RDWT) and Singular Value Decomposition (SVD) is proposed. The new algorithm selects blue component of a color image to carry the watermark information since the Human Visual System (HVS) is least sensitive to it. To increase the robustness especially towards affine attacks, RDWT is adopted for its...

متن کامل

Chaos Encryption Based DWT-SVD Watermarking

The progress in computer network technology, processing, reproducing and distribution of digital images has becomes very easy. Apart from its advantages, it also gives an opportunity to the attacker or illegal user. Two major approaches available to protect digital images are watermarking technique and encryption technique. This paper presents a combined watermarking and encryption method to fu...

متن کامل

Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking

Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013