Image Security through DWT &SVD based Watermarking and masking with Encryption
نویسندگان
چکیده
The rapid growth in the digital technology, image processing tools and communication revolution through Internet has made the reproduction of digitally created artifacts simple and within reach very easily. This new trend has several advantages in terms of flexibility, cost effectiveness, convenience etc., but at the same time, also raised some serious concerns in actual real life situation. Information security is an evolving phenomenon and no single technique seems sufficient enough to provide security of the images in the internet environment [1][12]. Encryption and digital watermarking techniques may be incorporated together in digital right management to achieve better security [2][3]. These two technologies are complimenting each other, and the increased security of the digital artifacts can be achieved by using benefits of the both. Encryption transforms the original digital contain into human unreadable format and watermarking leaves the digital object intact and recognizable with a permanent embedded tag of user specific information or logo embedded into it[7]. To hide the secret user specific information in the form of watermark it is encrypted using secret key based congruently generated pseudorandom number and then bitxoring to generate the encrypted watermark. The encrypted watermark is embedded in the host image using DWT and SVD based techniques and the watermarked image is further encrypted using key hashed based encryption techniques. This will prevent man in the middle attack by intercepting the watermarked image by the malicious attacker who may try to remove or distort the watermark and use it for malicious purpose. This technique makes the image human unreadable format and reduced in size while distribution and the user specific information is encrypted and permanently tagged with the host image through watermarking for authentication purpose [11]. The experimental results demonstrate the high robustness of the proposed algorithm to various image processing attacks like noise additions, rotations, cropping, filtering, compression etc. Keywords-watermarking, encryption, entropy, pseudorandom number, PSNR, normalized cross correlation (NCC), Normalized Hamming Distance (NHD))
منابع مشابه
Secure Digital Image Watermarking using DWT, SVD and Chaotic Encryption with Genetic Algorithm
Watermarking is very useful to secure multimedia and personal data. The protection of watermark image is an issue these days. There are various threats occurs which can change watermark image. This paper is proposing a security mechanism for watermark image using DWT-SVD and optimized chaotic based image encryption through genetic algorithm with high level of robustness and security. The propos...
متن کاملDual Watermarking Scheme with Encryption
Digital Watermarking is used for copyright protection and authentication. In the proposed system, a Dual Watermarking Scheme based on DWT-SVD with chaos encryption algorithm, will be developed to improve the robustness and protection along with security. DWT and SVD have been used as a mathematical tool to embed watermark in the image. Two watermarks are embedded in the host image. The secondar...
متن کاملResearch on Color Watermarking Algorithm Based on RDWT-SVD
In this paper, a color image watermarking algorithm based on Redundant Discrete Wavelet Transform (RDWT) and Singular Value Decomposition (SVD) is proposed. The new algorithm selects blue component of a color image to carry the watermark information since the Human Visual System (HVS) is least sensitive to it. To increase the robustness especially towards affine attacks, RDWT is adopted for its...
متن کاملChaos Encryption Based DWT-SVD Watermarking
The progress in computer network technology, processing, reproducing and distribution of digital images has becomes very easy. Apart from its advantages, it also gives an opportunity to the attacker or illegal user. Two major approaches available to protect digital images are watermarking technique and encryption technique. This paper presents a combined watermarking and encryption method to fu...
متن کاملProposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013