A Novel Digital Watermarking Algorithm using Random Matrix Image

The availability of bandwidth for internet access is sufficient enough to communicate digital assets. These digital assets are subjected to various types of threats. (19) As a result of this, protection mechanism required for the protection of digital assets is of priority in research. The threat of current focus is unauthorized copying of digital assets which give boost to piracy. This under the copyright act is illegal and a robust mechanism is required to curb this kind of unauthorized copy. To safeguard the copyright digital assets, a robust digital watermarking technique is needed. The existing digital watermarking techniques protect digital assets by embedding a digital watermark into a host digital image. This embedding does induce slight distortion in the host image but the distortion is usually too small to be noticed. At the same time the embedded watermark must be robust enough to with stand deliberate attacks. There are various techniques of digital watermarking but researchers are making constant efforts to increase the robustness of the watermark image. The layered approach of watermarking based on Huffman coding (5) can soon increase the robustness of digital watermark.(11) Ultimately, increasing the security of copyright of protection. The proposed work is in similar direction where in RMI (Random Matrix Image) is used in place of Huffman coding. This innovative algorithm has considerably increased the robustness in digital watermark while also enhancing security of production.

[1]  S. Han,et al.  A survey of digital image watermarking techniques , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..

[2]  Min Wu,et al.  Attacks on digital watermarks , 1999, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020).

[3]  Chin-Chen Chang,et al.  A Digital Watermarking Scheme Based on Singular Value Decomposition , 2007, ESCAPE.

[4]  Der-Chyuan Lou,et al.  A robust watermarking scheme using self-reference image , 2006, Comput. Stand. Interfaces.

[5]  M Sreerama Murty,et al.  Digital Signature and Watermark Methods For Image Authentication using Cryptography Analysis , 2011 .

[6]  Ricardo L. de Queiroz,et al.  Processing JPEG-compressed images and documents , 1998, IEEE Trans. Image Process..

[7]  Darko Kirovski,et al.  Blind pattern matching attack on watermarking systems , 2003, IEEE Trans. Signal Process..

[8]  Mauro Barni,et al.  A DCT-domain system for robust image watermarking , 1998, Signal Process..

[9]  Mohammad S. Obaidat,et al.  A comparative study of digital watermarking in JPEG and JPEG 2000 environments , 2003, Inf. Sci..

[10]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[11]  Harald Galda Image Processing with Scilab and Image Processing Design Toolbox , 2011 .

[12]  Chih-Chin Lai,et al.  A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm , 2011, Digit. Signal Process..

[13]  Xiaojun Qi,et al.  A robust content-based digital image watermarking scheme , 2007, Signal Process..

[14]  M. L. Valarmathi,et al.  A Study on Watermarking Schemes for Image Authentication , 2010 .

[15]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[16]  I. Kostopoulos,et al.  A DIGITAL IMAGE WATERMARKING TECHNIQUE USING MODULATED PASCAL'S TRIANGLES , 2003 .

[17]  Pierre Duhamel,et al.  An asymmetric watermarking method , 2003, IEEE Trans. Signal Process..

[18]  Gaurav Bhatnagar,et al.  A new robust reference watermarking scheme based on DWT-SVD , 2009, Comput. Stand. Interfaces.

[19]  Zhi-Hong Guan,et al.  A novel digital watermark algorithm based on chaotic maps , 2007 .

[20]  D Hatzinakos,et al.  Improved robust watermarking through attack characterization. , 1998, Optics express.