Comparative Study of Various Transformations in Robust Watermarking Algorithms

In the digital world, that is currently evolving at such a rapid pace, intellectual copyright protection is becoming increasingly important. This is due to digital data being particularly simple to copy and resell without any loss of quality. Digital representation and distribution of data has increased the potential for misuse and theft and thus gives rise to problems associated with copyright protection and the enforcement of these rights. The main technical approaches to address the challenge of intellectual copyright protection are digital watermarking techniques. The spread spectrum technology has become an important technique that is not only widely used for still image and video watermarking, but also used for audio watermarking.A robust watermarking algorithm to watermark JPEG2000 compressed and encrypted images. The encryption algorithm is proposed to use a stream cipher. While the proposed technique embeds watermark(the transmission of question paper in online for a secure manner) in the compressed-encrypted domain, the extraction of watermark can be done in the decrypted domain. Based upon this application a study made for this transformation such as multiwavelet, contourlet and lifting scheme decomposition and also compare the characteristics of these transformations using LSB technique for various file formats and the spread-spectrum watermarking (SSW) technology. Experimental results show the various characteristics of different transforms, the embedding capacity,robustness, perceptual quality and security of the proposed algorithm, and their efficiency with various image formats in watermarking using LSB algorithm and spread spectrum.

[1]  Majid Rabbani,et al.  An overview of the JPEG 2000 still image compression standard , 2002, Signal Process. Image Commun..

[2]  J. Nalini Image Compression Using Wavelet Transform Based on the Lifting Scheme and its Implementation , 2011 .

[3]  Zekeriya Erkin,et al.  Anonymous Fingerprinting with Robust QIM Watermarking Techniques , 2007, EURASIP J. Inf. Secur..

[4]  Alessandro Neri,et al.  A joint digital watermarking and encryption method , 2008, Electronic Imaging.

[6]  Alessandro Neri,et al.  Joint Watermarking and Encryption of Color Images in the Fibonacci-Haar Domain , 2009, EURASIP J. Adv. Signal Process..

[7]  Shih-Fu Chang,et al.  A quantitative semi-fragile JPEG2000 image authentication system , 2002, Proceedings. International Conference on Image Processing.

[8]  Minh N. Do,et al.  Contourlets: a directional multiresolution image representation , 2002, Proceedings. International Conference on Image Processing.

[9]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[10]  Wavelets Based on Lifting Scheme and Its Application on Image Processing , 2008, 2008 International Symposium on Knowledge Acquisition and Modeling.

[11]  Zhi Li,et al.  Constructing Secure Content-Dependent Watermarking Scheme using Homomorphic Encryption , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[12]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[13]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[14]  Minh N. Do,et al.  Ieee Transactions on Image Processing the Contourlet Transform: an Efficient Directional Multiresolution Image Representation , 2022 .