An Image Watermarking Technique Proposed Based on Discrete Cosine Transformation and Pseudo-Random Generator
DOI:
https://doi.org/10.32792/jeps.v11i1.96Keywords:
Steganography, Watermark, Image watermark, Geffe, SecurityAbstract
The proposed technique to embed an image watermark in a host image depends on the discrete cosine transform and the Geffe algorithm in this search. The proposed algorithm uses the Geffe algorithm for encryption of the watermark. Discrete cosine transform (DCT) coefficients are then computed by dividing the host image into non-overlapped 8x8 blocks. The performance evaluation of the suggested technique was conducted using the peak signal-to-noise ratio for watermark 64x64 and 512x512 host images: Lena, Cameraman, and Pepper images give similar results. This technique does not require a host image in the watermark extraction process, then also watermark is extracted completely and better than its counterparts availableReferences
J. Han, X. Zhao, and C. Qiu, “A digital image watermarking method based on host image analysis
and genetic algorithm,” J. Ambient Intell. Humaniz. Comput., vol. 7, no. 1, pp. 37–45, 2016, doi:
1007/s12652-015-0298-3.
W. He-Jing, “A DCT Domain Image Watermarking Method Based on Matlab,” Int. J. Adv.
Network, Monit. Control., vol. 2, no. 2, pp. 38–45, 2017, doi: 10.21307/ijanmc-2017-008.
B. Ram, “Digital Image Watermarking Technique Using Discrete Wavelet Transform And
Discrete Cosine Transform,” Int. J. Adv. Res. Technol., vol. 2, no. 4, pp. 19–27, 2013.
V. M. Potdar, S. Han, and E. Chang, “A Survey of Digital Image Watermarking Techniques,” 2005
rd IEEE Int. Conf. Ind. Informatics, pp. 709–716, 2005.
S. P. Singh and G. Bhatnagar, “A new robust watermarking system in integer DCT domain,” J.
Vis. Commun. Image Represent., vol. 53, no. February 2017, pp. 86–101, 2018, doi:
1016/j.jvcir.2018.03.006.
K. PRABHA and I. S. SAM, “Robust color image watermarking by elliptical phase modification
Journal of Education for Pure Science- University of Thi-Qar
Vol.11, No1 (June, 2021)
Website: jceps.utq.edu.iq Email: jceps@eps.utq.edu.iq
based on Walsh Hadamard Transform and Triangular Vertex Transform,” Sādhanā, vol. 46, no. 1,
, doi: 10.1007/s12046-020-01553-5.
D. R. I. M. Setiadi, E. H. Rachmawanto, and C. A. Sari, “Secure Image Steganography Algorithm
Based on DCT with OTP Encryption,” J. Appl. Intell. Syst., vol. 2, no. 1, pp. 1–11, 2017, doi:
33633/jais.v2i1.1330.
M. Begum and M. S. Uddin, “Digital image watermarking techniques: A Review,” Inf., vol. 11, no.
, pp. 1–38, 2020, doi: 10.3390/info11020110.
A. Fatahbeygi and F. Akhlaghian Tab, “A highly robust and secure image watermarking based on
classification and visual cryptography,” J. Inf. Secur. Appl., vol. 45, no. January, pp. 71–78, 2019,
doi: 10.1016/j.jisa.2019.01.005.
S. A. Parah, J. A. Sheikh, N. A. Loan, and G. M. Bhat, “Robust and blind watermarking technique
in DCT domain using inter-block coefficient differencing,” Digit. Signal Process. A Rev. J., vol.
, pp. 11–24, 2016, doi: 10.1016/j.dsp.2016.02.005.
N. A. Loan, N. N. Hurrah, S. A. Parah, J. W. Lee, J. A. Sheikh, and G. M. Bhat, “Secure and
Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption,”
IEEE Access, vol. 6, pp. 19876–19897, 2018, doi: 10.1109/ACCESS.2018.2808172.
C. Wang, H. Zhang, and X. Zhou, “A self-recovery fragile image watermarking with variable
watermark capacity,” Appl. Sci., vol. 8, no. 4, 2018, doi: 10.3390/app8040548.
F. M. Khalifa and M. G. Saeed, “Image Watermarking Using All Phase Discrete Cosine
Biorthogonal Transform in Selected Pixel Blocks,” Polytech. J., vol. 10, no. 1, pp. 68–73, 2020,
doi: 10.25156/ptj.v10n1y2020.pp68-73.
S. Sleibi Al-Rawi, A. Tariq Sadiq, and B. Ghbeash Farhan, “Digital Video Quality Metric Based
on Watermarking Technique with Geffe Generator,” Comput. Sci. Eng., vol. 2, no. 7, pp. 138–146,
, doi: 10.5923/j.computer.20120207.03.
K. Marton, A. Suciu, and I. Ignat, “Randomness in digital cryptography: A survey,” Rom. J. Inf.
Sci. Technol., vol. 13, no. 3, pp. 219–240, 2010.
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. 1996.
A. Klein, Stream ciphers, vol. 9781447150. 2013.
T. Reports, “Digital Text Watermarking Techniques Classification and Open Research
Challenges : A Review,” no. June, 2020.
Y. Perwej, F. Parwej, and A. Perwej, “An Adaptive Watermarking Technique for the copyright of
digital images and Digital Image Protection,” Int. J. Multimed. Its Appl., vol. 4, no. 2, pp. 21–38,
, doi: 10.5121/ijma.2012.4202.
K. PRABHA and I. S. SAM, “Robust color image watermarking by elliptical phase modification
based on Walsh Hadamard Transform and Triangular Vertex Transform,” Sādhanā, vol. 46, no. 1,
, doi: 10.1007/s12046-020-01553-5.
C. Kumar, A. K. Singh, and P. Kumar, “A recent survey on image watermarking techniques and its
application in e-governance,” Multimed. Tools Appl., vol. 77, no. 3, pp. 3597–3622, 2018, doi:
1007/s11042-017-5222-8.
M. Begum and M. S. Uddin, “Digital image watermarking techniques: A Review,” Inf., vol. 11,
no. 2, pp. 1–38, 2020, doi: 10.3390/info11020110.
Downloads
Published
Issue
Section
License
Copyright Policy
Authors retain copyright of their articles published in the Journal of Education for Pure Science (JEPS).
By submitting their work, authors grant the journal a non-exclusive license to publish, distribute, and archive the article in all formats and media.
License
All articles published in JEPS are licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license permits unrestricted use, distribution, and reproduction in any medium, provided that the original author(s) and the source are properly credited.
Author Rights
Authors have the right to:
-
Share their articles on personal websites, institutional repositories, and academic platforms
-
Reuse their work in future research and publications
-
Distribute the published version without restriction
Journal Rights
The journal retains the right to:
-
Publish and archive the articles
-
Include them in indexing and archiving systems such as LOCKSS and CLOCKSS
-
Promote and disseminate the published work
Responsibility
The contents of all articles are the sole responsibility of the authors. The journal, editors, and editorial board are not responsible for any errors, opinions, or statements expressed in the published articles.
Open Access Statement
JEPS provides immediate open access to its content, supporting the principle that making research freely available to the public enhances global knowledge exchange.
This work is licensed under a Creative Commons Attribution 4.0 International License.
https://creativecommons.org/licenses/by/4.0/