An Image Watermarking Technique Proposed Based on Discrete Cosine Transformation and Pseudo-Random Generator

المؤلفون

  • Salwa Shakir Baawi Department of Computer Information Systems College of Computer Science & IT University of Al-Qadisiyah, Diwaniyah, Iraq.
  • Khadhim Mahdi Hashim Department of Computer Science College of Education for Pure Science University of Thi-Qar, Thi-Qar, Iraq
  • Bushra Kamil Hilal Department of Computer Science College of Education for Pure Science University of Thi-Qar, Thi-Qar, Iraq.

DOI:

https://doi.org/10.32792/jeps.v11i1.96

الكلمات المفتاحية:

Steganography، Watermark، Image watermark، Geffe, Security

الملخص

The proposed technique to embed an image watermark in a host image depends on the discrete cosine transform and the Geffe algorithm in this search. The proposed algorithm uses the Geffe algorithm for encryption of the watermark. Discrete cosine transform (DCT) coefficients are then computed by dividing the host image into non-overlapped 8x8 blocks. The performance evaluation of the suggested technique was conducted using the peak signal-to-noise ratio for watermark 64x64 and 512x512 host images: Lena, Cameraman, and Pepper images give similar results. This technique does not require a host image in the watermark extraction process, then also watermark is extracted completely and better than its counterparts available

المراجع

J. Han, X. Zhao, and C. Qiu, “A digital image watermarking method based on host image analysis

and genetic algorithm,” J. Ambient Intell. Humaniz. Comput., vol. 7, no. 1, pp. 37–45, 2016, doi:

1007/s12652-015-0298-3.

W. He-Jing, “A DCT Domain Image Watermarking Method Based on Matlab,” Int. J. Adv.

Network, Monit. Control., vol. 2, no. 2, pp. 38–45, 2017, doi: 10.21307/ijanmc-2017-008.

B. Ram, “Digital Image Watermarking Technique Using Discrete Wavelet Transform And

Discrete Cosine Transform,” Int. J. Adv. Res. Technol., vol. 2, no. 4, pp. 19–27, 2013.

V. M. Potdar, S. Han, and E. Chang, “A Survey of Digital Image Watermarking Techniques,” 2005

rd IEEE Int. Conf. Ind. Informatics, pp. 709–716, 2005.

S. P. Singh and G. Bhatnagar, “A new robust watermarking system in integer DCT domain,” J.

Vis. Commun. Image Represent., vol. 53, no. February 2017, pp. 86–101, 2018, doi:

1016/j.jvcir.2018.03.006.

K. PRABHA and I. S. SAM, “Robust color image watermarking by elliptical phase modification

Journal of Education for Pure Science- University of Thi-Qar

Vol.11, No1 (June, 2021)

Website: jceps.utq.edu.iq Email: jceps@eps.utq.edu.iq

based on Walsh Hadamard Transform and Triangular Vertex Transform,” Sādhanā, vol. 46, no. 1,

, doi: 10.1007/s12046-020-01553-5.

D. R. I. M. Setiadi, E. H. Rachmawanto, and C. A. Sari, “Secure Image Steganography Algorithm

Based on DCT with OTP Encryption,” J. Appl. Intell. Syst., vol. 2, no. 1, pp. 1–11, 2017, doi:

33633/jais.v2i1.1330.

M. Begum and M. S. Uddin, “Digital image watermarking techniques: A Review,” Inf., vol. 11, no.

, pp. 1–38, 2020, doi: 10.3390/info11020110.

A. Fatahbeygi and F. Akhlaghian Tab, “A highly robust and secure image watermarking based on

classification and visual cryptography,” J. Inf. Secur. Appl., vol. 45, no. January, pp. 71–78, 2019,

doi: 10.1016/j.jisa.2019.01.005.

S. A. Parah, J. A. Sheikh, N. A. Loan, and G. M. Bhat, “Robust and blind watermarking technique

in DCT domain using inter-block coefficient differencing,” Digit. Signal Process. A Rev. J., vol.

, pp. 11–24, 2016, doi: 10.1016/j.dsp.2016.02.005.

N. A. Loan, N. N. Hurrah, S. A. Parah, J. W. Lee, J. A. Sheikh, and G. M. Bhat, “Secure and

Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption,”

IEEE Access, vol. 6, pp. 19876–19897, 2018, doi: 10.1109/ACCESS.2018.2808172.

C. Wang, H. Zhang, and X. Zhou, “A self-recovery fragile image watermarking with variable

watermark capacity,” Appl. Sci., vol. 8, no. 4, 2018, doi: 10.3390/app8040548.

F. M. Khalifa and M. G. Saeed, “Image Watermarking Using All Phase Discrete Cosine

Biorthogonal Transform in Selected Pixel Blocks,” Polytech. J., vol. 10, no. 1, pp. 68–73, 2020,

doi: 10.25156/ptj.v10n1y2020.pp68-73.

S. Sleibi Al-Rawi, A. Tariq Sadiq, and B. Ghbeash Farhan, “Digital Video Quality Metric Based

on Watermarking Technique with Geffe Generator,” Comput. Sci. Eng., vol. 2, no. 7, pp. 138–146,

, doi: 10.5923/j.computer.20120207.03.

K. Marton, A. Suciu, and I. Ignat, “Randomness in digital cryptography: A survey,” Rom. J. Inf.

Sci. Technol., vol. 13, no. 3, pp. 219–240, 2010.

A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. 1996.

A. Klein, Stream ciphers, vol. 9781447150. 2013.

T. Reports, “Digital Text Watermarking Techniques Classification and Open Research

Challenges : A Review,” no. June, 2020.

Y. Perwej, F. Parwej, and A. Perwej, “An Adaptive Watermarking Technique for the copyright of

digital images and Digital Image Protection,” Int. J. Multimed. Its Appl., vol. 4, no. 2, pp. 21–38,

, doi: 10.5121/ijma.2012.4202.

K. PRABHA and I. S. SAM, “Robust color image watermarking by elliptical phase modification

based on Walsh Hadamard Transform and Triangular Vertex Transform,” Sādhanā, vol. 46, no. 1,

, doi: 10.1007/s12046-020-01553-5.

C. Kumar, A. K. Singh, and P. Kumar, “A recent survey on image watermarking techniques and its

application in e-governance,” Multimed. Tools Appl., vol. 77, no. 3, pp. 3597–3622, 2018, doi:

1007/s11042-017-5222-8.

M. Begum and M. S. Uddin, “Digital image watermarking techniques: A Review,” Inf., vol. 11,

no. 2, pp. 1–38, 2020, doi: 10.3390/info11020110.

التنزيلات

منشور

2021-06-10

إصدار

القسم

Articles