Watermarking – A Novel Approach

  IJCOT-book-cover
 
International Journal of Computer Organization Trends and Technology (IJCOT)          
 
© 2014 by IJCOT Journal
Volume - 4 Issue - 1
Year of Publication : 2014
Authors :  Y. Arockia Raj , V. Priya
DOI :  10.14445/22492593/IJCOT-V4P312

MLA

Y. Arockia Raj , V. Priya ,`Watermarking – A Novel Approach", International Journal of Computer & organization Trends  (IJCOT), V4(1):22-26 Jan - Feb 2014, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract

The major growth of information technology is based on the growth of computer networks. The computer network diminished the entire global in a nutshell, via the internet and the intranet capabilities. In the recent year, communicating information within authenticated groups in the text, image and video formats are highly unavoidable one. And in the same manner, there are more possibility that the communicated information to be hacked by the anonymous hacker. The hacker may be passive or active; it is highly risk for many engineering applications like military network. Hence, digital watermarking is merged to rectify the above pitfalls. Watermarking techniques developed for images are mainly classified into visible and invisible approaches. The study further analyses the modern digital watermarking system.

References

[1]Chandra Mohan, B. and Baskaran, R. 2010, Improving network performance by optimal load balancing using ACO based Redundant Link Avoidance algorithm, International Journal of Computer Science Issues, 7, 3, : 27-35
[2]Chandra Mohan, B. and Baskaran, R. 2011, Reliable Transmission for Network Centric Military Networks, European Journal of Scientific Research, 50, 4: 564-574
[3]Chandra Mohan, B. and Baskaran, R. 2011, Reliable Barrier-free Services in Next Generation Networks, Lecture Notes in Computer Science, Second International Conference on Advances in Power Electronics and Instrumentation Engineering, PEIE 2011, Springer-Verlag Berlin Heidelberg, CCIS 148 : 79-82
[4]Chandra Mohan, B. and Baskaran, R. 2011, Survey on Recent Research and Implementation of Ant Colony Optimization in Various Engineering Applications, International Journal in Computational Intelligent Systems, 4, 4:566-582
[5]Chandra Mohan, B. and Baskaran, R. 2011, Energy Aware and Energy Efficient Routing Protocol for Adhoc Network using Restructured Artificial Bee Colony System, HPAGC 2011, Springer-Verlag Berlin Heidelberg, CCIS 169 : 480-491
[6]Chandra Mohan, B., Sandeep, R. and Sridharan, D. 2008, A Data Mining approach for Predicting Reliable Path for Congestion Free Routing using Self-Motivated Neural Network, Studies in Computational Intelligence, Springer-verlag, 149 : 237-246
[7]Chih-Chin, L., 2011. A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Digital Signal Processing, 21: 522-527.
[8]Cox, I.J., J. Kilian, T. Shamoon and T. Leighton, 1996. Secure spread spectrum watermarking of images, audio and video. Proceeding of the IEEE International Conference Image Processing, 3: 243-246
[9]Craver, S., N. Memon, B. Yeo and N.M. Yeung, 1998. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications. IEEE J. Selected Areas Communi., 16: 573-586.
[10]Jean-Luc, S., J.C. Emmanuel and L.D. David, 2002. The curvelet transform for image denoising. IEEE Trans. Image Proc., 11: 670-684.
[11]Johnson, N.F. and S. Jajodia, 1998. Steganalysis of images created using current steganography software. Proceeding of the 2nd International Workshop (IH`98), Proceedings. Lecture Notes Comp. Sci., 1525: 273-289.
[12]Mintzer, F., 1996. Towards online worldwide access to vatican library materials. IBM J. Res. Develop., 40: 139-162.
[13]Petitcolas, F., R. Anderson and M. Kuhn, 1998. Attacks on copyright marking systems. Proceeding of the 2nd International Workshop (IH`98), Proceedings. Lecture Notes Com. Sci., 1: 218-238.
[14]Sanjay, R. and R. Balasubramanian, 2011. A chaotic system based fragile watermarking scheme for image tamper detection. Int. J. Electr. Communi., 65: 840-847.
[15]Saraju, P., N.R. Mohanty and B. Karthikeyan, 2006. A Dual Voltage-Frequency VLSI Chip for Image Watermarking in DCT Domain. IEEE Trans. Circuits Syst. II: Express Briefs, 1-5.
[16]Vellasques, E., S. Robert and G. Eric, 2011. A high throughput system for intelligent watermarking of bi-tonal images. Soft Comput. J., DOI: 10.1016/j.asoc.2011.05.038.

Keywords
Providing additional information, Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Discrete Fourier Transform (DFT), Peak Signal to Noise Ratio (PSNR), sliding square window containing