Open Access Open Access  Restricted Access Subscription or Fee Access

A Discrete Cosine Transform (DCT) based Watermarking Scheme for Confidence Guarantee Image Transmission

Hayam A. Abd El-Hameed, Emad S. Hassan, Sami A. El-Dolil, F.E. Abd El-Samie

Abstract


Since all the multimedia products are released via internet so it‟s very important need today to protect the data from malicious attacks. This directs us to look at digital watermarking which intends to protect the copyright information of the users. This paper presents a Discrete Cosine Transform (DCT) based Signature scheme which provides higher resistance to image processing attacks such as speakle noise, rotation, Gaussian, etc. The invasive distribution of digital images and the growing concern on their integrity and originality in need of authenticating corrupted images by transmission. To meet this need, this paper proposes a new technique that is make digital signatures in image robust to image degradations. The DCT is used to improve the security against forgery attacks due to its precise localization properties and excellent multiscale. Several experiments are carried out to test the proposed scheme in terms of Peak Signal to Noise Ratio (PSNR) and Normalized Cross-Correlation (NC).The obtained results confirm that the proposed scheme can achieve good efficiency against transmission errors. It also is very robust to counterfeiting attacks.

Keywords


Discrete Cosine Transform (DCT), Signature, Attacks, Normalized Cross-Correlation (NC).

Full Text:

PDF

References


C.-T Hsu and J.-L.Wu, (1998) “Multiresolution watermarking for digital images,” IEEE Trans.Circuits Syst. II, vol. 45, pp. 1097–1101.

Blossom Kaur, Amandeep Kaur and Jasdeep Singh “Steganographic approach for hiding image in DCT domain” International Journal of Advances in Engineering & Technology, July 2011.

Xiaojun Qi and KokSheik Wong, (2005) “An Adaptive DCT-Based MOD-4 Steganography Method”, 0-7803-9134-9/05 IEEE.

LOU D.C., LIU J.L., LI C.-T.: „Digital Signature-Based Image Authentication‟, in LU C.S. (EDS.):„Multimedia security: steganography and digital watermarking techniques for protection of intellectual property‟ (Idea Group Inc., 2003).

Frank Hartung and Martin Kutter, “Multimedia WatermarkingTechniques” Proceedings of the IEEE, Vol. 87, No. 7, July 1999.

Gengming Zhu, and Nong Sang, (2008),” Watermarking Algorithm Research and Implementation Based on DCT Block”, World Academy of Science, Engineering and Technology 45.

Chiou-Ting Hsu and Ja-Ling Wu, "Hidden Digital Watermarks in Images" IEEE Transactions on Image Processing, Vol. 8, No.1, January 1999.

Combined DWT-DCT Digital Image Watermarking Ali Al-Haj Department of Computer Engineering, School of Electrical Engineering, Princess Sumaya University for Technology, POBox 1928, Al-Jubeiha, 11941 Amman, Jordan Journal of Computer Science 3 (9): 740-746, 2007 ISSN 1549-3636 ©2007 Science Publications.

Hidden Bits: A Survey of Techniques for Digital Watermarking Chris Shoemaker Independent Study EER-290 Prof. Rudko Spring 2002.

Frank Hartung and Martin Kutter, “Multimedia Watermarking Techniques” Proceedings of the IEEE, Vol. 87, No. 7, July 1999.

Eugene T. Lin and Edward J. Delp, "A Review of Fragile Image Watermarks" Video and Image Processing Laboratory (VIPER) School of Electrical and Computer Engineering Purdue University, West Lafayette, Indiana, USA.

Combined DWT-DCT Digital Image Watermarking Ali Al-Haj Department of Computer Engineering, School of Electrical Engineering, Princess Sumaya University for Technology, POBox 1928, Al-Jubeiha, 11941 Amman, Jordan Journal of Computer Science 3 (9): 740-746, 2007 ISSN 1549-3636 ©2007 Science Publications.

Aleena Devasia, Alina Menoth, Steape Monis, Maria George and Sneha Shivamkutty “A Survey on Watermarking of Images Using Hybrid Techniques” VESIT , International Technological Conference-2014 (I-TechCON), Jan. 03 – 04, 2014.

Johnson, N.F. &Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998.

“Reference guide: Graphics Technical Options and Decisions”, http://www.devx.com/projectcool/Article/1999.

Owens, M., “A discussion of covert channels and steganography”, SANS Institute, 2002.

T. Morkel , J.H.P. Eloff , M.S. Olivier “An overview of image steganography‟.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.