Open Access   Article Go Back

Mitigation of Geometrical Attack in Watermarking Technique Using Support Vector Machine

Ankita Agrawal1 , Anubha Parajapati2

  1. Dept. of Computer Science, Oriental Institute of Science and Technology, Bhopal, India.
  2. Dept. of Computer Science, Oriental Institute of Science and Technology, Bhopal, India.

Correspondence should be addressed to: Ankita Agrawal.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-1 , Page no. 172-176, Jan-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.172176

Online published on Jan 31, 2018

Copyright © Ankita Agrawal, Anubha Parajapati . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ankita Agrawal, Anubha Parajapati, “Mitigation of Geometrical Attack in Watermarking Technique Using Support Vector Machine,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.172-176, 2018.

MLA Style Citation: Ankita Agrawal, Anubha Parajapati "Mitigation of Geometrical Attack in Watermarking Technique Using Support Vector Machine." International Journal of Computer Sciences and Engineering 6.1 (2018): 172-176.

APA Style Citation: Ankita Agrawal, Anubha Parajapati, (2018). Mitigation of Geometrical Attack in Watermarking Technique Using Support Vector Machine. International Journal of Computer Sciences and Engineering, 6(1), 172-176.

BibTex Style Citation:
@article{Agrawal_2018,
author = {Ankita Agrawal, Anubha Parajapati},
title = {Mitigation of Geometrical Attack in Watermarking Technique Using Support Vector Machine},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2018},
volume = {6},
Issue = {1},
month = {1},
year = {2018},
issn = {2347-2693},
pages = {172-176},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1654},
doi = {https://doi.org/10.26438/ijcse/v6i1.172176}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i1.172176}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1654
TI - Mitigation of Geometrical Attack in Watermarking Technique Using Support Vector Machine
T2 - International Journal of Computer Sciences and Engineering
AU - Ankita Agrawal, Anubha Parajapati
PY - 2018
DA - 2018/01/31
PB - IJCSE, Indore, INDIA
SP - 172-176
IS - 1
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
688 365 downloads 249 downloads
  
  
           

Abstract

The current decade of watermarking technique faced a problem of geometrical and some other attack. The minimization of security attack in watermarking technique is major issue. For the minimization of geometrical attack used various transformed based technique. The transform based watermarking technique used some well know function such as DWT, DCT and combination of more wavelet based transform function. Now a day used various authors feature selection based watermarking technique. The feature selection based watermarking technique gives better security strength in compression of another transform based technique. In this paper proposed a classification based watermarking technique and reduces the mitigation of geometrical attack for the process of watermark security strength. For the minimization of attack used correlation coefficient matrix for the processing of embedding and the process of embedding done by the pattern generation. The process of pattern generation used support vector machine. The support vector machine is classifier; it classifies the data on the biases of guidance.

Key-Words / Index Term

Watermarking, Geometrical Attack, DCT, DWT, SVM.

References

[1] Arun, Kunal Kumar Kabi, Bidyut Jyoti Saha and ChittaranjanPradhan “BlindDigital Watermarking algorithm based on DCT Domain and Fractal images”, IEEE,2014, Pp 1-7.
[2] T.Naga Jyothi and K.HariBabu ” Non Blind Watermarking Scheme for Image and Video using DWT-SVD”, IJECS, 2013, Pp 1-5.
[3] Yanhong Zhang “Blind Watermark Algorithm Based on HVS and RBF Neural Network in DWT Domain”, ISSN, 2009, Pp 1-10.
[4] Achintya Singhal, KamredUdham Singh “Digital Watermarking Algorithms: A Review”, IJJECS, 2015, Pp 1-8.
[5] Kavyan Ghaderi, Fardin.Akhalghain and Parham. Moradi, “A New Robust Semi-Blind Digital Image Watermarking Approach Based on LWT-SVD and Fractal images”, Pp 1-5.
[6] SunJianguo, Zheng Chonghui and Gao Di “Lossless Digital Watermarking Scheme for Image Maps”, China Communication, 2014, Pp 1-6.
[7] Hao-Tang Chan, Wen-Jyi Hwang, and Chau-Jern Cheng “Digital Hologram AuthenticationUsing a Hadamard-Based Reversible Fragile Watermarking Algorithm” Journal of Display Technology, 2015, Pp 1-11.
[8] Xu Li, Xingming Sun, Senior Member, IEEE, and Quansheng Liu “Image Integrity Authentication Scheme Based on Fixed Point Theory” IEEE, 2015, Pp 1-14.
[9] E. Chrysochos, V. Fotopoulos, and A. N. Skodras “Robust Watermarking of digital images Based on Chaotic Mapping and DCT” EUSIPCO,2008,Pp1-5.
[10] T. Sridevi and S Sameena Fatima “Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD”, International Journal of Computer Applications, 2013, Pp 1-5.
[11] Usha Pal,Dinesh Chandra “Survey Of Digital Watermarking Using Dct”, IJCSE, 2012, Pp 1-3.
[12] Azz El Arab El Hossainia, Mohamed El Aroussib, Khadija Jamalic, Samir Mbarkid and Mohammed Wahbie “A New Robust Blind Watermarking Scheme Based on Steerable pyramidand DCT using Pearson product moment correlation”, JOURNAL OF COMPUTERS,2014, Pp 1-13.
[13] Med Karim Abdmouleh, Ali Khalfallah and Med Salim Bouhlel “An Overview on Cryptography and Watermarking”, Computers, Automatic Control, Signal Processing and Systems Science, 2014, Pp 1-7.
[14] P. Shanthi, R. S. Bhuvaneswaran “Robust Chaos Based Image Watermarking Scheme for Fractal-Wavelet”, Applied Mathematical Sciences, 2014, Pp 1-12.
[15] EktaMiglani, Sachin Gupta, “Digital Watermarking Methodologies - A Survey”, IJARCSSE, 2014, Pp 1-7.
[16] Th. Rupachandra Singha, Kh. Manglem Singh and Sudipta Roya “Video watermarking scheme based on visual cryptography and scene change detection”, Published by Elsevier GmbH,2013. Pp 1-8.
[17] N.Saranya and P.Elango “Non Blind Watermarking Theme for Image and Video Victimisation DWT-SVD”, IJRCAR, 2014, Pp 1-8.