Digital Image Watermarking in Discrete Fourier Transform domain
|Ningombam Jimson1 , Kattamanchi Hemachandran2|
1 Department of Computer Science, Assam University, Dorgakona, Silchar, Pin-788011, India.
2 Department of Computer Science, Assam University, Dorgakona, Silchar, Pin-788011, India.
Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 16-22, May-2018
Online published on May 31, 2018
Copyright © Ningombam Jimson, Kattamanchi Hemachandran . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
|View this paper at Google Scholar | DPI Digital Library|
|XML View||PDF Download|
IEEE Style Citation: Ningombam Jimson, Kattamanchi Hemachandran, Digital Image Watermarking in Discrete Fourier Transform domain, International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.16-22, 2018.
MLA Style Citation: Ningombam Jimson, Kattamanchi Hemachandran "Digital Image Watermarking in Discrete Fourier Transform domain." International Journal of Computer Sciences and Engineering 6.5 (2018): 16-22.
APA Style Citation: Ningombam Jimson, Kattamanchi Hemachandran, (2018). Digital Image Watermarking in Discrete Fourier Transform domain. International Journal of Computer Sciences and Engineering, 6(5), 16-22.
|18||30 downloads||2 downloads|
|The rapid development of internet communication has increased the rate at which digital data is being shared wideley as the digital data can be flawlessly copied and distributed over the internet. A Digital watermarking is a process in which a bit of information is added to the digital data like image video and audio. A CDMA based image watermarking method in Discrete Fourier Transform (DFT) is proposed in this paper for protecting the copyright and authentication of the digital image. The original digital image is divided into a non-overlapping block of 8X8 and one bit of binary information is embedded in the block using two highly uncorrelated Pseudo-random sequences in the coefficient of the magnitude domain of DFT. For watermark extraction, the original image is not required. Based on the correlation values between magnitude coefficient and Pseudo-random sequences the watermark is extracted from the watermarked image. The scheme is tested using Stimark Benchmarking tools. The Experimental result suggested that the method is robust against numbers of digital watermarking attacks.|
|Key-Words / Index Term :|
|Discrete Fourier Transform (DFT), CDMA Image Watermarking, Peak Signal to Noise Ratio (PSNR), Normalized Correlation (NC)|
. Chandramouli, R., Memon, N., & Rabbani, M. (2002). Digital watermarking. Encyclopedia of Imaging Science and Technology.
. Mohanty, S. P., Sengupta, A., Guturu, P., & Kougianos, E. (2017). Everything You Want to Know About Watermarking: From Paper Marks to Hardware Protection: From paper marks to hardware protection. IEEE Consumer Electronics Magazine, 6(3), 83-91.
. Qidwai, U., & Chen, C. H. (2009). Digital image processing: an algorithmic approach with MATLAB. CRC press.
. Ruanaidh, J. J. K. O., Dowling, W. J., & Boland, F. M. (1996, September). Phase watermarking of digital images. In Image Processing, 1996. Proceedings., International Conference on(Vol. 3, pp. 239-242). IEEE.
. Voloshynovskiy, S., Pereira, S., Iquise, V., & Pun, T. (2001). Attack modelling: towards a second generation watermarking benchmark. Signal processing, 81(6), 1177-1214.
. Janthawongwilai, K., & Amornraksa, T. (2004, October). Improved performance of amplitude modulation based digital watermarking. In Communications and Information Technology, 2004. ISCIT 2004. IEEE International Symposium on (Vol. 1, pp. 318-323). IEEE.
. Na, W., Yunjin, W., & Xia, L. (2009, December). A novel robust watermarking algorithm based on DWT and DCT. In Computational Intelligence and Security, 2009. CIS`09. International Conference on (Vol. 1, pp. 437-441). IEEE.
. Fabien A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn. Attacks on copyright marking systems, in David Aucsmith (Ed), Information Hiding, Second International Workshop, IH98, Portland, Oregon, U.S.A., April 15-17, 1998, Proceedings, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 219-239.
. Mazumder, J. A., & Hemachandran, K. (2014). Color Image Steganography Using Discrete Wavelet Transformation and Optimized Message Distribution Method. International Journal of Computer Sciences and Engineering, 2(7), 90-100.
. Dheeraj Sai D V L N, K N S Aneesh, (2015). Image Water Marking Using Cryptography. International Journal of Computer Sciences and Engineering, 3(7), 171-178.