Open Access   Article Go Back

A Novel Approach for Security in Digital Image Processing Using Water Marking: Analysis

Prabhpreet Kaur1 , Sonali Kanotra2

  1. Dept. of CSE, Guru Nanak Dev University, Amritsar, India.
  2. Dept. of CSE, Guru Nanak Dev University, Amritsar, India.

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-4 , Page no. 329-335, Apr-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i4.329335

Online published on Apr 30, 2018

Copyright © Prabhpreet Kaur, Sonali Kanotra . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Prabhpreet Kaur, Sonali Kanotra, “A Novel Approach for Security in Digital Image Processing Using Water Marking: Analysis,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.329-335, 2018.

MLA Style Citation: Prabhpreet Kaur, Sonali Kanotra "A Novel Approach for Security in Digital Image Processing Using Water Marking: Analysis." International Journal of Computer Sciences and Engineering 6.4 (2018): 329-335.

APA Style Citation: Prabhpreet Kaur, Sonali Kanotra, (2018). A Novel Approach for Security in Digital Image Processing Using Water Marking: Analysis. International Journal of Computer Sciences and Engineering, 6(4), 329-335.

BibTex Style Citation:
@article{Kaur_2018,
author = {Prabhpreet Kaur, Sonali Kanotra},
title = {A Novel Approach for Security in Digital Image Processing Using Water Marking: Analysis},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2018},
volume = {6},
Issue = {4},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {329-335},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1895},
doi = {https://doi.org/10.26438/ijcse/v6i4.329335}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i4.329335}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1895
TI - A Novel Approach for Security in Digital Image Processing Using Water Marking: Analysis
T2 - International Journal of Computer Sciences and Engineering
AU - Prabhpreet Kaur, Sonali Kanotra
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 329-335
IS - 4
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
746 334 downloads 219 downloads
  
  
           

Abstract

In this era of digital security, protection and illegal redistribution of digital media has become a major issue. The digital watermarking has been utilized to shield digital data from illicit redistribution and changes. In digital water denoting the image has been upgraded by installing commotion tolerant flag into transporter flag. Encryption procedures used to encode critical information has been inclined to assaults or attacks. Assist examination in encryption yields image encryption instrument as contrasting option to content encryption. The investigation of different system of digital watermarking as image encryption has been done in this paper to examine techniques which are better and can be used in future for enhancement; likewise the commitment of watermarking methods for security purposes has been broke down. The proposed literature provides comparative studies of techniques used in watermarking along with attributes considered including PSNR and MSE for enhancement.

Key-Words / Index Term

Digital Security, Watermarking, Encryption, PSNR MSE

References

[1] X. Pan, B. T. Yan, and K. Niu, “Multiclass detect of current steganographic methods for JPEG format based re-stegnography,” Link: http://www.ws.binghamton.edu/fridrich/Research/single.pdf , Proc. - 2nd IEEE Int. Conf. Adv. Comput. Control. ICACC 2010, vol. 4, no. experiment 1, pp. 79–82, 2010.
[2] R. Gupta and T. P. Singh, “New proposed practice for secure image combing cryptography stegnography and watermarking based on various parameters,” doi: 10.1109/IIH-MSP.2013.134 Proc. 2014 Int. Conf. Contemp. Comput. Informatics, IC3I 2014, pp. 475–479, 2014.
[3] X. Pan, B. Yan, and K. Niu, “Multiclass Detect of Current Steganographic Methods for JPEG Format Based Re-stegnography,”doi: 10.1109/ICCIAS.2006.295451, IEEE Access ,no. experiment 1, pp. 2–5, 2014.
[4] N. Sarani and K. Amudha, “A security technique based on watermarking and encryption for medical image,” doi: 10.1109/ICIIECS.2015.7192934, ICIIECS 2015 - 2015 IEEE Int. Conf. Innov. Information, Embed. Commun. Syst., pp. 3–6, 2015.
[5] M. Mese and P. P. Vaidyanathan, “Optimal histogram modification with MSE metric,” doi:10.1109/ICIIECS.2015.7192934 in 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221), 2001, vol. 3, pp. 1665–1668, 2001.
[6] C. Chang-yanab, Z. Ji-xian, and L. Zheng-jun, “Study on methods of noise reduction in a stripped image,” doi: 10.1109/TGRS.2016.2594080 IEEE Int. Arch. Photogramm. Remote Sens. Spat. Inf. Sci., no. 1, pp. 2–5, 2008.
[7] A. Kaur and J. Kaur, “Comparision of Dct and Dwt of Image Compression Techniques,” Doi: 10.1109/IPAS.2016.7880068 vol. 1, no. 4, pp. 49–52, 2012.
[8] K. Saranya and A. Professor-i, “Modern Applications of QR-Code for Security,” DOI: 10.1109/ICETECH.2016.7569235 no 2. March, pp. 1–5, 2016.
[9] V. Saravanan and A. Neeraja, “Security issues in computer networks and stegnography,” DOI: 10.1109/ISCO.2013.75696 7th Int. Conf. Intell. Syst. Control. ISCO 2013, pp. 363–366, 2013.
[10] A. U. Islam, F. Khalid, M. Shah, Z. Khan, T. Mahmood, A. Khan, U. Ali, and M. Naeem, “An improved image steganography technique based on MSB using bit differencing,” DOI: 10.1109/INTECH.2017.6935,2016 6th Int. Conf. Innov. Comput. Technol. INTECH 2016, pp. 265–269, 2017.
[11] T. Bathinda, “Invisible Video Multiple Watermarking Using Optimized Techniques,” doi: 10.1129/IEEE.2016.7929 IEEE Access vol. 3, pp. 1665–1668, 2016.
[12] S. S. Gonge, “An Integration of SVD Digital Image Watermarking with AES Technique for Copyright Protection and Security of Bank Cheque Image,”DOI: 10.12109/IEEE.2016.192934, IEEE pp. 769–778, 2016.
[13] P. Peng and I. S. Member, “Efficient Face Verification in Mobile Environment Using Component-based PCA,” doi: 10.12023/CISP.2013.71934no.3 Cisp, pp. 753–757, 2013.
[14] V. Ponomaryov, “Computer-aided detection system based on PCA/SVM for diagnosis of breast cancer lesions,” doi: 10.1102/CCEEEC.2015.12304,2015 Chil. Conf. Electr. Electron. Eng. Inf. Commun. Technol., pp. 429–436, 2015.
[15] M. Sajid, Q. Khizrai, and P. S. T. Bodkhe, “Image Encryption using Different Techniques for High Security Transmission over a Network,”DOI: 10.1209/IEEE.2014.34294 IEEE access vol. 2, no. 4, 2014.
[16] T. Zhang, Y. Zhou, and C. L. P. Chen, “A new combined chaotic system for image encryption,” doi: 10.1109/CSAE.2012.45923342,CSAE 2012 - Proceedings, 2012 IEEE Int. Conf. Comput. Sci. Autom. Eng., vol. 2, no. 2, pp. 331–335, 2012.
[17] A. Elsayed, A. Elleithy, P. Thunga, and Z. Wu, “Highly secure image steganography algorithm using curvelet transform and DCT encryption,” DOI: 10.1109/IEEE.2015.3429342015 IEEE Long Isl. Syst. Appl. Technol. Conf. LISAT 2015, pp. 2–7, 2015.
[18] Y. Zhou, K. Panetta, and S. Agaian, “Image encryption using binary key-images,” DOI: 10.1119/IEEE.2009.5602934 2009 IEEE Int. Conf. Syst. Man Cybern., no. October, pp. 4569–4574, 2009.
[19] xiaolin wu, B. Zhu, Y. Hu, and Y. Ran, “A novel colour image encryption scheme using rectangular transform-enhanced chaotic tent maps,” DOI: 10.1219/IEEE.2017.100986,IEEE Access, vol. 3536, no. c, pp. 1–1, 2017.
[20] A. Belazi, A. A. Abd El-Latif, and S. Belghith, “A novel image encryption scheme based on substitution-permutation network and chaos,”DOI: 10.23109/IEEE.2015.7192934,IEEE Signal Processing, vol. 128, pp. 155–170, 2016.
[21] M. Sandilya and M. Chawla, “Spatial Domain Image Steganography based on Security and Randomization,” DOI:11.4564/IEEE.2014.674934IEEE ACCESSvol. 5, no. 1, pp. 156–159, 2014.
[22] Z. Beiji and M. Y. Abdullah, “Information Security Technique in Frequency Domain,”, DOI: 10.5673/IACS.2011.234094 IEEE ACCESS vol. 5, no. December, pp. 279–289, 2011.
[23] M. Mofarreh-bonab, “Image Encryption by PCA,”DOI: 10.2239/IEEEOCS.2015.543623 IEEE OPEN ACCESS vol. 3, no. 3, pp. 28–30, 2015.