Open Access   Article Go Back

Enhanced Security Mechanism Using Hybrid Approach of Watermarking

Deepakshi Mohal1 , Sandeep Sharma2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 176-189, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.176189

Online published on Feb 28, 2019

Copyright © Deepakshi Mohal, Sandeep Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Deepakshi Mohal, Sandeep Sharma, “Enhanced Security Mechanism Using Hybrid Approach of Watermarking,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.176-189, 2019.

MLA Style Citation: Deepakshi Mohal, Sandeep Sharma "Enhanced Security Mechanism Using Hybrid Approach of Watermarking." International Journal of Computer Sciences and Engineering 7.2 (2019): 176-189.

APA Style Citation: Deepakshi Mohal, Sandeep Sharma, (2019). Enhanced Security Mechanism Using Hybrid Approach of Watermarking. International Journal of Computer Sciences and Engineering, 7(2), 176-189.

BibTex Style Citation:
@article{Mohal_2019,
author = {Deepakshi Mohal, Sandeep Sharma},
title = {Enhanced Security Mechanism Using Hybrid Approach of Watermarking},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {176-189},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3640},
doi = {https://doi.org/10.26438/ijcse/v7i2.176189}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.176189}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3640
TI - Enhanced Security Mechanism Using Hybrid Approach of Watermarking
T2 - International Journal of Computer Sciences and Engineering
AU - Deepakshi Mohal, Sandeep Sharma
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 176-189
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
652 377 downloads 193 downloads
  
  
           

Abstract

In today’s era the information is represented with the help of digital system. With the advancement of technology , now a days data is transmitted from source to destination with the help of images. Images are the source of data transmission. Data transmission through images is more secure as compared to the transmission through networked medium. In networked medium, the text can be easily sent and sometimes affected or may be harm by some third party or others. In this paper, we have provided two way security mechanism. Firstly, we have encrypted the text in the image and then in second phase we have placed one image on another image. Hence it is a two way security mechanism. Proposed system uses the hybridization of SVD-SLT techniques to secure the image and achieve better results in terms of accuracy. Two phases of digital image watermarking are used one of which is encryption and another is decryption. SVD (Singular Value Decomposition) will divide the image into parts and SLT (Slant Let Transformation) will merge two images overall resulting in watermarking. The result improvement is indicated through performance analysis with parameters PSNR, SNR, SSIM and through proposed mechanism 15% improvement is observed.

Key-Words / Index Term

Truncated SVD, Modified SLT, Watermark, Encryption , Decryption, PSNR, SNR, SSIM

References

[1] A. Doegar, “A Review Paper on Digital Image Forgery Detection Techniques,” IEEE Access, vol. 1, no. 3, pp. 1–5, 2015.
[2] S. Panda and M. Mishra, “Passive Techniques of Digital Image Forgery Detection : Developments and Challenges,” pp. 281–290, 2018.
[3] D. Chauhan, D. Kasat, S. Jain, and V. Thakare, “Survey on Keypoint Based Copy-move Forgery Detection Methods on Image,” Procedia Comput. Sci., vol. 85, no. Cms, pp. 206–212, 2016.
[4] A. Kuznetsov and V. Myasnikov, “A new copy-move forgery detection algorithm using image preprocessing procedure,” Procedia Eng., vol. 201, pp. 436–444, 2017.
[5] H. Farid, “A survey of image forgery detection,” IEEE Access, no. 4, pp. 1–22, 2009.
[6] A. V. Malviya and S. A. Ladhake, “Pixel Based Image Forensic Technique for Copy-move Forgery Detection Using Auto Color Correlogram,” Procedia Comput. Sci., vol. 79, pp. 383–390, 2016.
[7] R. Mishra and P. Bhanodiya, “A review on steganography and cryptography,” Conf. Proceeding - 2015 Int. Conf. Adv. Comput. Eng. Appl. ICACEA 2015, pp. 119–122, 2015.
[8] R. Bhardwaj and V. Sharma, “Image Steganography Based on Complemented Message and Inverted Bit LSB Substitution,” Procedia Comput. Sci., vol. 93, no. September, pp. 832–838, 2016.
[9] C. G. Tappe and A. V Deorankar, “An Improved Image Steganography Technique based on LSB,” Int. Res. J. Eng. Technol., vol. 4, no. 4, pp. 2395–56, 2017.
[10] X. Li, “Digital Image Encryption and Decryption Algorithm W -- rn,” IEEE, no. X, pp. 253–257, 2016.
[11] D. I. G. Amalarethinam, “Image Encryption and Decryption in Public Key Cryptography based on MR,” Comput. Commun. Technol., pp. 133–138, 2015.
[12] Y. V. S. Rao, S. S. B. Rao, and N. R. Rekha, “Secure image steganography based on randomized sequence of cipher bits,” Proc. - 2011 8th Int. Conf. Inf. Technol. New Gener. ITNG 2011, pp. 332–335, 2010.
[13] D. M. Alghazzawi, S. H. Hasan, and M. S. Trigui, “Advanced Encryption Standard - Cryptanalysis research,” 2014 Int. Conf. Comput. Sustain. Glob. Dev. INDIACom 2014, pp. 660–667, 2014.
[14] L. Rosales Roldan, M. Cedillo Hernandez, J. Chao, M. Nakano Miyatake, and H. Perez Meana, “Watermarking-based Color Image Authentication with Detection and Recovery Capability,” IEEE Lat. Am. Trans., vol. 14, no. 2, pp. 1050–1057, 2016.
[15] S. S. Gonge and A. Ghatol, “Intelligent Systems Technologies and Applications 2016,” IEEE, vol. 530, pp. 85–97, 2016.
[16] Z. J. Xu, Z. Z. Wang, and Q. Lu, “Research on Image Watermarking Algorithm based on DCT,” vol. 10, pp. 1129–1135, 2011.
[17] U. H. Panchal and R. Srivastava, “A Comprehensive Survey on Digital Image Watermarking Techniques,” 2015 Fifth Int. Conf. Commun. Syst. Netw. Technol., pp. 591–595, 2015.
[18] Anita and A. Parmar, “Image security using watermarking based on DWT-SVD and Fuzzy Logic,” 2015 4th Int. Conf. Reliab. Infocom Technol. Optim. Trends Futur. Dir. ICRITO 2015, 2015.
[19] O. Jane, E. Elbaşi, and H. G. Ilk, “Hybrid non-blind watermarking based on DWT and SVD,” J. Appl. Res. Technol., vol. 12, no. 4, pp. 750–761, 2014.
[20] S. Bajracharya and R. Koju, “An Improved DWT-SVD Based Robust Digital Image Watermarking for Color Image,” Int. J. Eng. Manuf., vol. 7, no. 1, pp. 49–59, 2017.
[21] S. A. H. Nair and P. Aruna, “Comparison of DCT, SVD and BFOA based multimodal biometric watermarking system s,” Alexandria Eng. J., vol. 54, no. 4, pp. 1161–1174, 2015.
[22] Z. J. Xu, Z. Z. Wang, and Q. Lu, “Research on image watermarking algorithm based on DCT,” Procedia Environ. Sci., vol. 10, no. PART B, pp. 1129–1135, 2011.
[23] I. Conference and C. Engineering, “DWT DCT based New Image Watermarking Algorithm to Improve the Imperceptibility and Robustness,” vol. 10, 2017.