| Peer-Reviewed

Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach

Received: 14 December 2016    Accepted: 14 January 2017    Published: 13 February 2017
Views:       Downloads:
Abstract

Nowadays digital image captured through Photoelectric Technique have undergone with malicious modifications. The proposed paper tells on a high quality recovery of digital document using absolute watermarking approach. The recoveries of lost informations are identified using bit values. Whereas the problem on recovering scaled, rotated and translated images exist still. Thus the absolute watermarking approach assures the recovery of digital images from any format of manipulations providing high quality pictures. The different sort of bits used for this purpose is classified into audit bit, carrier bit and output bit. Here the consistent feature of the original image is coded and the output bit is protected using a carrier encoder. This enables the audit bit to detect the erasure locations and retrieve the manipulated areas of the image with high quality pictures in low cost.

Published in American Journal of Science, Engineering and Technology (Volume 2, Issue 1)
DOI 10.11648/j.ajset.20170201.16
Page(s) 33-38
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Carrier Encoding, Tamper Proofing, SIFT, Predictive Coding, Spoofing Detection, Compression

References
[1] Swaminathan, Y. Mao, and M. Wu, “Robust and secure image hashing,” IEEE Trans. Information Forensics Security, vol. 1, no. 2, pp. 215–230, Jun. 2006.
[2] S. Roy and Q. Sun, “Robust hash for detecting and localizing image tampering,” in Proc. IEEE Int. Conf. Image Process. (ICIP), vol. 6. Sep./Oct. 2007, pp. VI-117–VI-120.
[3] M. Tagliasacchi, G. Valenzise, and S. Tubaro, “Hash-based identification of sparse image tampering,” IEEE Trans. Image Process., vol. 18, no. 11, pp. 2491–2504, Nov. 2009.
[4] X. Zhang, Z. Qian, Y. Ren, and G. Feng, “Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 4, pp. 1223–1232, Dec. 2011.
[5] M. Wu and B. Liu, “Watermarking for image authentication,” in Proc. Int. Conf. Image Process. (ICIP), vol. 2. 1998, pp. 437–441.
[6] J. Fridrich, “Image watermarking for tamper detection,” in Proc. Int. Conf. Image Process. (ICIP), vol. 2. Oct. 1998, pp. 404–408.
[7] I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” NEC Res. Inst., Princeton, NJ, Tech. Rep. 95-10, 1995.
[8] K. C. Liu, “Colour image watermarking for tamper proofing and pattern based recovery,” IET Image Process., vol. 6, no. 5, pp. 445–454, Jul. 2012.
[9] J. J. K. O Ruanaidh, W. J. Dowling, and F. M. Boland, “Watermarking digital images for copyright protection,” in IEE Proc. Vision, Image and Signal Processing, Aug. 1996, vol. 143, pp. 250–256.
[10] J. F. Delaigle, C. De Vleeschouwer, and B. Macq, “Digital watermarking,” in Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques, Feb. 1996, vol. 2659, pp. 99–110.
[11] E. Koch and J. Zhao, “Toward robust and hidden image copyright labeling,” in Proc. Workshop on Nonlinear Signal and Image Processing, I. Pitas, Ed., June 1995, pp. 452–455.
[12] X. B. Kang and S. M. Wei, “Identifying tampered regions using singular value decomposition in digital image forensics,” in Proc. Int. Conf. Comput. Sci. Software Engg. vol. 3. Dec. 2008, pp. 926–930.
[13] G. Voyatzis and I. Pitas, “Applications of toral automorphisms in image watermarking,” in Proc. IEEE Int. Conf. Image Processing, 1996, vol. 2, pp. 237–240.
[14] D. Kundur and D. Hatzinakos, “A robust digital image watermarking method using wavelet-based fusion,” in Proc. IEEE Int. Conf. Image Processing, 1997, vol. 1, pp. 544–547.
[15] D. Zou, Y. Q. Shi, Z. Ni, and W. Su, “A semi-fragile lossless digital watermarking scheme based on integer wavelet transform,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 10, pp. 1294–1300, Oct. 2006.
[16] A. Swaminathan, M. Wu, and K. J. R. Liu, “Digital image forensics via intrinsic fingerprints,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 101–117, Mar. 2008.
[17] C. B. Adsumilli, M. C. Q. Farias, S. K. Mitra, and M. Carli, “A robust error concealment technique using data hiding for image and video transmission over lossy channels,” IEEE Trans. Circuits Syst. Video Technol., vol. 15, no. 11, pp. 1394–1406, Nov. 2005.
[18] M. Chen, Y. Zheng, and M. Wu, “Classification–based spatial error concealment for visual communications,” EURASIP J. Appl. Signal Process, vol. 2006, pp. 1–17, Jan. 2006, Art. ID 13438.
[19] G. Gur, Y. Altug, E. Anarim, and F. Alagoz, “Image error concealment using watermarking with sub bands for wireless channels,” IEEE Commun. Lett., vol. 11, no. 2, pp. 179–181, Feb. 2007.
[20] A. Yilmaz and A. A. Alatan, “Error detection and concealment for video transmission using information hiding,” Signal Process, Image Commun., vol. 23, no. 4, pp. 298–312, 2008.
[21] J. Fridrich and M. Goljan, “Images with self-correcting capabilities,” in Proc. Int. Conf. Image Process. (ICIP), vol. 3. 1999, pp. 792–796.
[22] M. Wu and B. Liu, “Data hiding in binary image for authentication and annotation,” IEEE Trans. Multimedia, vol. 6, no. 4, pp. 528–538, Aug. 2004.
[23] X. Zhang, S. Wang, Z. Qian, and G. Feng, “Reversible fragile watermarking for locating tampered blocks in JPEG images,” Signal Process., vol. 90, no. 12, pp. 3026–3036, 2010.
[24] X. Zhu, A. T. Ho, and P. Marziliano, “A new semi fragile image watermarking with robust tampering restoration using irregular sampling,” Signal Process., Image Commun., vol. 22, no. 5, pp. 515–528, 2007.
[25] X. Zhang and S. Wang, “Fragile watermarking with error-free restoration capability,” IEEE Trans. Multimedia, vol. 10, no. 8, pp. 1490–1499, Dec. 2008.
[26] Lowe, D. G. 2001. Local feature view clustering for 3D object recognition. IEEE Conference on Computer Vision and Pattern Recognition, Kauai, Hawaii, pp. 682-688.
Cite This Article
  • APA Style

    A. Suresh, A. Reyana. (2017). Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach. American Journal of Science, Engineering and Technology, 2(1), 33-38. https://doi.org/10.11648/j.ajset.20170201.16

    Copy | Download

    ACS Style

    A. Suresh; A. Reyana. Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach. Am. J. Sci. Eng. Technol. 2017, 2(1), 33-38. doi: 10.11648/j.ajset.20170201.16

    Copy | Download

    AMA Style

    A. Suresh, A. Reyana. Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach. Am J Sci Eng Technol. 2017;2(1):33-38. doi: 10.11648/j.ajset.20170201.16

    Copy | Download

  • @article{10.11648/j.ajset.20170201.16,
      author = {A. Suresh and A. Reyana},
      title = {Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach},
      journal = {American Journal of Science, Engineering and Technology},
      volume = {2},
      number = {1},
      pages = {33-38},
      doi = {10.11648/j.ajset.20170201.16},
      url = {https://doi.org/10.11648/j.ajset.20170201.16},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajset.20170201.16},
      abstract = {Nowadays digital image captured through Photoelectric Technique have undergone with malicious modifications. The proposed paper tells on a high quality recovery of digital document using absolute watermarking approach. The recoveries of lost informations are identified using bit values. Whereas the problem on recovering scaled, rotated and translated images exist still. Thus the absolute watermarking approach assures the recovery of digital images from any format of manipulations providing high quality pictures. The different sort of bits used for this purpose is classified into audit bit, carrier bit and output bit. Here the consistent feature of the original image is coded and the output bit is protected using a carrier encoder. This enables the audit bit to detect the erasure locations and retrieve the manipulated areas of the image with high quality pictures in low cost.},
     year = {2017}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach
    AU  - A. Suresh
    AU  - A. Reyana
    Y1  - 2017/02/13
    PY  - 2017
    N1  - https://doi.org/10.11648/j.ajset.20170201.16
    DO  - 10.11648/j.ajset.20170201.16
    T2  - American Journal of Science, Engineering and Technology
    JF  - American Journal of Science, Engineering and Technology
    JO  - American Journal of Science, Engineering and Technology
    SP  - 33
    EP  - 38
    PB  - Science Publishing Group
    SN  - 2578-8353
    UR  - https://doi.org/10.11648/j.ajset.20170201.16
    AB  - Nowadays digital image captured through Photoelectric Technique have undergone with malicious modifications. The proposed paper tells on a high quality recovery of digital document using absolute watermarking approach. The recoveries of lost informations are identified using bit values. Whereas the problem on recovering scaled, rotated and translated images exist still. Thus the absolute watermarking approach assures the recovery of digital images from any format of manipulations providing high quality pictures. The different sort of bits used for this purpose is classified into audit bit, carrier bit and output bit. Here the consistent feature of the original image is coded and the output bit is protected using a carrier encoder. This enables the audit bit to detect the erasure locations and retrieve the manipulated areas of the image with high quality pictures in low cost.
    VL  - 2
    IS  - 1
    ER  - 

    Copy | Download

Author Information
  • Department of Computer Science and Engineering, Nehru Institute of Engineering and Technology, Coimbatore, Tamilnadu, India

  • Department of Computer Science and Engineering, Nehru Institute of Engineering and Technology, Coimbatore, Tamilnadu, India

  • Sections