Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach
American Journal of Science, Engineering and Technology
Volume 2, Issue 1, March 2017, Pages: 33-38
Received: Dec. 14, 2016; Accepted: Jan. 14, 2017; Published: Feb. 13, 2017
Views 2584      Downloads 69
Authors
A. Suresh, Department of Computer Science and Engineering, Nehru Institute of Engineering and Technology, Coimbatore, Tamilnadu, India
A. Reyana, Department of Computer Science and Engineering, Nehru Institute of Engineering and Technology, Coimbatore, Tamilnadu, India
Article Tools
Follow on us
Abstract
Nowadays digital image captured through Photoelectric Technique have undergone with malicious modifications. The proposed paper tells on a high quality recovery of digital document using absolute watermarking approach. The recoveries of lost informations are identified using bit values. Whereas the problem on recovering scaled, rotated and translated images exist still. Thus the absolute watermarking approach assures the recovery of digital images from any format of manipulations providing high quality pictures. The different sort of bits used for this purpose is classified into audit bit, carrier bit and output bit. Here the consistent feature of the original image is coded and the output bit is protected using a carrier encoder. This enables the audit bit to detect the erasure locations and retrieve the manipulated areas of the image with high quality pictures in low cost.
Keywords
Carrier Encoding, Tamper Proofing, SIFT, Predictive Coding, Spoofing Detection, Compression
To cite this article
A. Suresh, A. Reyana, Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach, American Journal of Science, Engineering and Technology. Vol. 2, No. 1, 2017, pp. 33-38. doi: 10.11648/j.ajset.20170201.16
Copyright
Copyright © 2017 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
Swaminathan, Y. Mao, and M. Wu, “Robust and secure image hashing,” IEEE Trans. Information Forensics Security, vol. 1, no. 2, pp. 215–230, Jun. 2006.
[2]
S. Roy and Q. Sun, “Robust hash for detecting and localizing image tampering,” in Proc. IEEE Int. Conf. Image Process. (ICIP), vol. 6. Sep./Oct. 2007, pp. VI-117–VI-120.
[3]
M. Tagliasacchi, G. Valenzise, and S. Tubaro, “Hash-based identification of sparse image tampering,” IEEE Trans. Image Process., vol. 18, no. 11, pp. 2491–2504, Nov. 2009.
[4]
X. Zhang, Z. Qian, Y. Ren, and G. Feng, “Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 4, pp. 1223–1232, Dec. 2011.
[5]
M. Wu and B. Liu, “Watermarking for image authentication,” in Proc. Int. Conf. Image Process. (ICIP), vol. 2. 1998, pp. 437–441.
[6]
J. Fridrich, “Image watermarking for tamper detection,” in Proc. Int. Conf. Image Process. (ICIP), vol. 2. Oct. 1998, pp. 404–408.
[7]
I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” NEC Res. Inst., Princeton, NJ, Tech. Rep. 95-10, 1995.
[8]
K. C. Liu, “Colour image watermarking for tamper proofing and pattern based recovery,” IET Image Process., vol. 6, no. 5, pp. 445–454, Jul. 2012.
[9]
J. J. K. O Ruanaidh, W. J. Dowling, and F. M. Boland, “Watermarking digital images for copyright protection,” in IEE Proc. Vision, Image and Signal Processing, Aug. 1996, vol. 143, pp. 250–256.
[10]
J. F. Delaigle, C. De Vleeschouwer, and B. Macq, “Digital watermarking,” in Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques, Feb. 1996, vol. 2659, pp. 99–110.
[11]
E. Koch and J. Zhao, “Toward robust and hidden image copyright labeling,” in Proc. Workshop on Nonlinear Signal and Image Processing, I. Pitas, Ed., June 1995, pp. 452–455.
[12]
X. B. Kang and S. M. Wei, “Identifying tampered regions using singular value decomposition in digital image forensics,” in Proc. Int. Conf. Comput. Sci. Software Engg. vol. 3. Dec. 2008, pp. 926–930.
[13]
G. Voyatzis and I. Pitas, “Applications of toral automorphisms in image watermarking,” in Proc. IEEE Int. Conf. Image Processing, 1996, vol. 2, pp. 237–240.
[14]
D. Kundur and D. Hatzinakos, “A robust digital image watermarking method using wavelet-based fusion,” in Proc. IEEE Int. Conf. Image Processing, 1997, vol. 1, pp. 544–547.
[15]
D. Zou, Y. Q. Shi, Z. Ni, and W. Su, “A semi-fragile lossless digital watermarking scheme based on integer wavelet transform,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 10, pp. 1294–1300, Oct. 2006.
[16]
A. Swaminathan, M. Wu, and K. J. R. Liu, “Digital image forensics via intrinsic fingerprints,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 101–117, Mar. 2008.
[17]
C. B. Adsumilli, M. C. Q. Farias, S. K. Mitra, and M. Carli, “A robust error concealment technique using data hiding for image and video transmission over lossy channels,” IEEE Trans. Circuits Syst. Video Technol., vol. 15, no. 11, pp. 1394–1406, Nov. 2005.
[18]
M. Chen, Y. Zheng, and M. Wu, “Classification–based spatial error concealment for visual communications,” EURASIP J. Appl. Signal Process, vol. 2006, pp. 1–17, Jan. 2006, Art. ID 13438.
[19]
G. Gur, Y. Altug, E. Anarim, and F. Alagoz, “Image error concealment using watermarking with sub bands for wireless channels,” IEEE Commun. Lett., vol. 11, no. 2, pp. 179–181, Feb. 2007.
[20]
A. Yilmaz and A. A. Alatan, “Error detection and concealment for video transmission using information hiding,” Signal Process, Image Commun., vol. 23, no. 4, pp. 298–312, 2008.
[21]
J. Fridrich and M. Goljan, “Images with self-correcting capabilities,” in Proc. Int. Conf. Image Process. (ICIP), vol. 3. 1999, pp. 792–796.
[22]
M. Wu and B. Liu, “Data hiding in binary image for authentication and annotation,” IEEE Trans. Multimedia, vol. 6, no. 4, pp. 528–538, Aug. 2004.
[23]
X. Zhang, S. Wang, Z. Qian, and G. Feng, “Reversible fragile watermarking for locating tampered blocks in JPEG images,” Signal Process., vol. 90, no. 12, pp. 3026–3036, 2010.
[24]
X. Zhu, A. T. Ho, and P. Marziliano, “A new semi fragile image watermarking with robust tampering restoration using irregular sampling,” Signal Process., Image Commun., vol. 22, no. 5, pp. 515–528, 2007.
[25]
X. Zhang and S. Wang, “Fragile watermarking with error-free restoration capability,” IEEE Trans. Multimedia, vol. 10, no. 8, pp. 1490–1499, Dec. 2008.
[26]
Lowe, D. G. 2001. Local feature view clustering for 3D object recognition. IEEE Conference on Computer Vision and Pattern Recognition, Kauai, Hawaii, pp. 682-688.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186