American Journal of Science, Engineering and Technology

Submit a Manuscript

Publishing with us to make your research visible to the widest possible audience.

Propose a Special Issue

Building a community of authors and readers to discuss the latest research and develop new ideas.

Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach

Nowadays digital image captured through Photoelectric Technique have undergone with malicious modifications. The proposed paper tells on a high quality recovery of digital document using absolute watermarking approach. The recoveries of lost informations are identified using bit values. Whereas the problem on recovering scaled, rotated and translated images exist still. Thus the absolute watermarking approach assures the recovery of digital images from any format of manipulations providing high quality pictures. The different sort of bits used for this purpose is classified into audit bit, carrier bit and output bit. Here the consistent feature of the original image is coded and the output bit is protected using a carrier encoder. This enables the audit bit to detect the erasure locations and retrieve the manipulated areas of the image with high quality pictures in low cost.

Carrier Encoding, Tamper Proofing, SIFT, Predictive Coding, Spoofing Detection, Compression

A. Suresh, A. Reyana. (2017). Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach. American Journal of Science, Engineering and Technology, 2(1), 33-38.

Copyright © 2017 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License ( which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

1. Swaminathan, Y. Mao, and M. Wu, “Robust and secure image hashing,” IEEE Trans. Information Forensics Security, vol. 1, no. 2, pp. 215–230, Jun. 2006.
2. S. Roy and Q. Sun, “Robust hash for detecting and localizing image tampering,” in Proc. IEEE Int. Conf. Image Process. (ICIP), vol. 6. Sep./Oct. 2007, pp. VI-117–VI-120.
3. M. Tagliasacchi, G. Valenzise, and S. Tubaro, “Hash-based identification of sparse image tampering,” IEEE Trans. Image Process., vol. 18, no. 11, pp. 2491–2504, Nov. 2009.
4. X. Zhang, Z. Qian, Y. Ren, and G. Feng, “Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 4, pp. 1223–1232, Dec. 2011.
5. M. Wu and B. Liu, “Watermarking for image authentication,” in Proc. Int. Conf. Image Process. (ICIP), vol. 2. 1998, pp. 437–441.
6. J. Fridrich, “Image watermarking for tamper detection,” in Proc. Int. Conf. Image Process. (ICIP), vol. 2. Oct. 1998, pp. 404–408.
7. I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” NEC Res. Inst., Princeton, NJ, Tech. Rep. 95-10, 1995.
8. K. C. Liu, “Colour image watermarking for tamper proofing and pattern based recovery,” IET Image Process., vol. 6, no. 5, pp. 445–454, Jul. 2012.
9. J. J. K. O Ruanaidh, W. J. Dowling, and F. M. Boland, “Watermarking digital images for copyright protection,” in IEE Proc. Vision, Image and Signal Processing, Aug. 1996, vol. 143, pp. 250–256.
10. J. F. Delaigle, C. De Vleeschouwer, and B. Macq, “Digital watermarking,” in Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques, Feb. 1996, vol. 2659, pp. 99–110.
11. E. Koch and J. Zhao, “Toward robust and hidden image copyright labeling,” in Proc. Workshop on Nonlinear Signal and Image Processing, I. Pitas, Ed., June 1995, pp. 452–455.
12. X. B. Kang and S. M. Wei, “Identifying tampered regions using singular value decomposition in digital image forensics,” in Proc. Int. Conf. Comput. Sci. Software Engg. vol. 3. Dec. 2008, pp. 926–930.
13. G. Voyatzis and I. Pitas, “Applications of toral automorphisms in image watermarking,” in Proc. IEEE Int. Conf. Image Processing, 1996, vol. 2, pp. 237–240.
14. D. Kundur and D. Hatzinakos, “A robust digital image watermarking method using wavelet-based fusion,” in Proc. IEEE Int. Conf. Image Processing, 1997, vol. 1, pp. 544–547.
15. D. Zou, Y. Q. Shi, Z. Ni, and W. Su, “A semi-fragile lossless digital watermarking scheme based on integer wavelet transform,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 10, pp. 1294–1300, Oct. 2006.
16. A. Swaminathan, M. Wu, and K. J. R. Liu, “Digital image forensics via intrinsic fingerprints,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 101–117, Mar. 2008.
17. C. B. Adsumilli, M. C. Q. Farias, S. K. Mitra, and M. Carli, “A robust error concealment technique using data hiding for image and video transmission over lossy channels,” IEEE Trans. Circuits Syst. Video Technol., vol. 15, no. 11, pp. 1394–1406, Nov. 2005.
18. M. Chen, Y. Zheng, and M. Wu, “Classification–based spatial error concealment for visual communications,” EURASIP J. Appl. Signal Process, vol. 2006, pp. 1–17, Jan. 2006, Art. ID 13438.
19. G. Gur, Y. Altug, E. Anarim, and F. Alagoz, “Image error concealment using watermarking with sub bands for wireless channels,” IEEE Commun. Lett., vol. 11, no. 2, pp. 179–181, Feb. 2007.
20. A. Yilmaz and A. A. Alatan, “Error detection and concealment for video transmission using information hiding,” Signal Process, Image Commun., vol. 23, no. 4, pp. 298–312, 2008.
21. J. Fridrich and M. Goljan, “Images with self-correcting capabilities,” in Proc. Int. Conf. Image Process. (ICIP), vol. 3. 1999, pp. 792–796.
22. M. Wu and B. Liu, “Data hiding in binary image for authentication and annotation,” IEEE Trans. Multimedia, vol. 6, no. 4, pp. 528–538, Aug. 2004.
23. X. Zhang, S. Wang, Z. Qian, and G. Feng, “Reversible fragile watermarking for locating tampered blocks in JPEG images,” Signal Process., vol. 90, no. 12, pp. 3026–3036, 2010.
24. X. Zhu, A. T. Ho, and P. Marziliano, “A new semi fragile image watermarking with robust tampering restoration using irregular sampling,” Signal Process., Image Commun., vol. 22, no. 5, pp. 515–528, 2007.
25. X. Zhang and S. Wang, “Fragile watermarking with error-free restoration capability,” IEEE Trans. Multimedia, vol. 10, no. 8, pp. 1490–1499, Dec. 2008.
26. Lowe, D. G. 2001. Local feature view clustering for 3D object recognition. IEEE Conference on Computer Vision and Pattern Recognition, Kauai, Hawaii, pp. 682-688.