A Novel Approaches in Blind Multiple Water Marking for Color Video using DCT and Arnold Embedding Techniques

Himanshu Mokashe*, Abha Choubey**, Siddhartha Choubey***
*-*** Department of Computer Science & Engineering, Shri Shankaracharya Technical Campus, Bhilai, Chhattisgarh, India.
Periodicity:April - June'2020
DOI : https://doi.org/10.26634/jip.7.2.17407

Abstract

Digital water marking is an essential technique to secure digital media files in the modern world for the area of data authentication, security and copyright protection. In this paper, we focused on the blind video multiple water marking systems. The non-blind water marking systems, the need for the original host media file in the watermark restoration operation, make insurance over the system support, increases memory capacity, and improves communications bandwidth. In this paper, an advanced blind video multiple-watermarking methods are proposed to solve this problem. This concept is built through image interlacing. In this technique, 2D discrete cosine transform (DCT) is used as a watermark embedding and extracting field, Arnold transform algorithm is used for watermark encryption and decryption method, which works on different varieties of media (gray image, color image, and video) are used as watermarks. The robustness of this technique's is examined by applying the different kinds of interventions such as geometric, noising, format-compression, and image-processing attacks. The simulation results show the effectiveness and outstanding achievement of the proposed technique in saving system resources, memory capacity, and communications bandwidth. In the submitted paper, robustness and quality are tested with video frame parameters like Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), and Normalized Correlation Coefficient (NCC). Further, the proposed paper has a comparison with related Watermarking schemes.

Keywords

Discrete Cosine Transform (DCT), WaterMarking Techniques, Arnold Transform, Dual-Tree Complex Wavelets Transform, Image Parameters, PSNR, SSIM.

How to Cite this Article?

Mokashe, H., Choubey, A., and Choubey, S. (2020). A Novel Approaches in Blind Multiple Water Marking for Color Video using DCT and Arnold Embedding Techniques. i-manager's Journal on Image Processing, 7(2), 7-12. https://doi.org/10.26634/jip.7.2.17407

References

[1]. Anfinogenov, S., Korzhik, V. I., & Morales-Luna, G. (2012). A multiple robust digital watermarking system for still images. International Journal of Computer Science and Applications, 9(3), 37-46.
[2]. Hernandez, J. R., Amado, M., & Perez-Gonzalez, F. (2000). DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Transactions on Image Processing, 9(1), 55- 68. https://doi.org/10.1109/83.817598
[3]. Jaiswal, R. J., & Patil, N. N. (2012). Multiple watermarking for text documents: A review. World Journal of Science and Technology, 2(3), 176-179.
[4]. Langelaar, G. C., & Lagendijk, R. L. (2001). Optimal differential energy watermarking of DCT encoded images and video. IEEE Transactions on Image Processing, 10(1), 148-158. https://doi.org/10.1109/83.892451
[5]. Li, D., Mersereau, R. M., & Simske, S. (2005, September). Blur identification based on Kurtosis minimization. In IEEE International Conference on Image Processing 2005 (Vol. 1, pp. 905-908). IEEE. https://doi. org/10.1109/ICIP.2005.1529 898
[6]. Li, Y., & Wang, X. (2009, May). A novel multiple watermarking algorithm based on bandelet transform. In 2009, WRI Global Congress on Intelligent Systems (Vol. 4, pp. 238-242). IEEE. https://doi.org/10.1109/GCIS.2009.354
[7]. Lin, C. Y., Wu, M., Bloom, J. A., Cox, I. J., Miller, M. L., & Lui, Y. M. (2001). Rotation, scale, and translation resilient watermarking for images. IEEE Transactions on image processing, 10(5), 767-782. https://doi.org/10.1109/83.91 8569
[8]. Mascher-Kampfer, A., Stögner, H., & Uhl, A. (2006). Multiple re-watermarking scenarios. In Proceedings of the 13th International Conference on Systems, Signals, and Image Processing (IWSSIP 2006) (pp. 53-56). Budapest, Hungary.
[9]. Nasir, I., Weng, Y., & Jiang, J. (2008, April). Novel multiple spatial watermarking technique in color images. In Fifth International Conference on Information Technology: New Generations (ITNG 2008) (pp. 777-782). IEEE. https:// doi.org/10.1109/ITNG.2008.66
[10]. Piva, A., Bartolini, F., & Barni, M. (2002). Managing copyright in open networks. IEEE Internet Computing, 6(3), 18-26. https://doi.org/10.1109/MIC.2002.1003126
[11]. Rai, V., Rai, J., & Rana, M. (2011). Effective Multiple Image watermarking based on dither quantization. In Proceedings of the 5th National Conference (INDIACom) Computing for Nation Development.
[12]. Sheppard, N. P., Shafavi-Naini, R., & Ogunbona, P. (2001). On multiple watermarking. In Proceedings of the 2001 workshop on Multimedia and security: new challenges (MM & Sec '01), (pp. 3-6). Newyork, USA: Association for Computing Machinery Press. https://doi.org/10.1145/1232 454.1232458
[13]. Solachidis, V., & Pitas, I. (2001). Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Transactions on Image Processing. 10(11), 1741–1753. https://doi.org/10.1109/83.967401
[14]. Surekha, B., Swamy, G., & Rao, K. S. (2010). A multiple watermarking technique for images based on visual cryptography. International Journal of Computer Applications, 1(11), 66-71.
[15]. Wheeler, G. E., Sheppard, N. P., & Safavi-Naini, R. (2004). Weighted segmented digital watermarking, In Third International Workshop on Digital Watermarking (IWDW 2004) (pp. 89-100). Heidelberg, Berlin: Springer-Verlag. https://doi.org/10.1007/978-3-540-31805-7_8
[16]. Wong, P. W., & Memon, N. (2001). Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing, 10(10), 1593-1601. https://doi.org/10.1109/ 83.951543
[17]. Yang, C. N. & Chung, T. H. (2010). A general multi-secret visual cryptography scheme. Optics Communications, 283(24), 4949-4962.
[18]. Zhang, Y., Chen, T., & Li, J. (2001, August). Embedding watermarks into both DC and AC components of DCT. In Security and Watermarking of Multimedia Contents III (Vol. 4314, pp. 424-435). https://doi.org/10.1117/12.435426
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.