DWT - SVD BASED MULTIPLE IMAGE WATERMARKING PROCESSES ON CLOUD COMPUTING
DOI:
https://doi.org/10.29121/granthaalayah.v6.i6.2018.1339Keywords:
Discrete Wavelet Transform, Singular Value Decomposition, Multiple Watermarking, Imperceptibility, RobustnessAbstract [English]
In the present work, the multiple watermarking techniques have been executed to present information security. DWT - SVD based multiple watermarking for color images are proposed and has been implemented in cloud computing. The multiple watermarking is used to share the copyright of multiple users improves the robustness and high security. In the proposed work, multiple watermarks are embedded into the cover image. Image quality is computed using Normalized Correlation (NC) and Peak Signal to Noise Ratio (PSNR) for color images. The proposed scheme provides a secure and well imperceptibility to different image processing attacks.
Downloads
References
Sumit Kumar Srivastava, HarikeshPandey (2016), “MEDICAL IMAGE WATERMARKING WITH PATIENT DETAILS AS WATERMARK”, International Journal of Advance Research, Ideas and Innovations in Technology, 2 (6), 1-6. https://www.ijariit.com/manuscript/medical-image-watermarking-patient-details-water mar k/
Giakoumaki A, Pavlopoulos S and Koutouris D, (2003) “A MEDICAL IMAGE WATERMARKING SCHEME BASED ON WAVELET TRANSFORM”, Proceedings of the 25th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 1, https://doi. 10.1109/iembs.2003.1279900.
Sengul Dogan, Turker Tuncer, Engin Avci and Arif Gluten (2012), “A NEW WATERMARKING SYSTEM BASED ON DISCRETE COSINE TRANSFORM (DCT) IN COLOR BIOMETRIC IMAGES”, Journal of Medical Systems, 36, 2379–2385. https://doi.org/10.1007/s10916-011-9705-2. DOI: https://doi.org/10.1007/s10916-011-9705-2
C.Thirumaraiselvi, R.Sudhakar, G. Priyadharshini, G. Kalaivani (2016), “EMBEDDING PATIENT INFORMATION IN MEDICAL IMAGES USING WATERMARKING APPROACH FOR AUTHENTICATION”, South Asian Journal of Engineering and Technology, 2 (18), 33–40. doi: 10.1109/ISCO.2016.7726895. DOI: https://doi.org/10.1109/ISCO.2016.7726895
Mehta, S. Nallusamy, R. Marawar, R.V. and Prabhakaran, B, (2013) “A STUDY OF DWT AND SVD BASED WATERMARKING ALGORITHMS FOR PATIENT PRIVACY IN MEDICAL IMAGES”, IEEE International Conference on Healthcare Informatics (ICHI), 287 – 296. doi: 10.1109/ICHI.2013.41. DOI: https://doi.org/10.1109/ICHI.2013.41
N. Mohananthini and G. Yamuna, (2016) “PERFORMANCE OPTIMIZATION OF MULTIPLE WATERMARKING USING GENETIC ALGORITHMS”, (2016), International Journal of Enterprise Network Management, Inderscience, 7 (3), 237- 249.
https://doi.org/10.1504/IJENM.2016.078970. DOI: https://doi.org/10.1504/IJENM.2016.078970
Mohananthini. N and Yamuna. G, (2015) “MULTIPLE IMAGE WATERMARKING TECHNIQUE BASED ON HYBRID DWT-SVD AND ARTIFICIAL NEURAL NETWORK”, International Journal of Applied Engineering Research, 10 (3), 7275-7297.
Kavita Athnikar, Prajakta Shirke, Snehal Tajave and Mukta Tarkasband, (2014) “A CLOUD-BASED WATERMARKING METHOD FOR HEALTH DATA AND IMAGE SECURITY, International Journal of Computer Trends and Technology, 16 (3). DOI: DOI: https://doi.org/10.14445/22312803/IJCTT-V16P129
14445/22312803/IJCTT-V16P129.
Shakun Gupta, Harsimran Singh, (2015) “TO PROPOSE A NOVEL TECHNIQUE FOR WATERMARKING IN CLOUD COMPUTING”, International Journal of Engineering Development and Research, 3 (2).
Chao-Tung Yang, Chu-Hsing Lin and Guey-Luen Chang (2011), “IMPLEMENTATION OF IMAGE WATERMARKING PROCESSES ON CLOUD COMPUTING ENVIRONMENTS”, CCIS 223, 131–140.
Boopathy D and M.Sundaresan, (2014) “DATA ENCRYPTION FRAMEWORK MODEL WITH WATERMARK SECURITY FOR DATA STORAGE IN PUBLIC CLOUD MODEL, International Conference on Computing for Sustainable Global Development (INDIACom), DOI: 10.1109/IndiaCom.2014.6828094. DOI: https://doi.org/10.1109/IndiaCom.2014.6828094
Anumol Joseph and Anusudha K, (2013) “ROBUST WATERMARKING BASED ON DWT-SVD”, International Journal on Signal and Image Security, 1 (1), 01–05.
Ghafoor A and Imran M, (2012) “A NON-BLIND COLOR IMAGE WATERMARKING SCHEME RESISTANT AGAINST GEOMETRIC ATTACKS”, Radio Engineering, 21 (4), 1246–1251.
Downloads
Published
How to Cite
Issue
Section
License
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.