Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1947940.1947978acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicccsConference Proceedingsconference-collections
research-article

A fragile color image watermarking framework focusing a new invisible domain

Published: 12 February 2011 Publication History

Abstract

Authentication of multimedia contents attended a broad attention due to illegal copying of digital contents and unauthorized recording and distribution that leads cyber crime in a massive form. Our focused area is digital color image and its authentication. For this purpose we've already proposed and reported different fragile color image authentication frameworks that authenticate an image through embedding color watermarks into color host images in a secured way with the help of a secret key and a hash function. According to our LSB scheme which was proven efficient, we have distributed the watermark information into the LSB of 'Blue' value of the host image which is perceptually invisible to watermarked image. Presently our research encounters a new invisible zone within the bit pattern of color images. In this paper we are proposing a technique which will embed watermark information into the 'Green' value of host image. It will ensure the ownership authentication of the host image with the help of a user specific secret key to verify the authenticity, integrity and ownership of the image. At the watermark extraction end, we've used blind extraction method, i.e., neither the host image nor the watermark image is required at the time of watermark extraction.

References

[1]
Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, Ton Kalker, "Digital Watermarking and Steganography", 2nd Edition, Morgan Kaufmann Publishers, 2008 (ISBN 978-0-12-372585-1).
[2]
M. Banerjee, "Theory and application of cellular automata for authentication and watermarking", PhD thesis, Jadavpur University, 2007.
[3]
Pradosh Bandyopadhyay, Soumik Das, Shauvik Paul, Prof. Atal Chaudhuri, Dr. Monalisa Banerjee, "Color Image Authentication through a Dynamic Fragile Watermarking Framework"---Published in Proceedings of International Conference on Methods and Models in Computer Science (ICM2CS09), JNU, India, December, 2009. (ISBN: 9789380 043579).
[4]
Soumik Das, Pradosh Bandyopadhyay, Shauvik Paul, Arindam Sinha Ray, Dr. Monalisa Banerjee, "Pioneering the Technique for Invisible Image Watermarking on Color Image"---International Journal of Recent Trends in Engineering, Volume I, May, 2009. Page No.: 508--511 (ISSN: 1797-9617).
[5]
Soumik Das, Pradosh Bandyopadhyay, Shauvik Paul, Arindam Sinha Ray, Dr. Monalisa Banerjee, "A New Introduction towards Invisible Image Watermarking on Color Image,"--- Published in Proceedings of IEEE International Advance Computing Conference (IACC'09), India, 2009 (ISBN: 978-1-4244-2927-1).
[6]
Soumik Das, Pradosh Bandyopadhyay, Shauvik Paul, Arindam Sinha Ray, Dr. Monalisa Banerjee, "Artifacts on Classical Theory of Invisible Image Watermarking on Color Image," Published in MACMILLAN Advanced Research Series, Proceedings of C3IT-09, India, 2009 (ISBN: 023-063-759-0).

Index Terms

  1. A fragile color image watermarking framework focusing a new invisible domain

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image ACM Other conferences
          ICCCS '11: Proceedings of the 2011 International Conference on Communication, Computing & Security
          February 2011
          656 pages
          ISBN:9781450304641
          DOI:10.1145/1947940
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 12 February 2011

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. LSB scheme
          2. authentication
          3. blind extraction
          4. fragile
          5. image watermarking
          6. invisible
          7. ownership

          Qualifiers

          • Research-article

          Conference

          ICCCS '11

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • 0
            Total Citations
          • 152
            Total Downloads
          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 18 Nov 2024

          Other Metrics

          Citations

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media