Search WWW Search inass.org
»Journal Description
»Topics
»Call for Papers and Reviewers
»Author Guidelines
»Contents & Papers
»Call for Special Issues
»SCOPUS
 
»IEEE CIS
»INNS
»IEEE IS
DOI: http://dx.doi.org/10.22266/ijies2017.0228.11

Image Adaptive Watermarking Using Feature Point Extraction Model

Author(s):

Yarabham Gangadhar1*,Venkata Sesha Giridhar Akula2,Chenna Reddy Pakanati3


Affiliations:

1Department of CSE, Jawaharlal Nehru Technological University, Hyderabad, India
2Methodist college of Engineering and Technology, Hyderabad, India
3Department of CSE, Jawaharlal Nehru Technological University Ananthapuramu, Anantapur, India







Abstract:

Watermarking is one of the efficient approaches for digital authentication. An adaptive feature point extraction model is proposed in this paper for robust watermarking. The host image is treated with number of geometric attacks for extracting the consistent feature points form the image. The proposed watermarking scheme follows the adaptive feature point extraction method to retrieve the feature points from the host image. The response value of the feature points is calculated for improving the selection of feature points. The watermark insertion procedure is employed by inserting the watermarking bits with in the place of feature points. The feature point portion is extracted from the image and replaces the portion with watermarking bits. The watermark extraction procedure is used to restore the original image from the watermarked image. The watermarking bits in the image are replaced by the feature point portion for restoring the original image. The simulation experiment is carried with the MATLAB simulator. The proposed algorithm is tested with geometric attacks such as scaling, rotation, noise pollution and JPEG compression. The proposed method proved its efficiency when compared to other remaining algorithms.


Keywords:

Feature point extraction, Geometric attacks, Image, Robust, Watermarking.


Full Text:




References:
  1. Y. Lee, and K. Jongweon, "Histogram rotation-based image watermarking with reversibility", International Journal of Security and Its Applications, Vol. 6, No. 2, pp.197-201, 2012.
  2. C.S. Lu, S. W. Sun, and P. C. Chang, "Robust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attack", Electronic Imaging 2005. International Society for Optics and Photonics, 2005.
  3. X. Kang, J. Huang, Y. Q. Shi and Y. Lin, “ADWT–DFT composite watermarking scheme robust to both affine transform and JPEG compression”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, pp. 776–786, 2012.
  4. H. A. Ali, and S. A. K. Khamis, “Robust digital image watermarking technique based on histogram analysis”, World of Computer Science and Information Technology Journal, Vol. 2, No. 5, pp. 163–168, 2012.
  5. C. M. Pun, and X. C. Yuan, “Geometric invariant digital image watermarking scheme based on histogram in DWT domain”, Journal of Multimedia, Vol. 5, No. 5, pp. 434–442, 2010.
  6. S. Xiang, H. J. Kim and J. Huang, “Audio watermarking robust against time-scale modification and MP3 compression”, Signal Processing, Vol. 88, No. 10, pp. 2372–2387, 2008.
  7. Y. Lee and J. Kim, “Histogram rotation-based image watermarking with reversibility”, International Journal of Security and Its Applications, Vol. 6, No. 2, pp.197–201, 2012.
  8. A. Suhail, Mohamed., and M. S. Obaidat, "Digital watermarking-based DCT and JPEG model", IEEE Transactions on Instrumentation and Measurement, Vol. 52, No. 5,1640-1647, 2003.
  9. C. Harris and M. Stephens, “A combined edge and corner detector”, Paper presented at the Proceeding of the 4th Alvey Vision Conference, 1988.
  10. C. M. Pun, and X. C. Yuan, “Robust Block and Gray-Level Histogram Based Watermarking Scheme”, In: Advances in Multimedia Information Processing-PCM2009.Springer, Berlin, 2009.
  11. D. Zheng, S. Wang, J.Y. Zhao,” RST Invariant Image Watermarking Algorithm With Mathematical Modeling and Analysis of the Watermarking Processes”, Image Processing, IEEE Transactions on, Vol .18, No. 5, pp. 1055–1068, 2009.
  12. P. Su, Y. Chang and C. Wu, “Geometrically Resilient Digital Image Watermarking by Using Interest Point Extraction and Extended Pilot Signals”, Information Forensics and Security, IEEE Transactions on, Vol. 8, No. 12, pp. 1897–1908, 2013.
  13. C. W. Tang, H. M. Hang, “A feature-based robust digital image watermarking scheme”, Signal Processing, IEEE Transactions on, Vol. 51, No. 4, pp. 950–959, 2003.
  14. J. S. Tsai, W.-B. Huang, and Y.-H. Kuo, “on the selection of optimal feature region set for robust digital image watermarking”, Image Processing, IEEE Transactions on, Vol. 20, No. 3, pp. 735-743, 2011.
  15. N. N. Priya, and S.L. Stuwart, “Robust feature based image watermarking process”, International Journal of Computer Applications, pp. 13-16, 2010.
  16. X. Gao, “Geometric distortion insensitive image watermarking in affine covariant regions”, Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, pp. 278-286, 2010.
  17. X. C. Yuan, and C.-M. Pun, “Feature extraction and local Zernike moments based geometric invariant watermarking”, Multimedia Tools and Applications, pp. 777-799, 2014.

INASS Home | Copyright@2008 The Intelligent Networks and Systems Society