ABSTRACT
Nowadays, anonymous manipulation of digital data with malicious intention is increasing at an enormous rate. With the advent of various technologies, multimedia signal can easily be downloaded, copied and manipulated at any point of time without much effort. Watermark is the pattern of bits added to the multimedia signals, such as audio, video or images, such that this can be extracted and used to check the authenticity of the received signal. The field of watermarking is growing at a fast pace. Watermarking techniques can be used for a variety of applications such as authentication, video indexing, copyright protection and access control. In this paper, CDMA based robust watermarking algorithm using Discrete Cosine Transform is modified for more robust and computationally efficient applications using Walsh Hadamard Transform. Performed a detailed simulation of both the techniques and compared the results. Compared to the existing technique the proposed technique is proved to be more resistant to attacks, computationally and cost wise more efficient. The new technique results in a good quality extracted watermark even at a low embedding gain even though the information hiding capacity is comparatively less.
- {Online}. 2016. Who Music Theft Hurts. Available: http://www.riaa.com/physicalpiracy.php, accessed on May 31, 2016.Google Scholar
- Al-Haj, A. M. 2010. Advanced techniques in multimedia watermarking: image, video and audio applications. Jordan: Information Science Reference (New York).Google Scholar
- Cox, J., Kilian, J., Leighton, F.T. and Shamoon, T. 1997. Secure spread spectrum watermarking for multimedia. IEEE Transaction on Image Processing, 6, 12, 1673--87. Google ScholarDigital Library
- Samee, M. K. 2012. Robust watermarking and its applications to communication problems. Ph. D. dissertation, Arbeitsgebiet Datentechnik, Technische University, at Dortmund, Germany.Google Scholar
- Saini, L. K. and Shrivastava, V. 2014. A survey of digital watermarking techniques and its applications. International Journal of Computer Science Trends and Technology (IJCST), 2, 3, 70--73.Google Scholar
- Chen, W. Y. and Huang, S. Y. 2008. Digital watermarking using DCT transformation", National CHIN-YI University of Technology, 173--184.Google Scholar
- Jamil, T. and Ahmad, A. An investigation in to the application of linear feedback shift registers for steganography. Proceedings IEEE SoutheastCon2002, Columbia, SC, USA (April 5-7, 2002), 239--244.Google ScholarCross Ref
- Mohanty, A. 2006. Study and implementation of watermarking algorithms," MTech Thesis, National Institute of Technology, Rourkela, India.Google Scholar
- Khan, M. I. and Sarkar, M. I. H. 2013. An efficient image-watermarking scheme using BFS technique based on Hadamard Transform. Smart Computing Review, 3, 5, 298--308.Google Scholar
- Maity, S. P. and Kundu, M. K. 2004. A blind CDMA image watermarking scheme in Wavelet domain. In Proc. IEEE International Conference on Image Processing- ICIP 2004 (4, Oct. 2004), 2633--2636.Google Scholar
- Anju, R. 2013. Modified algorithm for digital image watermarking using combined DCT and DWT. International Journal of Information and Computation Technology, 3, 7, 691--700.Google Scholar
- Singh, S. P. 2012. A Robust watermarking approach using DCT-DWT. International Journal of Emerging Technology and Advanced Engineering, 2, 8,300--305.Google Scholar
- Lee, L. T. and Pai, Y. T. 2010. DS-CDMA based watermarking: A low power, high security algorithm for embedded systems. International Journal of Innovative Computing, Information and Control, 7, (September 2010), 5893--5908.Google Scholar
- Manekandan, G. R. S., Santhi, V. and Rajkumar, F. 2011. Entropy based robust watermarking scheme using Hadamard Transformation technique. International Journal of Computer Applications, 12, 9, 14--21.Google ScholarCross Ref
- Shoemaker, C. 2002. Hidden bits: A survey of techniques for digital watermarking. Independent Study EER-290. Prof Rudko (Spring 2002).Google Scholar
- Ahmad, A. Al-Busaidi, S. S., Al Maashri, A., Awadalla, M., Rizvi, M. A. K. and Mohanan, N., 2013. Computing and listing of number of possible m-sequence generators of order n. Indian Journal of Science and Technology (IJST), 6, 10, 5359--5369.Google Scholar
- Ahmad, A., Al-Abri, D. and Al-Busaidi. S. S. 2012. Adding pseudo-random test sequence generator in the test simulator for DFT approach, Computer Technology and Applications. 3, 463--470.Google Scholar
- Ahmad, A. and Al-Abri, D. 2012. Design of a pseudorandom binary code generator via a developed simulation model. International Journal on Information Technology (ACEEE - Journal), 2, 1, 33--36.Google Scholar
- Ahmad, A. 2012. Better PN generators for CDMA application - A Verilog-HDL implementation approach. International Journal of Information Engineering, 2, 1, 6--11.Google Scholar
- Ahmad, A. and Elabdalla, A. M. 1997. An efficient method to determine linear feedback connections in shift registers that generate maximal length pseudo-random up and down binary sequences. Computer & Electrical Engineering - An Int'l Journal (USA), 23, 1, 33--39.Google ScholarCross Ref
- Computationally Efficient, Robust Watermarking Using Fast Walsh Hadamard Transform
Recommendations
Fuzzy-BPN Based Improved Technique for Color Image Watermarking
ICIA-16: Proceedings of the International Conference on Informatics and AnalyticsDigital image watermarking is a technique to hide confidential information into data like image, audio and video which is extracted later for several purposes like ensuring identification and authentication. In the recent years the advancement in the ...
Robust image watermarking scheme using bit-plane of hadamard coefficients
Nowadays, due to widespread usage of the Internet, digital contents are distributed quickly and inexpensively throughout the world. Watermarking techniques can help protect authenticity of digital contents by identifying their owners. In a watermarking ...
Blind and robust audio watermarking scheme based on SVD-DCT
Singular value decomposition (SVD) is a new and important transform technique in robust digital watermarking due to its different properties from the traditional transforms such as Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). In ...
Comments