skip to main content
10.1145/2967878.2973276acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicccntConference Proceedingsconference-collections
research-article

Computationally Efficient, Robust Watermarking Using Fast Walsh Hadamard Transform

Authors Info & Claims
Published:06 July 2016Publication History

ABSTRACT

Nowadays, anonymous manipulation of digital data with malicious intention is increasing at an enormous rate. With the advent of various technologies, multimedia signal can easily be downloaded, copied and manipulated at any point of time without much effort. Watermark is the pattern of bits added to the multimedia signals, such as audio, video or images, such that this can be extracted and used to check the authenticity of the received signal. The field of watermarking is growing at a fast pace. Watermarking techniques can be used for a variety of applications such as authentication, video indexing, copyright protection and access control. In this paper, CDMA based robust watermarking algorithm using Discrete Cosine Transform is modified for more robust and computationally efficient applications using Walsh Hadamard Transform. Performed a detailed simulation of both the techniques and compared the results. Compared to the existing technique the proposed technique is proved to be more resistant to attacks, computationally and cost wise more efficient. The new technique results in a good quality extracted watermark even at a low embedding gain even though the information hiding capacity is comparatively less.

References

  1. {Online}. 2016. Who Music Theft Hurts. Available: http://www.riaa.com/physicalpiracy.php, accessed on May 31, 2016.Google ScholarGoogle Scholar
  2. Al-Haj, A. M. 2010. Advanced techniques in multimedia watermarking: image, video and audio applications. Jordan: Information Science Reference (New York).Google ScholarGoogle Scholar
  3. Cox, J., Kilian, J., Leighton, F.T. and Shamoon, T. 1997. Secure spread spectrum watermarking for multimedia. IEEE Transaction on Image Processing, 6, 12, 1673--87. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Samee, M. K. 2012. Robust watermarking and its applications to communication problems. Ph. D. dissertation, Arbeitsgebiet Datentechnik, Technische University, at Dortmund, Germany.Google ScholarGoogle Scholar
  5. Saini, L. K. and Shrivastava, V. 2014. A survey of digital watermarking techniques and its applications. International Journal of Computer Science Trends and Technology (IJCST), 2, 3, 70--73.Google ScholarGoogle Scholar
  6. Chen, W. Y. and Huang, S. Y. 2008. Digital watermarking using DCT transformation", National CHIN-YI University of Technology, 173--184.Google ScholarGoogle Scholar
  7. Jamil, T. and Ahmad, A. An investigation in to the application of linear feedback shift registers for steganography. Proceedings IEEE SoutheastCon2002, Columbia, SC, USA (April 5-7, 2002), 239--244.Google ScholarGoogle ScholarCross RefCross Ref
  8. Mohanty, A. 2006. Study and implementation of watermarking algorithms," MTech Thesis, National Institute of Technology, Rourkela, India.Google ScholarGoogle Scholar
  9. Khan, M. I. and Sarkar, M. I. H. 2013. An efficient image-watermarking scheme using BFS technique based on Hadamard Transform. Smart Computing Review, 3, 5, 298--308.Google ScholarGoogle Scholar
  10. Maity, S. P. and Kundu, M. K. 2004. A blind CDMA image watermarking scheme in Wavelet domain. In Proc. IEEE International Conference on Image Processing- ICIP 2004 (4, Oct. 2004), 2633--2636.Google ScholarGoogle Scholar
  11. Anju, R. 2013. Modified algorithm for digital image watermarking using combined DCT and DWT. International Journal of Information and Computation Technology, 3, 7, 691--700.Google ScholarGoogle Scholar
  12. Singh, S. P. 2012. A Robust watermarking approach using DCT-DWT. International Journal of Emerging Technology and Advanced Engineering, 2, 8,300--305.Google ScholarGoogle Scholar
  13. Lee, L. T. and Pai, Y. T. 2010. DS-CDMA based watermarking: A low power, high security algorithm for embedded systems. International Journal of Innovative Computing, Information and Control, 7, (September 2010), 5893--5908.Google ScholarGoogle Scholar
  14. Manekandan, G. R. S., Santhi, V. and Rajkumar, F. 2011. Entropy based robust watermarking scheme using Hadamard Transformation technique. International Journal of Computer Applications, 12, 9, 14--21.Google ScholarGoogle ScholarCross RefCross Ref
  15. Shoemaker, C. 2002. Hidden bits: A survey of techniques for digital watermarking. Independent Study EER-290. Prof Rudko (Spring 2002).Google ScholarGoogle Scholar
  16. Ahmad, A. Al-Busaidi, S. S., Al Maashri, A., Awadalla, M., Rizvi, M. A. K. and Mohanan, N., 2013. Computing and listing of number of possible m-sequence generators of order n. Indian Journal of Science and Technology (IJST), 6, 10, 5359--5369.Google ScholarGoogle Scholar
  17. Ahmad, A., Al-Abri, D. and Al-Busaidi. S. S. 2012. Adding pseudo-random test sequence generator in the test simulator for DFT approach, Computer Technology and Applications. 3, 463--470.Google ScholarGoogle Scholar
  18. Ahmad, A. and Al-Abri, D. 2012. Design of a pseudorandom binary code generator via a developed simulation model. International Journal on Information Technology (ACEEE - Journal), 2, 1, 33--36.Google ScholarGoogle Scholar
  19. Ahmad, A. 2012. Better PN generators for CDMA application - A Verilog-HDL implementation approach. International Journal of Information Engineering, 2, 1, 6--11.Google ScholarGoogle Scholar
  20. Ahmad, A. and Elabdalla, A. M. 1997. An efficient method to determine linear feedback connections in shift registers that generate maximal length pseudo-random up and down binary sequences. Computer & Electrical Engineering - An Int'l Journal (USA), 23, 1, 33--39.Google ScholarGoogle ScholarCross RefCross Ref
  1. Computationally Efficient, Robust Watermarking Using Fast Walsh Hadamard Transform

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICCCNT '16: Proceedings of the 7th International Conference on Computing Communication and Networking Technologies
        July 2016
        262 pages
        ISBN:9781450341790
        DOI:10.1145/2967878

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 6 July 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        ICCCNT '16 Paper Acceptance Rate48of101submissions,48%Overall Acceptance Rate48of101submissions,48%
      • Article Metrics

        • Downloads (Last 12 months)4
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader