Mitigation of Geometrical Attack in Watermarking Technique Using Support Vector Machine
DOI:
https://doi.org/10.26438/ijcse/v6i1.172176Keywords:
Watermarking, Geometrical Attack, DCT, DWT, SVMAbstract
The current decade of watermarking technique faced a problem of geometrical and some other attack. The minimization of security attack in watermarking technique is major issue. For the minimization of geometrical attack used various transformed based technique. The transform based watermarking technique used some well know function such as DWT, DCT and combination of more wavelet based transform function. Now a day used various authors feature selection based watermarking technique. The feature selection based watermarking technique gives better security strength in compression of another transform based technique. In this paper proposed a classification based watermarking technique and reduces the mitigation of geometrical attack for the process of watermark security strength. For the minimization of attack used correlation coefficient matrix for the processing of embedding and the process of embedding done by the pattern generation. The process of pattern generation used support vector machine. The support vector machine is classifier; it classifies the data on the biases of guidance.
References
Arun, Kunal Kumar Kabi, Bidyut Jyoti Saha and ChittaranjanPradhan “BlindDigital Watermarking algorithm based on DCT Domain and Fractal images”, IEEE,2014, Pp 1-7.
T.Naga Jyothi and K.HariBabu ” Non Blind Watermarking Scheme for Image and Video using DWT-SVD”, IJECS, 2013, Pp 1-5.
Yanhong Zhang “Blind Watermark Algorithm Based on HVS and RBF Neural Network in DWT Domain”, ISSN, 2009, Pp 1-10.
Achintya Singhal, KamredUdham Singh “Digital Watermarking Algorithms: A Review”, IJJECS, 2015, Pp 1-8.
Kavyan Ghaderi, Fardin.Akhalghain and Parham. Moradi, “A New Robust Semi-Blind Digital Image Watermarking Approach Based on LWT-SVD and Fractal images”, Pp 1-5.
SunJianguo, Zheng Chonghui and Gao Di “Lossless Digital Watermarking Scheme for Image Maps”, China Communication, 2014, Pp 1-6.
Hao-Tang Chan, Wen-Jyi Hwang, and Chau-Jern Cheng “Digital Hologram AuthenticationUsing a Hadamard-Based Reversible Fragile Watermarking Algorithm” Journal of Display Technology, 2015, Pp 1-11.
Xu Li, Xingming Sun, Senior Member, IEEE, and Quansheng Liu “Image Integrity Authentication Scheme Based on Fixed Point Theory” IEEE, 2015, Pp 1-14.
E. Chrysochos, V. Fotopoulos, and A. N. Skodras “Robust Watermarking of digital images Based on Chaotic Mapping and DCT” EUSIPCO,2008,Pp1-5.
T. Sridevi and S Sameena Fatima “Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD”, International Journal of Computer Applications, 2013, Pp 1-5.
Usha Pal,Dinesh Chandra “Survey Of Digital Watermarking Using Dct”, IJCSE, 2012, Pp 1-3.
Azz El Arab El Hossainia, Mohamed El Aroussib, Khadija Jamalic, Samir Mbarkid and Mohammed Wahbie “A New Robust Blind Watermarking Scheme Based on Steerable pyramidand DCT using Pearson product moment correlation”, JOURNAL OF COMPUTERS,2014, Pp 1-13.
Med Karim Abdmouleh, Ali Khalfallah and Med Salim Bouhlel “An Overview on Cryptography and Watermarking”, Computers, Automatic Control, Signal Processing and Systems Science, 2014, Pp 1-7.
P. Shanthi, R. S. Bhuvaneswaran “Robust Chaos Based Image Watermarking Scheme for Fractal-Wavelet”, Applied Mathematical Sciences, 2014, Pp 1-12.
EktaMiglani, Sachin Gupta, “Digital Watermarking Methodologies - A Survey”, IJARCSSE, 2014, Pp 1-7.
Th. Rupachandra Singha, Kh. Manglem Singh and Sudipta Roya “Video watermarking scheme based on visual cryptography and scene change detection”, Published by Elsevier GmbH,2013. Pp 1-8.
N.Saranya and P.Elango “Non Blind Watermarking Theme for Image and Video Victimisation DWT-SVD”, IJRCAR, 2014, Pp 1-8.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
