Enhanced Security Mechanism Using Hybrid Approach of Watermarking

Authors

  • Mohal D Dept. of Computer Engineering and Technology, Guru Nanak Dev University, Amritsar, Punjab, India
  • Sharma S Dept. of Computer Engineering and Technology, Guru Nanak Dev University, Amritsar, Punjab, India

DOI:

https://doi.org/10.26438/ijcse/v7i2.176189

Keywords:

Truncated SVD, Modified SLT, Watermark, Encryption, Decryption, PSNR, SNR, SSIM

Abstract

In today’s era the information is represented with the help of digital system. With the advancement of technology , now a days data is transmitted from source to destination with the help of images. Images are the source of data transmission. Data transmission through images is more secure as compared to the transmission through networked medium. In networked medium, the text can be easily sent and sometimes affected or may be harm by some third party or others. In this paper, we have provided two way security mechanism. Firstly, we have encrypted the text in the image and then in second phase we have placed one image on another image. Hence it is a two way security mechanism. Proposed system uses the hybridization of SVD-SLT techniques to secure the image and achieve better results in terms of accuracy. Two phases of digital image watermarking are used one of which is encryption and another is decryption. SVD (Singular Value Decomposition) will divide the image into parts and SLT (Slant Let Transformation) will merge two images overall resulting in watermarking. The result improvement is indicated through performance analysis with parameters PSNR, SNR, SSIM and through proposed mechanism 15% improvement is observed.

References

[1] A. Doegar, “A Review Paper on Digital Image Forgery Detection Techniques,” IEEE Access, vol. 1, no. 3, pp. 1–5, 2015.

[2] S. Panda and M. Mishra, “Passive Techniques of Digital Image Forgery Detection : Developments and Challenges,” pp. 281–290, 2018.

[3] D. Chauhan, D. Kasat, S. Jain, and V. Thakare, “Survey on Keypoint Based Copy-move Forgery Detection Methods on Image,” Procedia Comput. Sci., vol. 85, no. Cms, pp. 206–212, 2016.

[4] A. Kuznetsov and V. Myasnikov, “A new copy-move forgery detection algorithm using image preprocessing procedure,” Procedia Eng., vol. 201, pp. 436–444, 2017.

[5] H. Farid, “A survey of image forgery detection,” IEEE Access, no. 4, pp. 1–22, 2009.

[6] A. V. Malviya and S. A. Ladhake, “Pixel Based Image Forensic Technique for Copy-move Forgery Detection Using Auto Color Correlogram,” Procedia Comput. Sci., vol. 79, pp. 383–390, 2016.

[7] R. Mishra and P. Bhanodiya, “A review on steganography and cryptography,” Conf. Proceeding - 2015 Int. Conf. Adv. Comput. Eng. Appl. ICACEA 2015, pp. 119–122, 2015.

[8] R. Bhardwaj and V. Sharma, “Image Steganography Based on Complemented Message and Inverted Bit LSB Substitution,” Procedia Comput. Sci., vol. 93, no. September, pp. 832–838, 2016.

[9] C. G. Tappe and A. V Deorankar, “An Improved Image Steganography Technique based on LSB,” Int. Res. J. Eng. Technol., vol. 4, no. 4, pp. 2395–56, 2017.

[10] X. Li, “Digital Image Encryption and Decryption Algorithm W -- rn,” IEEE, no. X, pp. 253–257, 2016.

[11] D. I. G. Amalarethinam, “Image Encryption and Decryption in Public Key Cryptography based on MR,” Comput. Commun. Technol., pp. 133–138, 2015.

[12] Y. V. S. Rao, S. S. B. Rao, and N. R. Rekha, “Secure image steganography based on randomized sequence of cipher bits,” Proc. - 2011 8th Int. Conf. Inf. Technol. New Gener. ITNG 2011, pp. 332–335, 2010.

[13] D. M. Alghazzawi, S. H. Hasan, and M. S. Trigui, “Advanced Encryption Standard - Cryptanalysis research,” 2014 Int. Conf. Comput. Sustain. Glob. Dev. INDIACom 2014, pp. 660–667, 2014.

[14] L. Rosales Roldan, M. Cedillo Hernandez, J. Chao, M. Nakano Miyatake, and H. Perez Meana, “Watermarking-based Color Image Authentication with Detection and Recovery Capability,” IEEE Lat. Am. Trans., vol. 14, no. 2, pp. 1050–1057, 2016.

[15] S. S. Gonge and A. Ghatol, “Intelligent Systems Technologies and Applications 2016,” IEEE, vol. 530, pp. 85–97, 2016.

[16] Z. J. Xu, Z. Z. Wang, and Q. Lu, “Research on Image Watermarking Algorithm based on DCT,” vol. 10, pp. 1129–1135, 2011.

[17] U. H. Panchal and R. Srivastava, “A Comprehensive Survey on Digital Image Watermarking Techniques,” 2015 Fifth Int. Conf. Commun. Syst. Netw. Technol., pp. 591–595, 2015.

[18] Anita and A. Parmar, “Image security using watermarking based on DWT-SVD and Fuzzy Logic,” 2015 4th Int. Conf. Reliab. Infocom Technol. Optim. Trends Futur. Dir. ICRITO 2015, 2015.

[19] O. Jane, E. Elbaşi, and H. G. Ilk, “Hybrid non-blind watermarking based on DWT and SVD,” J. Appl. Res. Technol., vol. 12, no. 4, pp. 750–761, 2014.

[20] S. Bajracharya and R. Koju, “An Improved DWT-SVD Based Robust Digital Image Watermarking for Color Image,” Int. J. Eng. Manuf., vol. 7, no. 1, pp. 49–59, 2017.

[21] S. A. H. Nair and P. Aruna, “Comparison of DCT, SVD and BFOA based multimodal biometric watermarking system s,” Alexandria Eng. J., vol. 54, no. 4, pp. 1161–1174, 2015.

[22] Z. J. Xu, Z. Z. Wang, and Q. Lu, “Research on image watermarking algorithm based on DCT,” Procedia Environ. Sci., vol. 10, no. PART B, pp. 1129–1135, 2011.

[23] I. Conference and C. Engineering, “DWT DCT based New Image Watermarking Algorithm to Improve the Imperceptibility and Robustness,” vol. 10, 2017.

Downloads

Published

2019-02-28
CITATION
DOI: 10.26438/ijcse/v7i2.176189
Published: 2019-02-28

How to Cite

[1]
D. Mohal and S. Sharma, “Enhanced Security Mechanism Using Hybrid Approach of Watermarking”, Int. J. Comp. Sci. Eng., vol. 7, no. 2, pp. 176–189, Feb. 2019.

Issue

Section

Research Article