Enhanced Security Mechanism Using Hybrid Approach of Watermarking
DOI:
https://doi.org/10.26438/ijcse/v7i2.176189Keywords:
Truncated SVD, Modified SLT, Watermark, Encryption, Decryption, PSNR, SNR, SSIMAbstract
In today’s era the information is represented with the help of digital system. With the advancement of technology , now a days data is transmitted from source to destination with the help of images. Images are the source of data transmission. Data transmission through images is more secure as compared to the transmission through networked medium. In networked medium, the text can be easily sent and sometimes affected or may be harm by some third party or others. In this paper, we have provided two way security mechanism. Firstly, we have encrypted the text in the image and then in second phase we have placed one image on another image. Hence it is a two way security mechanism. Proposed system uses the hybridization of SVD-SLT techniques to secure the image and achieve better results in terms of accuracy. Two phases of digital image watermarking are used one of which is encryption and another is decryption. SVD (Singular Value Decomposition) will divide the image into parts and SLT (Slant Let Transformation) will merge two images overall resulting in watermarking. The result improvement is indicated through performance analysis with parameters PSNR, SNR, SSIM and through proposed mechanism 15% improvement is observed.
References
[1] A. Doegar, “A Review Paper on Digital Image Forgery Detection Techniques,” IEEE Access, vol. 1, no. 3, pp. 1–5, 2015.
[2] S. Panda and M. Mishra, “Passive Techniques of Digital Image Forgery Detection : Developments and Challenges,” pp. 281–290, 2018.
[3] D. Chauhan, D. Kasat, S. Jain, and V. Thakare, “Survey on Keypoint Based Copy-move Forgery Detection Methods on Image,” Procedia Comput. Sci., vol. 85, no. Cms, pp. 206–212, 2016.
[4] A. Kuznetsov and V. Myasnikov, “A new copy-move forgery detection algorithm using image preprocessing procedure,” Procedia Eng., vol. 201, pp. 436–444, 2017.
[5] H. Farid, “A survey of image forgery detection,” IEEE Access, no. 4, pp. 1–22, 2009.
[6] A. V. Malviya and S. A. Ladhake, “Pixel Based Image Forensic Technique for Copy-move Forgery Detection Using Auto Color Correlogram,” Procedia Comput. Sci., vol. 79, pp. 383–390, 2016.
[7] R. Mishra and P. Bhanodiya, “A review on steganography and cryptography,” Conf. Proceeding - 2015 Int. Conf. Adv. Comput. Eng. Appl. ICACEA 2015, pp. 119–122, 2015.
[8] R. Bhardwaj and V. Sharma, “Image Steganography Based on Complemented Message and Inverted Bit LSB Substitution,” Procedia Comput. Sci., vol. 93, no. September, pp. 832–838, 2016.
[9] C. G. Tappe and A. V Deorankar, “An Improved Image Steganography Technique based on LSB,” Int. Res. J. Eng. Technol., vol. 4, no. 4, pp. 2395–56, 2017.
[10] X. Li, “Digital Image Encryption and Decryption Algorithm W -- rn,” IEEE, no. X, pp. 253–257, 2016.
[11] D. I. G. Amalarethinam, “Image Encryption and Decryption in Public Key Cryptography based on MR,” Comput. Commun. Technol., pp. 133–138, 2015.
[12] Y. V. S. Rao, S. S. B. Rao, and N. R. Rekha, “Secure image steganography based on randomized sequence of cipher bits,” Proc. - 2011 8th Int. Conf. Inf. Technol. New Gener. ITNG 2011, pp. 332–335, 2010.
[13] D. M. Alghazzawi, S. H. Hasan, and M. S. Trigui, “Advanced Encryption Standard - Cryptanalysis research,” 2014 Int. Conf. Comput. Sustain. Glob. Dev. INDIACom 2014, pp. 660–667, 2014.
[14] L. Rosales Roldan, M. Cedillo Hernandez, J. Chao, M. Nakano Miyatake, and H. Perez Meana, “Watermarking-based Color Image Authentication with Detection and Recovery Capability,” IEEE Lat. Am. Trans., vol. 14, no. 2, pp. 1050–1057, 2016.
[15] S. S. Gonge and A. Ghatol, “Intelligent Systems Technologies and Applications 2016,” IEEE, vol. 530, pp. 85–97, 2016.
[16] Z. J. Xu, Z. Z. Wang, and Q. Lu, “Research on Image Watermarking Algorithm based on DCT,” vol. 10, pp. 1129–1135, 2011.
[17] U. H. Panchal and R. Srivastava, “A Comprehensive Survey on Digital Image Watermarking Techniques,” 2015 Fifth Int. Conf. Commun. Syst. Netw. Technol., pp. 591–595, 2015.
[18] Anita and A. Parmar, “Image security using watermarking based on DWT-SVD and Fuzzy Logic,” 2015 4th Int. Conf. Reliab. Infocom Technol. Optim. Trends Futur. Dir. ICRITO 2015, 2015.
[19] O. Jane, E. Elbaşi, and H. G. Ilk, “Hybrid non-blind watermarking based on DWT and SVD,” J. Appl. Res. Technol., vol. 12, no. 4, pp. 750–761, 2014.
[20] S. Bajracharya and R. Koju, “An Improved DWT-SVD Based Robust Digital Image Watermarking for Color Image,” Int. J. Eng. Manuf., vol. 7, no. 1, pp. 49–59, 2017.
[21] S. A. H. Nair and P. Aruna, “Comparison of DCT, SVD and BFOA based multimodal biometric watermarking system s,” Alexandria Eng. J., vol. 54, no. 4, pp. 1161–1174, 2015.
[22] Z. J. Xu, Z. Z. Wang, and Q. Lu, “Research on image watermarking algorithm based on DCT,” Procedia Environ. Sci., vol. 10, no. PART B, pp. 1129–1135, 2011.
[23] I. Conference and C. Engineering, “DWT DCT based New Image Watermarking Algorithm to Improve the Imperceptibility and Robustness,” vol. 10, 2017.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
