Watermarking Image Depending on Mojette Transform for Hiding Information

Authors

  • Majeed Zangana H Dept. of Computer Science/College of Computer Science and IT/Nawroz University/Kurdistan Region of Iraq

DOI:

https://doi.org/10.26438/ijcse/v8i1.812

Keywords:

Mojette, Watermarking, Transform, Hiding, Image

Abstract

This paper describes a new image watermarking method for which is suitable for both copyright protection and information hiding. The presented method is based upon the morphological mathematics properties of the Mojette Transform [1,2] and the Mojette Phantoms[3]. The main properties of the Mojette transform are briefly introduced and the concept of linked phantoms which depicts the null space of the operator is presented. In this paper the Mojette Phantoms can be used not only as the embedded watermark, but also can be used as the mark which is inscribed with some certain information, e.g. Chinese characters. Corresponding embedding and extractions of either the mark or the hidden message are then described. Finally, experimental results are presented in the last section.

References

[1] N. Normand, JP. Guédon, “La transformée Mojette: une représentation redondante pour l`image”, Comptes rendus Académie des sciences de Paris, theoretical computer science section, p. 124-127. January 1998.

[2] F. Autrusseau, J. V. Guedon, and Y. Bizais. Mojette cryptomarking scheme for medical images. Volume 5032, pages 958–965. SPIE, 2003.

[3] F Autrusseau, JV Guedon Image Watermarking for Copyright Protection and Data Hiding via the Mojette Transform Proceedings of SPIE, 2002

[4] J. RADON. Ober die Bestimmung von Funktio-nen durch ihre Integralwerte l¨angs gewisser Mannigfaltigkeiten. Computed Tomography, 27, 1983.

[5] F. Autrusseau, A. Saadane, D. Barba “ Psychovisual Approach for Watermarking", SPIE Electronic Imaging: Security and watermarking of multimedia contents, January 2001, San Jose, CA.

[6] M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking systems” , Proc. SPIE Electronic Imaging Security and watermarking of multimedia contents, San Jose, CA, Vol. 3657, p. 226-239, January 1999.

[7] JP. Guédon, B. Parrein, N. Normand, “Internet distributed image databases", Integrated Computer Aided Engineering, Vol.8, p. 205-214, 2001.

[8] M. Katz, “Questions of uniqueness and resolution in reconstruction from projections”, Springer Verlag, 1977.

[9] Hewa Majeed Zangana, “Watermarking System Using LSB”, IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 19, Issue 3, Ver. II, P. 75-79, (May.-June. 2017).

[10] Harshal V. Patil1, B. H. Barhate2, "A Review Paper on Data Hiding Techniques: Stegnography", International Journal of Scientific Research in Computer Science and Engineering, Vol.06, Issue.01, pp.64-67, 2018

[11] Manisha Verma, Hardeep Singh Saini, "Analysis of Various Techniques for Audio Steganography in Data Security", International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.2, pp.1-5, 2019

Downloads

Published

2020-01-31
CITATION
DOI: 10.26438/ijcse/v8i1.812
Published: 2020-01-31

How to Cite

[1]
H. Majeed Zangana, “Watermarking Image Depending on Mojette Transform for Hiding Information”, Int. J. Comp. Sci. Eng., vol. 8, no. 1, pp. 8–12, Jan. 2020.

Issue

Section

Research Article