A Watermarking System Architecture using the Cellular Automata Transform for 2D Vector Map
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 6
Abstract
Technological advancement, paired with the emergence of increasingly open and sophisticated communication systems, has contributed to the growing complexity of copyright protection and ownership identification for digital content. The technique of digital watermarking has been receiving attention in the literature as a way to address these complexities. Digital watermarking involves covertly embedding a marker in a piece of digital data (e.g., a vector map, database, or audio, image, or video data) such that the marker cannot be edited, does not interfere with the quality or size of the data, and can be extracted accurately even under the deterioration of the watermarked data (e.g., as a consequence of malicious activity). The purpose of this paper is to describe a watermarking system architecture that can be applied to a 2D vector map. The proposed scheme involves embedding the watermark into the frequency domain, namely, the linear cellular automata transform (LCAT) algorithm. To evaluate the performance of the proposed scheme, the algorithm was applied to vector maps from the Riyadh Development Authority. The results indicate that the watermarking system architecture described here is efficient in terms of its computational complexity, reversibility, fidelity, and robustness against well-known attacks.
Authors and Affiliations
Saleh AL-ardhi, Vijey Thayananthan, Abdullah Basuhail
Neural Network Solution For Service Level Agreement
Service Oriented Computing is playing an important role in sharing the industry and the way business is conducted and services are delivered and managed. This paradigm is expected to have major impact on service economy;...
Balancing a Sphere in a Linear Oscillatory Movement through Fuzzy Control
The following paper describes an intelligent control problem, which depends on the balance of a metallic sphere on a beam, that oscillates in only one point, localized in the middle of the beam, using it for the ba...
Generating an Educational Domain Checklist through an Adaptive Framework for Evaluating Educational Systems
The growth of the Internet and related technologies has enabled the development of a new breed of dynamic websites that is growing rapidly in use and that has had a huge impact on many businesses. One type of websites th...
New technique to insure data integrity for archival files storage (DIFCS)
In this paper we are developing an algorithm to increase the security of using HMAC function (Key-Hashed Message Authentication) to insure data integrity for exchanging archival files. Hash function is a very strong tool...
An Algorithm Research for Supply Chain Management Optimization Model
In this paper, we consider the extended linear complementarity problem on supply chain management optimization model. We first give a global error bound for the extended linear complementarity problem, and then propose a...