A Watermarking System Architecture using the Cellular Automata Transform for 2D Vector Map
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 6
Abstract
Technological advancement, paired with the emergence of increasingly open and sophisticated communication systems, has contributed to the growing complexity of copyright protection and ownership identification for digital content. The technique of digital watermarking has been receiving attention in the literature as a way to address these complexities. Digital watermarking involves covertly embedding a marker in a piece of digital data (e.g., a vector map, database, or audio, image, or video data) such that the marker cannot be edited, does not interfere with the quality or size of the data, and can be extracted accurately even under the deterioration of the watermarked data (e.g., as a consequence of malicious activity). The purpose of this paper is to describe a watermarking system architecture that can be applied to a 2D vector map. The proposed scheme involves embedding the watermark into the frequency domain, namely, the linear cellular automata transform (LCAT) algorithm. To evaluate the performance of the proposed scheme, the algorithm was applied to vector maps from the Riyadh Development Authority. The results indicate that the watermarking system architecture described here is efficient in terms of its computational complexity, reversibility, fidelity, and robustness against well-known attacks.
Authors and Affiliations
Saleh AL-ardhi, Vijey Thayananthan, Abdullah Basuhail
Using Merkle Tree to Mitigate Cooperative Black-hole Attack in Wireless Mesh Networks
Security is always a major concern and a topic of hot discussion to users of Wireless Mesh Networks (WMNs). The open architecture of WMNs makes it very easy for malicious attackers to exploit the loopholes in the routing...
Images Steganography Approach Supporting Chaotic Map Technique for the Security of Online Transfer
One of the most important issue in this domain is the security concern of the transfer data. The online transfer data may access illegally through attack the communication gate between the servers and the users. The main...
Agent-Based System for Efficient kNN Query Processing with Comprehensive Privacy Protection
Recently, location based services (LBSs) have become increasingly popular due to advances in mobile devices and their positioning capabilities. In an LBS, the user sends a range of queries regarding his k-nearest neighbo...
Comparatative Analysis of Energy Detection Spectrum Sensing of Cognitive Radio Under Wireless Environment Using SEAMCAT
In the recent years, the Cognitive Radio technology imposed itself as a good solution to enhance the utilization of unused spectrum and globalized the radio environment for different band users that utilize or require di...
Scalable TCP: Better Throughput in TCP Congestion Control Algorithms on MANETs
In the modern mobile communication world the congestion control algorithms role is vital to data transmission between mobile devices. It provides better and reliable communication capabilities in all kinds of networking...