Robust Watermarking Framework with DCT Based Encryption

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 5, Issue 5

Abstract

Since several years,, the protection of multimedia data is becoming extremely important. The protection of the multimedia data might be performed with encryption or data hiding algorithms. To address the transmission time, information compression is required. If you take benefit from the character of cryptographic schemes and digital watermarking, the copyright of multimedia contents can possibly be well protected. Our objective will be to give access to the outcomes of one's image integrity and of their origin regardless of the fact that the reputation is stored encrypted. If watermarking and encryption are conducted jointly for the protection stage, watermark extraction and decryption might be applied independently. With the source end original image and watermarked encrypted image is processed. This encrypted watermark image is finally decoded at the receiver end. This proposed work proposes a novel encryption algorithm to encrypt image. The entropy of this very watermarked image and correlation coefficient of extracted watermark image is amazingly not far away from ideal values, proving the correctness of proposed algorithm. In the proposed system, a Watermarking Scheme based on DWT with encryption algorithm, will be developed to improve the robustness and protection along with security. Also experimental results show resiliency of a given scheme against large blurring attack like mean and Gaussian filtering, linear filtering Thus proving the security, effectiveness and robustness of a given proposed watermarking algorithm.

Authors and Affiliations

L. Sri Lakshmi , Mrs. SK. Salma Begum

Keywords

Related Articles

Comparative Study of Sleep Mode Interleaving and Energy Efficiency Substream Allocation Algorithm

This paper deals with algorithms which provides solutions to energy saving. Energy saving is affected by the frequency allocation of bandwidth mechanisms. This problem is solved by two methods. First one is novel sleep-m...

Software Platforms for Mobile Distributed Systems

As a result of the computing technology that becomes ever smaller and cheaper it is now possible to integrate it into everyday material objects. This advanced integration of technology allows the underlying computer to d...

Minimizing Spurious Patterns Using Association Rule Mining

Most of the clustering algorithms extract patterns which are of least interest. Such pattern consists of data items which usually belong to widely different support levels. Such data items belonging to different support...

A Literature Survey on Face Recognition Techniques

With data and information accumulating in abundance, there is a crucial need for high security. Biometrics has now received more attention. Face biometrics, useful for a person’s authentication is a simple and non-intrus...

Cyclic Sensing MAC Protocol for Multicast Routing in Mobile Ad-Hoc Networks

In Ad Hoc networks realizing high throughput is achievable when directional antennas are utilized. The directional antennas lead to higher spatial multiplexing gain. On The Other Hand, there are a few issues in practice...

Download PDF file
  • EP ID EP109852
  • DOI -
  • Views 135
  • Downloads 0

How To Cite

L. Sri Lakshmi, Mrs. SK. Salma Begum (2013). Robust Watermarking Framework with DCT Based Encryption. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 5(5), 268-274. https://europub.co.uk/articles/-A-109852