Login



Other Articles by Author(s)

Eva Tuba
Marko Beko
Milan Tuba



Author(s) and WSEAS

Eva Tuba
Marko Beko
Milan Tuba


WSEAS Transactions on Systems


Print ISSN: 1109-2777
E-ISSN: 2224-2678

Volume 16, 2017

Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of WSEAS Journals is adapted to the 'continuously updated' model. What this means is that instead of being separated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.


Volume 16, 2017



Visible Digital ImageWatermarking by Compound Mapping Algorithm

AUTHORS: Eva Tuba, Marko Beko, Milan Tuba

Download as PDF

ABSTRACT: Digital images are used in almost every area of the life. The advent of digital images has brought a lot of progress to various scientific areas, but also many new threads have been opened. One of the main problems with digital data and images is unauthorized replication and use. Digital watermarking is one of the techniques for protecting copyrights of digital images by embedding the additional data to indicate the owners of the copyright. In this paper a method for visible digital image watermarking based on compound mapping algorithm is proposed. Compound mapping was used for lossless digital watermarking embedding and removing while security was improved by defining parameters of the compound mapping.

KEYWORDS: Visible image watermarking, compound mapping, security, digital images

REFERENCES:

[1] M. Abdullatif, A. M. Zeki, J. Chebil, and T. S. Gunawan, “Properties of digital image watermarking,” in Signal Processing and its Applications (CSPA), 2013 IEEE 9th International Colloquium on. IEEE, 2013, pp. 235–240.

[2] A. Alihodzic and M. Tuba, “Bat algorithm (BA) for image thresholding,” Recent Researches in Telecommunications, Informatics, Electronics and Signal Processing, pp. 364–369, 2013.

[3] T. K. Araghi, A. B. A. Manaf, M. Zamani, and S. K. Araghi, “A survey on digital image watermarking techniques in spatial and transform domains,” International Journal of Advances in Image Processing Techniques, vol. 3, no. 1, pp. 6–10, 2016.

[4] A. Arsic, M. Jordanski, and M. Tuba, “Improved lip detection algorithm based on region segmentation and edge detection,” in 23rd Telecommunications Forum (TELFOR). IEEE, 2015, pp. 472–475.

[5] A. Bamatraf, R. Ibrahim, M. Salleh, and N. Mohd, “A new digital watermarking algorithm using combination of least signifi- cant bit (LSB) and inverse bit,” arXiv preprint arXiv:1111.6727, 2011.

[6] M. M. U. Bhaisare and V. R. Raut, “Generic lossless visible watermarking,” International Journal of scientific research and management (IJSRM), vol. 3, no. 4, pp. 2571–2581, 2015.

[7] K. Deb, M. S. Al-Seraj, M. M. S. Kowsar, and I. H. Sarkar, “A joint DWT-DCT based watermarking technique for avoiding unauthorized replication,” in 7th International Forum on Strategic Technology (IFOST). IEEE, 2012, pp. 1–5.

[8] B. L. Gunjal and R. Manthalkar, “An overview of transform domain robust digital image watermarking algorithms,” Journal of Emerging Trends in Computing and Information Sciences, vol. 2, no. 1, pp. 37–42, 2010.

[9] P. Gupta, “Cryptography based digital image watermarking algorithm to increase security of watermark data,” International Journal of Scientific & Engineering Research, vol. 3, no. 9, pp. 1–4, 2012.

[10] Y.-Q. Han, Y.-Q. Bai, and F.-k. Jia, “Extracting the centroid from the sun-moon image in astronomy orientation,” in 33rd Chinese Control Conference (CCC). IEEE, 2014, pp. 4721–4726.

[11] R. C. Hrosik, M. Tuba, and M. Vukovic, “Face detection algorithm based on skin detection and invariant moments,” in Recent Advances in Knowledge Engineering and Systems Science, 2013, vol. 10, pp. 110–115.

[12] F.-H. Hsu, M.-H. Wu, C.-H. Yang, and S.-J. Wang, “Visible watermarking with reversibility of multimedia images for ownership declarations,” The Journal of Supercomputing, vol. 70, no. 1, pp. 247–268, 2014.

[13] H.-C. Huang and W.-C. Fang, “Metadata-based image watermarking for copyright protection,” Simulation Modelling Practice and Theory, vol. 18, no. 4, pp. 436–445, 2010.

[14] M. Hussain and M. Hussain, “A survey of image steganography techniques,” International Journal of Advanced Science and Technology, vol. 54, pp. 113–124, 2013.

[15] S. A. Kasmani and A. Naghsh-Nilchi, “A new robust digital image watermarking technique based on joint dwt-dct transformation,” in hird International Conference on Convergence and Hybrid Information Technology (ICCIT), vol. 2. IEEE, 2008, pp. 539–544.

[16] E. Kee, M. K. Johnson, and H. Farid, “Digital image authentication from jpeg headers,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1066–1075, 2011.

[17] A. Khan, A. Siddiqa, S. Munib, and S. A. Malik, “A recent survey of reversible watermarking techniques,” Information sciences, vol. 279, pp. 251–272, 2014.

[18] C.-W. Lee and W.-H. Tsai, “A new lossless visible watermarking method via the use of the PNG image,” 2012.

[19] G. D. Leena, S. S. Dhayanithy, and M. Hwang, “Robust image watermarking in frequency domain,” International Journal of Innovation and Applied Studies, pp. 2028–9324, 2013.

[20] T.-Y. Liu and W.-H. Tsai, “Generic lossless visible watermarkinga new approach,” IEEE transactions on image processing, vol. 19, no. 5, pp. 1224–1235, 2010.

[21] M. Lukic, E. Tuba, and M. Tuba, “Leaf recognition algorithm using support vector machine with Hu moments and local binary patterns,” in 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI). IEEE, 2017, pp. 000 485–000 490.

[22] N. Narawade and R. Kanphade, “Reversible watermarking: a complete review,” International Journal of Computer Science and Telecommunications, vol. 2, no. 3, pp. 46–50, 2011.

[23] K. S. P. S. Nellore and P. M. SWAMY, “Generic lossless visible watermarking,” International Journal of Engineering Science & Management, vol. 3, no. 2, pp. 1–5, 2013.

[24] M. Nikolic, E. Tuba, and M. Tuba, “Edge detection in medical ultrasound images using adjusted Canny edge detection algorithm,” in 24th Telecommunications Forum (TELFOR). IEEE, 2016, pp. 691–694.

[25] P. K. Sharma, “Rajni: Analysis of image watermarking using least significant bit algorithm,” International Journal of Information Sciences and Techniques (IJIST) Vol, vol. 2, 2012.

[26] A. K. Singh, N. Sharma, M. Dave, and A. Mohan, “A novel technique for digital image watermarking in spatial domain,” in 2nd IEEE International Conference on Parallel Distributed and Grid Computing (PDGC). IEEE, 2012, pp. 497–501.

[27] P. Singh and R. Chadha, “A survey of digital watermarking techniques, applications and attacks,” International Journal of Engineering and Innovative Technology (IJEIT), vol. 2, no. 9, pp. 165–175, 2013.

[28] A. Stojak, E. Tuba, and M. Tuba, “Framework for abnormality detection in magnetic resonance brain images,” in 24th Telecommunications Forum (TELFOR). IEEE, 2016, pp. 687–690.

[29] H. K. Sunesh, “Watermark attacks and applications in watermarking,” in National WorkshopCum-Conference on Recent Trends in Mathematics and Computing (RTMC), 2011.

[30] E. Tuba and N. Bacanin, “An algorithm for handwritten digit recognition using projection histograms and SVM classifier,” in 23rd Telecommunications Forum Telfor (TELFOR). IEEE, 2015, pp. 464–467.

[31] E. Tuba, M. Tuba, and E. Dolicanin, “Adjusted fireworks algorithm applied to retinal image registration,” Studies in Informatics and Control, vol. 26, no. 1, pp. 33–42, 2017.

[32] I. Tuba, E. Tuba, and M. Beko, “Digital image forgery detection based on shadow texture features,” in 24th Telecommunications Forum (TELFOR). IEEE, 2016, pp. 679–682.

[33] M. Tuba, “Multilevel image thresholding by nature-inspired algorithms-a short review,” The Computer Science Journal of Moldova, vol. 22, no. 3, pp. 318–338, 2014.

[34] M. Tuba and N. Bacanin, “JPEG quantization tables selection by the firefly algorithm,” in International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2014, pp. 153– 158.

[35] S.-K. Yip, O. C. Au, C.-W. Ho, and H.-M. Wong, “Lossless visible watermarking,” in 2006 IEEE International Conference on Multimedia and Expo. IEEE, 2006, pp. 853–856.

WSEAS Transactions on Systems, ISSN / E-ISSN: 1109-2777 / 2224-2678, Volume 16, 2017, Art. #11, pp. 76-84


Copyright © 2017 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution License 4.0

Bulletin Board

Currently:

The editorial board is accepting papers.


WSEAS Main Site