International Journal of Advanced Information and Communication Technology


Image Authentication: A Few Approaches Using Digital Watermarking

P. Sangeetha, Preethi Chacko, Nehru Institute of Technology, Coimbatore, Tamilnadu , India.

DOI : 01.0401/ijaict.2014.01.29

International Journal of Advanced Information and Communication Technology

Received On : August 20, 2014

Revised On : September 24, 2014

Accepted On : October 09, 2014

Published On : November 05, 2014

Volume 01, Issue 07

Pages : 149-152

Abstract


We might think that the images that we pick are all ours. Images may be secure enough with a Watermark that could be very well traced down. A digital Watermark is a digital signal or pattern inserted into a digital image. Since this signal or pattern is present in each unaltered copy of the original image, the digital Watermark may also serve as a digital signature for the copies. The desirable characteristics of a Watermark are (1) Watermark should be resilient to standard manipulations of any nature. (2) It should be statistically irremovable. Every Watermarking system consists at least two different parts: Watermark Embedding Unit and Watermark Detection and Extraction Unit. In this paper, we discuss an algorithm for embedding and detecting the Watermark in a still image. A robust, secure, invisible Watermark is imprinted on the image I, and the Watermarked image WI, is distributed. The author keeps the original image I. To prove that an image WI' or a portion of it has been pirated, the author shows that W' contains his Watermark (to this purpose, he could but does not have to use his original image I). The best a pirate can do is to try to remove the original W Watermark (which is impossible if the Watermark is secure). There can be another way out for the pirate, as to embed his signature in the image. But this does not help him too much because both his "original" and his Watermarked Image will contain the author's Watermark (due to robustness property), while the author can present an image without pirate's Watermark. Thus, the ownership of the image can be resolved in the court of law. We have done the implementation in MATLAB and doing the simulation in C++.

Keywords


Watermark, Transform Domain, DCT, FFT, Picture Cropping.

Cite this article


P. Sangeetha, Preethi Chacko, “Image Authentication: A Few Approaches Using Digital Watermarking” INTERNATIONAL JOURNAL OF ADVANCED INFORMATION AND COMMUNICATION TECHNOLOGY, pp.149-152, November 05, 2014.

Copyright


© 2014 P. Sangeetha, Preethi Chacko. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.