Please use this identifier to cite or link to this item:
https://ir.vidyasagar.ac.in/jspui/handle/123456789/5347
Title: | Design of Reversible Watermarking Techniques in Spatial Domain |
Authors: | Pal, Pabitra Jana, Biswapati Bhaumik, Jaydeb |
Keywords: | Watermarking Authentication Tamper Detection Tamper Localization Copyright Protection |
Issue Date: | 7-Feb-2020 |
Publisher: | Department of Computer Science, Vidyasagar University , Midnapore , West Bengal , India |
Abstract: | Modern communication systems are changing expeditiously due to the significant development of Internet technology and digital communication. Today, multimedia documents like audio, video, and images are easy to store, manipulate and transmit through the Internet by exploiting the benefits of digital technology and communication. But, these documents can be changed by intruders, which gives rise to a violation of authenticity. This unauthorized modification is becoming an issue in many human-centric applications where authentication, copyright protection, and tamper detection are essential. To solve such problems one can use digital watermarking scheme. Digital watermarking is the process of embedding an invisible watermark within a digital image (cover image). Watermarks have been used for postage stamps, currency, and other government documents. Many watermarking algorithms were developed to solve the unauthorized modification problem of digital data. Existing algorithms or methods have some advantages and disadvantages. In this dissertation, six secured, robust, and reversible watermarking schemes have been introduced using weighted matrix (WM), cellular automata (CA), local binary pattern (LBP), and Lagrange interpolation polynomial (LIP) to address the problem of ownership identification, image authentication, tamper detection and localization. Moreover, the proposed schemes have been analyzed considering ten different geometric and steganographic attacks such as salt and pepper, cropping, opaque, copy-move forgery, median filtering, blurring, rotation, flipping, inversion, and JPEG compression. It is found that the developed algorithms can sustain against such attacks. In addition to the sustainability, our developed schemes provide high embedding capacity with good visual quality which is acceptable in various real-life applications like medical image processing, military application, etc. A shared secret key has been introduced to enhance the security of all the developed schemes. Finally, all the methods are compared with some state-of-the-art watermarking methods, and considerable improvements have been observed. |
URI: | http://inet.vidyasagar.ac.in:8080/jspui/handle/123456789/5347 |
Appears in Collections: | Computer Science - Ph.D |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | 20.65 kB | Adobe PDF | View/Open | |
02_certificate.pdf | 42.89 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 43.57 kB | Adobe PDF | View/Open | |
04_declaration.pdf | 42.25 kB | Adobe PDF | View/Open | |
05_acknowledgement.pdf | 58.52 kB | Adobe PDF | View/Open | |
06_contents.pdf | 45.07 kB | Adobe PDF | View/Open | |
07_list_of_tables.pdf | 81.08 kB | Adobe PDF | View/Open | |
08_list_of_figures.pdf | 45.49 kB | Adobe PDF | View/Open | |
09_abbreviations.pdf | 58.27 kB | Adobe PDF | View/Open | |
10_Chapter-1.pdf | 153.5 kB | Adobe PDF | View/Open | |
11_Chapter-2.pdf | 460.79 kB | Adobe PDF | View/Open | |
12_Chapter-3.pdf | 5.9 MB | Adobe PDF | View/Open | |
13_Chapter-4.pdf | 4.68 MB | Adobe PDF | View/Open | |
14_Chapter-5.pdf | 5.23 MB | Adobe PDF | View/Open | |
15_conclusions.pdf | 132.42 kB | Adobe PDF | View/Open | |
16_biblography.pdf | 79.01 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.