Skip to main content
Log in

An adaptive quin tree decomposition (AQTD) technique in image authentication through Lossless Watermarking (LWM)

  • Applied Problems
  • Published:
Pattern Recognition and Image Analysis Aims and scope Submit manuscript

Abstract

Watermarking is a means of implanting data in the form of text, symbols or any credential into the multimedia data such as image, audio or video. The conventional produces below-par accomplishment when the communication is implanted into the image LSB bits. With a view to rectify these defects and also to safeguard the confidential data and images from the bogus clients, we are introducing an innovative method. In the proposed method, we employ. Adaptive quin tree decomposition for fragmenting the original image into five blocks, and the signed communication from the ECC technique are implanted into the fifth block pixel values. Subsequently, the data revival and authentication procedure are done to check the authenticity or otherwise of the data and image revived. A group of data including images is employed to assess the efficiency of our innovative approach and amazing outcomes achieved from the novel approach that predict the robustness of the suggested decomposition method in image verification procedure. The performance outcomes also validate the proficiency of the proposed program for the confirmation of the image by means of watermarking. It has gone a long way in attaining progress in image certification, safety and security measures. Further, the efficiency of the novel system is put to test and contrasted with the outcomes of the current watermarking technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. M. Soliman, A. E. Hassanien, N. Ghali, and H. Onsi, “An adaptive watermarking approach for medical imaging using swarm intelligent,” Int. J. Smart Home 6 (1), 37–50 (2012).

    Google Scholar 

  2. N. Pandey, Sayani Nandy, and Shelly Sinha Choudhury, “Alternative shift algorithm for digital watermarking on text,” Int. J. Sci. Res. Publ. 2 (10), 1–5 (2012).

    Google Scholar 

  3. Sudhanshu Gonge and Jagdish Bakal, “Robust digital watermarking technique by using DCT and spread spectrum,” Int. J. Electr., Electron. Data Commun. 1 (2), 27–32 (2013).

    Google Scholar 

  4. J. Pragya and A. S. Rajawat, “Fragile watermarking for image authentication: survey,” Int. J. Electron. Comput. Sci. Eng. 1 (3), 1232–1237 (2012).

    Google Scholar 

  5. S. S. Sujatha and M. Mohamed Sathik, “A novel DWT based blind watermarking for image authentication,” Int. J. Network Security 14 (4), 223–228 (2012).

    Google Scholar 

  6. N. Yassin, N. Salem, and M. Adawy, “Block based video watermarking scheme using wavelet transform and principle component analysis,” Int. J. Comput. Sci. Issues 9 (3), 296–301 (2012).

    Google Scholar 

  7. N. Kashyap and G. R. Sinha, “Image watermarking using 3-level Discrete Wavelet Transform (DWT),” Int. J. Modern Edu. Comput. Sci. 4 (3), 50–56 (2012).

    Article  Google Scholar 

  8. A. A. Hood and N. J. Janwe, “Robust video watermarking techniques and attacks on watermark. A review,” Int. J. Comput. Trends Technol. 4 (1), 30–34 (2013).

    Google Scholar 

  9. K. Goenka and Pallavi Patil, “Overview of audio watermarking techniques,” Int. J. Emerging Technol. Adv. Eng. 2 (2), 67–70 (2012).

    Google Scholar 

  10. Sajjad Dadkhah, Azizah Abd Manaf, and Somayeh Sadeghi, “Efficient digital image authentication and tamper localization technique using 3LSB watermarking,” Int. J. Comput. Sci. Issues 9 (2), 1–8 (2012).

    Google Scholar 

  11. Bhupendra Ram, “Digital image watermarking technique using discrete wavelet transform and discrete cosine transform,” Int. J. Adv. Res. Technol. 2 (4), 19–27 (2013).

    Google Scholar 

  12. Dayalin Leena and Selva Dhayanithy, “Robust image watermarking in frequency domain,” Int. J. Innov. Appl. Studies 2 (4), 582–587 (2013).

    Google Scholar 

  13. Nidhi Bisla and Prachi Chaudhary, “Comparative study of DWT and DWT–SVD image watermarking techniques,” Int. J. Adv. Res. Comput. Sci. Software Eng. 3 (6), 821–825 (2013).

    Google Scholar 

  14. P. M. Pithiya and H. L. Desai, “DCT based digital image watermarking, de-watermarking authentication,” Int. J. Latest Trends Eng. Technol. 2 (3), 213–219 (2013).

    Google Scholar 

  15. S. Radharani and M. L. Valarmathi, “A study on watermarking schemes for image authentication,” Int. J. Comput. Appl. 2 (4), 24–32 (2012).

    Google Scholar 

  16. Navneet Singh, Sonika Matele, and Shailendra Singh, “An efficient approach for security of cloud using watermarking technique,” Int. J. Adv. Res. Comput. Commun. Eng. 2 (7), 2814–2817 (2013).

    Google Scholar 

  17. Barun Pandhwal and D. S. Chaudhari, “An overview of digital watermarking techniques,” Int. J. Soft Comput. Eng. 3 (1), 416–420 (2013).

    Google Scholar 

  18. Megha Kansal, Sukhjeet Ranade, and Amandeep Kaur, “Fragile watermarking for image authentication using a hierarchical mechanism,” Int. J. Eng. Res. Appl. 2 (4), 1759–1763 (2012).

    Google Scholar 

  19. Prabhishek Singh and R. S. Chadha, “A survey of digital watermarking techniques, applications and attacks,” Int. J. Eng. Innov. Techn. 2 (9), 165–175 (2013).

    Google Scholar 

  20. Archana Tiwari and Manisha Sharma, “Semi fragile watermarking schemes for image authentication. A survey,” Int. J. Comput. Network Inf. Security 4 (2), 43–49 (2012).

    Article  Google Scholar 

  21. Wang Xiang-Yang, Miao E-No, “A new SVM-based image watermarking using Gaussian-Hermite moments,” Appl. Soft Comput. 12 (2), 887–903 (2012).

    Article  Google Scholar 

  22. M. Farfoura, Shi-Jinn Horng, Jui-Lin Lai, Ray-Shine Run, Rong-Jian Chen, and M. K. Khan, “A blind reversible method for watermarking relational databases based on a time-stamping protocol,” Expert Syst. Appl. 39 (3), 3185–3196 (2012).

    Article  Google Scholar 

  23. Sanjay Rawat and Balasubramanian Raman, “A publicly verifiable lossless watermarking scheme for copyright protection and ownership assertion,” Int. J. Electron. Commun. 66 (11), 955–962 (2012).

    Article  Google Scholar 

  24. M. Kamran, A. Khan, and Sana Ambreen Malik, “A high capacity reversible watermarking approach for authenticating images: exploiting down-sampling, histogram processing, and block selection,” Int. J. Inf. Sci. 256, 162–183 (2013).

    Google Scholar 

  25. Guangyong Gao and Guoping Jiang, “A lossless copyright authentication scheme based on Bessel-Fourier moment and extreme learning machine in curvaturefeature domain,” J. Syst. Software 86 (1), 222–232 (2013).

    Article  Google Scholar 

  26. Arathi Chitla and M. C. Mohan, “Authentication of images through Lossless Watermarking (LWM) technique with the aid of Elliptic Curve Cryptography (ECC),” Int. J. Comput. Appl. 57 (6), 17–25 (2012).

    Google Scholar 

  27. M. Utku Celik, G. Sharma, and M. Tekalp, “Lossless watermarking for image authentication: a new framework and an implementation,” IEEE Trans. Image Processing 15 (4), 1042–1049 (2006)

    Article  Google Scholar 

  28. V. Padmanabha Reddy and S. Varadarajan, “Human visual system sentient imperceptible and efficient wavelet-based watermarking scheme for copyright protection of digital images,” Int. J. Comput. Sci. Network Security 9 (4), 255–264 (2009).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arathi Chitla.

Additional information

The article is published in the original.

Arathi Chitla, Associate Professor of Computer Science and Engineering in Telangana University, Nizamabad, Telangana, India, she has 14 years of teaching experience. She completed her B.E from Osmania University and M. Tech from JNTU Kakinada with distinction. She is pursuing her Ph. D from JNTU Hyderabad on Digital Watermarking Techniques. She published 10 research articles in international journals and attended national and international seminars and workshops. She organized national seminar with APSCHE.

M. Chandra Mohan, Professor of computer Science and Engineering in JNTUH, Hyderabad, Telangana, India. He is having 7 years of industrial experience and 13 years of teaching experience. He completed his B.E, M.Tech from Osmania University with distinction, Ph.D from JNTU, Hyderabad. He published 15 research articles in International Journals and presented several papers in national and international seminars and workshops. His areas of interests are software engineering and image processing.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chitla, A., Mohan, M.C. An adaptive quin tree decomposition (AQTD) technique in image authentication through Lossless Watermarking (LWM). Pattern Recognit. Image Anal. 26, 69–81 (2016). https://doi.org/10.1134/S1054661815040045

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S1054661815040045

Keywords

Navigation