The¶latest¶growth¶of¶fast¶communication¶network¶and¶explosion¶of¶a¶huge¶network¶of¶multimedia¶systems¶has¶discouraged¶the¶multimedia¶&¶hypertext¶content¶providers.¶The¶authors¶and¶producers¶hesitate¶to¶share¶their¶article¶on¶the¶network¶environment¶because¶they¶have¶no¶control¶to¶protect¶from¶copy.¶The¶intelligent¶property¶with¶authentication¶is¶becoming¶very¶important¶issue¶today¶(Karimi¶et¶al.,¶2013).¶Instead¶multiple¶efforts¶and¶resources¶are¶working¶to¶make¶authorize¶intellectual¶property.¶The¶total¶cost¶of¶producing¶such¶intellectual¶property¶and¶creations¶of¶typically¶constitute¶significant¶formation.¶However,¶the¶creator¶of¶multimedia¶is¶always¶need¶some¶awards¶with¶motivation¶for¶the¶development.

¶The¶researchers¶today,¶are¶involving¶to¶the¶research¶in¶image¶processing¶with¶the¶specialization¶in¶watermarking.¶The¶basic¶property¶of¶the¶image¶allows¶multiple¶control¶and¶fact¶to¶judge¶the¶purity¶and¶classify¶accordingly.All¶the¶watermarking¶process¶has¶basic¶approach¶with¶the¶component¶in¶algorithm,¶the¶Figure¶1¶presents¶the¶block¶diagram¶of¶steps¶with¶component¶used¶in¶watermarking.¶Basically,¶digital¶watermarks¶are¶used¶as¶identity¶information¶to¶identify¶the¶owner¶by¶verifying¶authenticity¶and¶integrity¶of¶the¶image.¶It¶is¶specially¶used¶for¶finding¶copyright¶infringements¶and¶for¶banknote¶authentication.¶In¶the¶past¶decade,¶as¶the¶information¶digitalization¶and¶internet¶were¶developed,¶digital¶media¶increasingly¶rapidly¶over¶traditional¶analog¶media.¶However,¶as¶one¶of¶the¶concomitant¶side-effects¶of¶digital¶media,¶that¶it¶is¶also¶becoming¶easier¶and¶providing¶an¶easy¶approach¶for¶some¶individual¶or¶group¶to¶copy¶and¶transmit¶digital¶products¶without¶the¶permission¶of¶the¶owner.¶And¶to¶solve¶this¶problem¶watermarking¶technique¶were¶introduced.

¶There¶are¶many¶subject¶covered¶by¶watermarks¶such¶as¶signal¶processing,¶encryption¶and¶communication¶theory.¶The¶research¶in¶the¶field¶of¶digital¶watermark¶aimed¶to¶provide¶to¶prevent¶and¶trace¶prohibited¶copying¶and¶transmission¶and¶security¶of¶copyright¶to¶digital¶products.Watermarking¶techniques¶are¶rarely¶used¶in¶spatial¶domain¶bude¶widely¶used¶in¶transform¶domain¶because¶spaital¶domain¶based¶watermarking¶can¶easily¶affected¶by¶basic¶image¶operation.¶The¶spatial¶domain¶techniques¶are¶not¶complex¶to¶implement,¶so¶they¶cannot¶withstand¶low¶pass¶filtering.¶The¶frequency¶domain¶of¶watermarking¶are¶achieved¶by¶i.

e.¶DCT,¶DFT¶and¶DWT¶etc.¶The¶comparison¶of¶developed¶techniques¶reflects¶that¶the¶frequency-domain¶watermarking¶is¶most¶effective¶with¶realizing¶the¶imperceptibility¶and¶robustness.

¶(Rekhaet¶et¶al.¶2014,¶Mitali¶et¶al.,¶2013).¶The¶DWT¶is¶most¶widely¶researched¶Frequency-Domain¶based¶transforms.

¶The¶Discrete¶Cosine¶Transform¶(DCT)¶and¶Discrete¶Fourier¶Transform¶(DFT)¶are¶also¶used¶with¶their¶own¶important¶characteristics¶and¶applications.¶DWT¶exist¶fine¶spatial¶localization¶with¶multi-resolution¶characteristics,¶those¶are¶matches¶to¶theoretical¶models¶of¶human¶visual¶system.¶Further,¶performance¶improvement¶of¶DWT¶based¶Watermarking¶algorithms¶changes¶with¶the¶level¶of¶DWT¶(Naghsh¶et¶al.

,¶2008).An¶effective¶and¶interactive¶watermarking¶technique¶should¶be¶considering¶the¶several¶properties¶(Naghsh¶et¶al.,¶2008). •¶Transparency:¶The¶embedded¶watermark¶in¶the¶image¶should¶be¶perceptually¶and¶visually¶imperceptible.¶This¶requirement¶holds¶the¶most¶challenges¶for¶the¶images¶having¶noticeable¶pixel¶similarities¶in¶different¶parts¶of¶the¶image.

¶The¶fixed¶watermark¶in¶the¶images¶should¶must¶be¶perceptually¶invisible¶because¶this¶holds¶the¶most¶challenges •¶Robustness:¶The¶watermarked¶image¶should¶be¶robust¶i.e.¶watermark¶should¶not¶be¶easy¶to¶remove¶or¶destroy¶from¶image¶and¶before¶missing¶of¶the¶watermark,¶watermarked¶image¶should¶be¶degraded.¶It¶should¶also¶be¶robust¶against¶certain¶occasional¶or¶intentional¶attacks¶such¶as:¶i)¶Common¶digital¶processing:¶A¶watermark¶should¶must¶survive¶after¶common¶digital¶processing¶like¶scanning,¶dithering,¶compression,¶printing,¶blurring¶and,¶etc.

¶of¶the¶image.¶ii)¶Subterfuge¶attacks¶(collusion¶and¶forgery):¶It¶should¶be¶robust¶from¶the¶collusion¶or¶repetition¶of¶the¶watermarks¶in¶the¶image.¶iii)¶Geometric¶distortions:¶A¶watermarking¶technique¶has¶an¶ability¶to¶survive¶different¶type¶of¶attacks¶such¶as¶scaling,¶geo-metric¶transformation,¶cropping,¶and¶translation. •¶Capacity:¶The¶watermarking¶technique¶has¶a¶capacity¶to¶hide¶a¶watermark¶into¶an¶original¶image¶with¶the¶majority¶of¶information. •¶Blind¶Watermarking:¶This¶include¶the¶extraction¶of¶watermark¶from¶a¶temporary¶watermarked¶image,¶because¶sometimes¶it¶is¶unable¶to¶access¶the¶original¶image¶or¶a¶lot¶of¶time¶and¶cost¶may¶be¶lost¶in¶searching¶original¶image.CryptographyCryptograph¶is¶an¶art¶for¶providing¶security¶of¶data¶or¶message¶using¶encryption¶and¶decryption.

¶Now¶a¶day¶in¶a¶network¶data¶security¶is¶a¶biggest¶challenge¶for¶science¶and¶technology.¶A¶huge¶number¶of¶users¶used¶an¶internet¶and¶sending¶data¶but¶security¶of¶these¶data¶is¶a¶biggest¶problem.¶Cryptography¶provides¶a¶solution¶of¶data¶security¶on¶the¶network¶or¶internet¶using¶various¶encryption¶decryption¶techniques.¶Cryptography¶provides¶a¶major¶security¶for¶sensitive¶data¶such¶as,¶banking¶transactions,¶social¶security¶numbers¶and¶credit¶cards.in¶these¶day¶there¶are¶several¶security¶algorithms¶are¶exiting¶which¶are¶used¶to¶decrease¶the¶information¶theft¶(Mitali¶et¶al.,¶2013).Basic¶Terms¶Used¶in¶Cryptography •¶Plain¶Text:¶Plain¶text¶is¶known¶as¶original¶message,¶user¶which¶is¶used¶to¶communicate¶to¶another¶person.

¶in¶the¶terms¶of¶cryptography,¶a¶message¶which¶is¶send¶to¶the¶other¶one¶end¶to¶other¶end¶is¶known¶as¶plain¶text.¶For¶example,¶Ranjeet¶is¶a¶person¶which¶is¶sends¶a¶message¶”Hi¶friend”¶to¶the¶person¶Amit.¶Here¶”Hi¶friend”¶is¶a¶plain¶text¶message. •¶Cipher¶Text:¶Encrypted¶message¶is¶known¶as¶cipher¶text¶or¶a¶message¶which¶is¶not¶understood¶by¶any¶other¶person¶is¶known¶as¶cipher¶text¶(Thambiraja¶et¶al.

,¶2012). •¶Encryption:¶technique¶which¶is¶used¶to¶convert¶plain¶text¶to¶cipher¶text¶is¶known¶as¶Encryption •¶Decryption:¶Decryption¶is¶the¶reverse¶process¶of¶encryption¶or¶a¶technique¶which¶is¶used¶to¶convert¶cipher¶text¶to¶plain¶text¶is¶known¶as¶decryption¶(Thambiraja¶et¶al.,¶2012).Types¶of¶CryptographySee¶also¶Figure¶2. •¶Symmetric¶Key¶Cryptography:¶In¶symmetric¶key¶cryptography¶sender¶and¶receiver¶used¶same¶key.¶In¶this¶technique¶sender¶use¶a¶key¶to¶encrypt¶the¶original¶data¶same¶key¶is¶used¶by¶receiver¶to¶decrypt¶the¶encrypted¶data¶this¶cryptography¶technique¶is¶known¶as¶symmetric¶key¶cryptography¶(Shakti¶et¶al.

,¶2013). •¶Asymmetric¶Key¶Cryptography:¶Asymmetric¶key¶cryptography¶is¶also¶known¶as¶public¶key¶cryptography.¶There¶are¶two¶keys¶are¶used¶in¶public¶key¶cryptography¶one¶is¶public¶key¶and¶other¶is¶private¶key.in¶this¶technique¶message¶is¶encrypted¶by¶private¶key¶which¶is¶kept¶by¶sender¶and¶public¶key¶is¶announced¶to¶the¶public¶(Shakti¶et¶al.,¶2013).

Figure¶2.¶Type¶of¶cryptographyQR¶CodeQR¶Code¶is¶known¶as¶Quick¶Response¶code,¶it¶is¶a¶type¶of¶2D-Bar¶Code.¶QR¶code¶is¶an¶image¶form¶of¶data¶which¶is¶read¶by¶Smart¶phone¶and¶various¶QR¶Code¶reading¶device.¶In¶this¶paper¶Author¶uses¶Zxing¶QR¶Code¶Generator¶and¶Decoder.¶Main¶role¶of¶QR¶code¶in¶this¶paper¶is¶to¶convert¶data¶in¶an¶image¶form¶for¶the¶purpose¶of¶multi-security¶watermarking.¶QR¶Code¶store¶data¶in¶2D-matrix¶form¶and¶it¶maximum¶capacity¶is¶3KB.

In¶QR¶Code¶information¶is¶encoded¶horizontally¶and¶vertically¶both¶direction.¶it¶has¶a¶more¶capacity¶to¶holding¶data¶compare¶to¶Bar¶Code,¶approximately¶700¶times¶more¶(Kieseberg¶et¶al.,¶2010).¶In¶this¶paper,¶QR¶Code¶is¶used¶as¶a¶watermark¶image,¶firstly¶data¶is¶encrypted¶by¶encryption¶algorithm¶the¶encrypted¶data¶is¶transform¶in¶the¶form¶of¶QR¶Code¶this¶QR¶Code¶image¶is¶used¶as¶watermark¶image¶in¶this¶whole¶algorithm¶procedure.LITERATURE¶SURVEYThe¶explanation¶of¶the¶Application¶of¶the¶digital¶watermarking¶in¶various¶field¶such¶as¶Copyright¶protection¶and¶fingerprinting,¶Authentication¶or¶tamper-proofing¶and¶Covert¶communications,¶are¶deeply¶explained¶(Nikolaidis¶et¶al.,¶2011).¶Type¶of¶digital¶image¶watermarking,¶digital¶image¶watermarking¶is¶divided¶into¶two¶categories¶i.e.

,¶special¶domain¶and¶frequency¶domain,¶example¶of¶spatial¶domain¶is¶DCT,¶DWT¶and¶DFT¶and¶LSB¶is¶example¶of¶Spatial¶domain¶technique.¶Frequency¶Domain¶Technique¶is¶more¶robust¶to¶spatial¶domain¶technique¶(Jin¶et¶al.,¶2009)The¶idea¶based¶on¶combining¶multiple¶watermark¶image¶using¶Hybrid¶Approach¶of¶DWT-SVD¶watermarking¶algorithm¶(Hemdan¶et¶al.,¶2013).

¶The¶combined¶approach¶of¶DCT¶and¶DWT¶watermarking¶for¶the¶purpose¶of¶data¶security,¶because¶DWT¶image¶watermarking¶provide¶stability¶and¶DCT¶watermarking¶provide¶compression¶(Deb¶et¶al.,¶2012).¶But¶in¶proposed¶algorithm¶it¶combines¶the¶LSB¶and¶DCT¶approach¶because¶LSB¶contain¶spatial¶domain¶property¶and¶DCT¶contain¶frequency¶domain¶property¶proposed¶algorithm¶contain¶both¶property.¶The¶main¶advantage¶of¶LSB¶watermarking¶is¶modification¶of¶LSB¶plain¶do¶not¶affect¶the¶human¶perception¶on¶over¶all¶image,¶and¶the¶main¶advantage¶of¶DCT¶watermarking¶is¶the¶modification¶of¶bit¶in¶middle¶frequency¶band¶which¶is¶not¶affected¶the¶human¶perception¶of¶all¶over¶whole¶image.

¶For¶copy¶right¶protection¶a¶robust¶digital¶image¶watermarking¶algorithm¶using¶haar¶wavelet¶transforms¶is¶proposed¶(Ret¶al.,¶2012).¶Cong¶Jinet¶al.,¶2009,¶it¶provides¶wavelet¶based¶digital¶image¶watermarking¶for¶copyright¶protection.

¶Haiyan¶Zhao¶et¶al.,¶2010,¶it¶is¶providing¶a¶watermark¶technique¶which¶is¶combined¶with¶HVS¶for¶protection¶of¶data.¶in¶this¶watermarking¶process¶HVS¶is¶used¶to¶design¶watermarking¶technique.¶For¶designing¶of¶watermark¶embed¶process¶here¶author¶used¶visual¶masking¶feature¶of¶HVS.¶The¶detail¶survey¶of¶watermarking¶techniques¶and¶type¶i.e.¶fragile¶Watermarks,¶Semi¶fragile¶Watermarks¶and¶Different¶Malicious¶Attacks¶(Rey¶et¶al.

,¶2002).A.¶Pivaet¶al,¶this¶paper¶focuses¶an¶algorithm¶based¶on¶DCT¶watermarking.¶In¶this¶paper¶author¶used¶pseudo-random¶sequence¶in¶the¶selected¶part¶i.e.¶middle¶frequency¶band¶of¶image.

¶a¶comparative¶study¶of¶Discrete¶Cosine¶Transform¶and¶Least¶Significant¶Bit¶Watermarking¶algorithm¶with¶different¶types¶of¶attacks¶are¶proposed¶(El-Ghoneimyet¶al.,¶2012).¶This¶paper¶explains¶only¶comparative¶studies¶between¶DCT¶and¶LSB.In¶the¶above¶related¶work¶is¶only¶focus¶how¶to¶provide¶a¶robust¶watermarking¶technique¶for¶image¶security,¶but¶in¶the¶propose¶algorithm¶the¶main¶motive¶is¶providing¶multi-level¶security¶of¶data.¶This¶paper¶explain¶how¶can¶provide¶level¶by¶level¶security¶of¶data.¶This¶paper¶provides¶level¶by¶level¶security¶using¶property¶of¶cryptography¶and¶two-dimensional¶bar¶codes.¶This¶paper¶proposed¶a¶model¶for¶combined¶approach¶of¶cryptography¶and¶dual¶watermarking¶i.

e.¶LSB_DCT¶to¶provide¶more¶security¶and¶authentication¶of¶data.¶QR¶Code¶has¶high¶capacity¶storage,¶due¶to¶this¶feature¶of¶a¶QR¶Code¶a¶lot¶data¶we¶can¶hide¶in¶original¶image¶using¶QR¶Code.¶QR¶Code¶combining¶with¶digital¶watermarking¶can¶also¶use¶to¶protect¶the¶commercial¶activity¶running¶on¶internet.

¶One¶of¶the¶important¶feature¶of¶QR¶Code¶is¶read¶the¶30%¶of¶damage¶data,¶this¶is¶one¶of¶the¶reason¶author¶used¶QR¶Code¶in¶digital¶image¶watermarking.ALGORITHM¶STEP Step¶1:¶Take¶a¶data¶in¶the¶form¶of¶text. Step¶2:¶Encrypt¶the¶data¶by¶using¶a¶Key¶data+¶k¶Mod¶n,¶where¶k¶is¶a¶positive¶constant¶and¶n¶is¶the¶length¶of¶data. Step¶3:¶After¶the¶encryption¶of¶text¶data¶it¶converts¶into¶QR¶Code¶by¶using¶Zxing¶QR¶Code¶generator. Step¶4:¶Take¶an¶image,¶consider¶as¶original¶image. Step¶5:¶QR¶Code¶image¶treated¶as¶watermark¶1¶image,¶which¶pixel¶is¶mapped¶in¶original¶image¶by¶LSB¶Watermarking¶using¶Mod¶Function. Step¶6:¶After¶completion¶of¶Step¶5¶watermarked¶image¶is¶found¶out,¶which¶is¶represented¶by¶watermarked1¶image.

Step¶7:¶Watermarked¶1¶image¶treated¶as¶original¶image¶and¶a¶take¶another¶image¶as¶a¶watermark2¶image Step¶8:¶Convert¶the¶original¶image¶of¶Hexagonal¶of¶size¶6. Step¶9:¶Applying¶DCT¶function¶for¶converting¶Low,¶Middle¶and¶High¶frequency¶band. Step¶10:¶Mapping¶Watermark2¶image¶to¶middle¶frequency¶band¶using¶Mod¶Function¶and¶find¶watermark2¶image Step¶11:¶Used¶Inverse¶DCT¶and¶Inverse¶LSB¶we¶find¶out¶Recover¶watermark2¶and¶Recover¶watermark1¶(QR¶Code¶Image)¶image.

Step¶12:¶Decode¶the¶Watermark1¶(QR¶Code¶image)¶using¶Zxing¶QR¶Code¶Decoder¶and¶find¶out¶Encrypted¶Text¶data. Step¶13:¶Decrypt¶the¶encrypted¶data¶using¶key¶and¶Find¶out¶the¶original¶Text¶data.See¶also¶Figure¶3.Figure¶3.¶Working¶structure¶of¶proposed¶algorithm

x

Hi!
I'm Erica!

Would you like to get a custom essay? How about receiving a customized one?

Check it out