Please use this identifier to cite or link to this item: http://inet.vidyasagar.ac.in:8080/jspui/handle/123456789/5347
Title: Design of Reversible Watermarking Techniques in Spatial Domain
Authors: Pal, Pabitra
Jana, Biswapati
Bhaumik, Jaydeb
Keywords: Watermarking
Authentication
Tamper Detection
Tamper Localization
Copyright Protection
Issue Date: 7-Feb-2020
Publisher: Department of Computer Science, Vidyasagar University , Midnapore , West Bengal , India
Abstract: Modern communication systems are changing expeditiously due to the significant development of Internet technology and digital communication. Today, multimedia documents like audio, video, and images are easy to store, manipulate and transmit through the Internet by exploiting the benefits of digital technology and communication. But, these documents can be changed by intruders, which gives rise to a violation of authenticity. This unauthorized modification is becoming an issue in many human-centric applications where authentication, copyright protection, and tamper detection are essential. To solve such problems one can use digital watermarking scheme. Digital watermarking is the process of embedding an invisible watermark within a digital image (cover image). Watermarks have been used for postage stamps, currency, and other government documents. Many watermarking algorithms were developed to solve the unauthorized modification problem of digital data. Existing algorithms or methods have some advantages and disadvantages. In this dissertation, six secured, robust, and reversible watermarking schemes have been introduced using weighted matrix (WM), cellular automata (CA), local binary pattern (LBP), and Lagrange interpolation polynomial (LIP) to address the problem of ownership identification, image authentication, tamper detection and localization. Moreover, the proposed schemes have been analyzed considering ten different geometric and steganographic attacks such as salt and pepper, cropping, opaque, copy-move forgery, median filtering, blurring, rotation, flipping, inversion, and JPEG compression. It is found that the developed algorithms can sustain against such attacks. In addition to the sustainability, our developed schemes provide high embedding capacity with good visual quality which is acceptable in various real-life applications like medical image processing, military application, etc. A shared secret key has been introduced to enhance the security of all the developed schemes. Finally, all the methods are compared with some state-of-the-art watermarking methods, and considerable improvements have been observed.
URI: http://inet.vidyasagar.ac.in:8080/jspui/handle/123456789/5347
Appears in Collections:Computer Science - Ph.D

Files in This Item:
File Description SizeFormat 
01_title.pdf20.65 kBAdobe PDFView/Open
02_certificate.pdf42.89 kBAdobe PDFView/Open
03_abstract.pdf43.57 kBAdobe PDFView/Open
04_declaration.pdf42.25 kBAdobe PDFView/Open
05_acknowledgement.pdf58.52 kBAdobe PDFView/Open
06_contents.pdf45.07 kBAdobe PDFView/Open
07_list_of_tables.pdf81.08 kBAdobe PDFView/Open
08_list_of_figures.pdf45.49 kBAdobe PDFView/Open
09_abbreviations.pdf58.27 kBAdobe PDFView/Open
10_Chapter-1.pdf153.5 kBAdobe PDFView/Open
11_Chapter-2.pdf460.79 kBAdobe PDFView/Open
12_Chapter-3.pdf5.9 MBAdobe PDFView/Open
13_Chapter-4.pdf4.68 MBAdobe PDFView/Open
14_Chapter-5.pdf5.23 MBAdobe PDFView/Open
15_conclusions.pdf132.42 kBAdobe PDFView/Open
16_biblography.pdf79.01 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.