Universiti Teknologi Malaysia Institutional Repository

An approximation approach for digital image owner identification using histogram intersection technique

Emami, Mir Shahriar and Sulong, Ghazali and Seliman, Salbiah (2012) An approximation approach for digital image owner identification using histogram intersection technique. International Journal of Innovative Computing, Information and Control, 8 (7A). pp. 4605-4620. ISSN 1349-4198

Full text not available from this repository.

Abstract

Researchers have documented a wide variety of attacks again st digital image watermarking techniques. Meanwhile, many strong attacks have been appearing at a reasonable rate. The investigations emphasize that modelling of the behaviours regarding such attacks is difficult. Studies have revealed that existing watermarking algorithms have a tendency to be severely affected by such strong attacks which results in destroyed watermarks. Hence, in the influence of such attacks, the ownership identification of the property cannot be established. This paper proposes an approximation approach for identification of the rightful owner of the property utilizing the remaining information of the attacked watermarks regardless of the attack behaviour . Here, we coupled the BiISB (Duo-ISB-Bit-Plane) watermarking algorithm together wit h the HI (Histogram Intersection) technique in order to identify the ownership of the property. In BiISB approach, while the main watermark delivers the ownership identification information, the sub- watermark which is a bit-pattern histogram, is the statistical information regarding the main watermark. In addition, three bit-pattern histograms namely, original, extracted and computed sub-watermarks have been used for approximation purpose. An investigation has been achieved using a standard Lena gray-scale host image of 512 × 512 pixels, a trademark image of 38 × 89 pixels as a sub-watermark and JPEG2000 loss compression, Cropping and Reset Removal watermarking attacks. The results have revealed that the proposed approach highly balanced the trade-off between imperceptibility and robustness. This was successfully achieved by preserving the quality of the watermarked image and, at the same time, identifying the ownership of the property even though the attack totally corrupted the embedded watermarks.

Item Type:Article
Uncontrolled Keywords:Computing
Subjects:Q Science > QA Mathematics > QA76 Computer software
Divisions:Computer Science and Information System
ID Code:46581
Deposited By: Haliza Zainal
Deposited On:22 Jun 2015 05:56
Last Modified:14 Sep 2017 07:10

Repository Staff Only: item control page