Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Lossless Watermarking for Image Authentication


Affiliations
1 Park College of Engineering and Technology, Coimbatore, India
2 Beant College of Engineering & Technology, Gurdaspur, Punjab, India
     

   Subscribe/Renew Journal


Data integrity and source origin authentication are essential topics for real-time multimedia systems. But the traditional methods are not very applicable to overcome the distortion introduced in multimedia data transportation. In this paper few security schemes are proposed, which rely on authentication rather than on encryption methods. The highly asymmetric architectures found in ubiquitous computing applications are exploited to provide a protection of the transmitted multimedia data by means of well known digital watermarking techniques. The advocatedapproach exemplifies the basic concept of watermarking and presents a vivid picture of various watermarking techniques. The various watermarking techniques are compared by their Peak Signal to Noise Ratio (PSNR) and provides a report of the highest PSNR in proposed Dual tree DWT(Discrete Wavelet Transform) method.


Keywords

DDWT, DWT, MSE, Encryption, PSNR, Watermarking.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 211

PDF Views: 3




  • Lossless Watermarking for Image Authentication

Abstract Views: 211  |  PDF Views: 3

Authors

V. Seethalakshmi
Park College of Engineering and Technology, Coimbatore, India
Gurpadam Singh
Beant College of Engineering & Technology, Gurdaspur, Punjab, India

Abstract


Data integrity and source origin authentication are essential topics for real-time multimedia systems. But the traditional methods are not very applicable to overcome the distortion introduced in multimedia data transportation. In this paper few security schemes are proposed, which rely on authentication rather than on encryption methods. The highly asymmetric architectures found in ubiquitous computing applications are exploited to provide a protection of the transmitted multimedia data by means of well known digital watermarking techniques. The advocatedapproach exemplifies the basic concept of watermarking and presents a vivid picture of various watermarking techniques. The various watermarking techniques are compared by their Peak Signal to Noise Ratio (PSNR) and provides a report of the highest PSNR in proposed Dual tree DWT(Discrete Wavelet Transform) method.


Keywords


DDWT, DWT, MSE, Encryption, PSNR, Watermarking.