Enhanced Dct Image Watermarking Scheme Based on Zonal Sampling Algorithm Applied With Sspce Contour Extraction, Ramer and Adaptive Triangle Contour Compression Methods
Keywords:
Watermarking, Contour, DCT, Ramer, Adaptive TriangleAbstract
This paper proposes an image watermarking scheme based on DCT transform and selected zonal sampling algorithms. The scheme used LPF and HPF transform coefficients in a certain geometric zone of the original image are retained. All the rest of the parameter is set to zero (0), quantized and transmitted where the watermark will be embedded. In order to test robustness, some attacks are performed. However, prior to the watermark extraction process, the attacked watermarked image will be subdued into contour processing methods using Single Step Parallel Contour Extraction, Ramer and Adaptive Triangle algorithms. The proposed method for contour compression will help enhance image recognition, security and especially where time (speed) is an essential factor. The results show that the proposed watermarking method is robust and secure against various signal/image processing attacks with PSNR values of approximately 35 dB with NCC values of 0.60 and above. In addition, experimental results from contour compression indicate that the proposed Adaptive Triangle method has a high compression ratio without significant visible distortion
Downloads
References
J. C. Russ, The image processing handbook: Seventh Edition USA:CRC press, Taylor & Francis Group, 2016.
A. J. Penrose and N. A. Dodgson, "Extending lossless image compression," University of Cambridge Computer laboratory Technical Report, p. 149, 2001.
T. K. Araghi, A. B. A. Manaf, M. Zamani, and S. K. Araghi, "A Survey on Digital Image Watermarking Techniques in Spatial and Transform Domains," International Journal of Advances in Image Processing Techniques– IJIPT, vol. 3, pp. 16-10, 2016.
S. S. A. Andrabi, "Sheenam “A Review: Information Hiding Using Watermarking Techniques”," SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE)-EFES April, pp. 72-78, 2015.
I. J. Cox, M. L. Miller, and J. A. Bloom, "Watermarking applications and their properties," in ITOC Las Vegas, Nevada, USA, 2000, pp. 6-10.
T. A. Laskar and K. Hemachandran, "Digital Image Watermarking Techniques And Its Applications," in International Journal of Engineering Research and Technology, 2013.
L. De Strycker, P. Termont, J. Vandewege, J. Haitsma, A. Kalker, M. Maes, et al., "Implementation of a real-
time digital watermarking process for broadcast monitoring on a TriMedia VLIW processor," IEE Proceedings-
Vision, Image and Signal Processing, vol. 147, pp. 371-376, 2000. DOI: https://doi.org/10.1049/ip-vis:20000323
N. Memon and P. W. Wong, "Protecting digital media content," Communications of the ACM, vol. 41, pp. 35-43, 1998. DOI: https://doi.org/10.1145/278476.278485
R. K. Singh, D. K. Shaw, and M. J. Alam, "Experimental Studies of LSB Watermarking with Different Noise," Procedia Computer Science, vol. 54, pp. 612-620, 2015. DOI: https://doi.org/10.1016/j.procs.2015.06.071
R. Joshi, L. Gagnani, and S. Pandey, "Image Steganography With LSB," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 2, pp. 228-229, 2013.
P. Singh and R. Chadha, "A survey of digital watermarking techniques, applications and attacks," International Journal of Engineering and Innovative Technology (IJEIT), vol. 2, pp. 165-175, 2013.
R. Kurban, H. Bozpolat, and F. Skuka, "Image Watermarking using DC Component of DCT," ICIT 2015 the 7th International Conference on Information and Technology pp. 344-348, 2015. DOI: https://doi.org/10.15849/icit.2015.0052
A. K. Subudhi, K. Kabi, A. Subudhi, H. Patra, and J. B. Panda, "An enhanced technique for color image water marking using HAAR transform," in Electrical, Electronics, Signals, Communication and Optimization (EESCO), 2015 International Conference on, 2015, pp.1-5. DOI: https://doi.org/10.1109/EESCO.2015.7253844
C. K. Chui, An introduction to wavelets vol. 1. London, United Kingdom: Academic press, 2014.
R. Dubolia, R Singh, S. S. Bhadoria, and R. Gupta, "Digital image watermarking by using discrete wavelet transform and discrete cosine transform and comparison based on PSNR," in Communication Systems and Network Technologies (CSNT), 2011 International Conference on, 2011, pp. 593-596. DOI: https://doi.org/10.1109/CSNT.2011.127
A. Karmakar, A. Phadikar, B. S. Phadikar, and G. K. Maity, "A blind video watermarking scheme resistant to rotation and collusion attacks," Journal of King Saud University-Computer and Information Sciences, vol. 28, pp. 199-210, 2016. DOI: https://doi.org/10.1016/j.jksuci.2014.06.019
F. Ma, J. Zhang, and W. Zhang, "A blind watermarking technology based on DCT domain," in IEEE Transcript of the 2012 International Conference on Computer Science and Service System, 2012,pp.397-400. DOI: https://doi.org/10.1109/CSSS.2012.106
Majdi Farag Mohammed El Bireki, M. F. L. Abdullah and Ali Abdrhman M. Ukasha. “Adopting A Robust Watermarked Image Against Cyber Security Threats Using DCT and Ramer Method”, Fifth International Conference on Intelligent Systems, Modelling and Simulation, 2014 IEEE, DOI 10.1109/ISMS.2014.160, pp. 295-300.
S. Yuan and K.-B. Yu, "Zonal Sampling and Bit Allocation HT Coefficients in Image Data Compression," IEEE transactions on communications, vol. 34, pp. 1246-1251, 1986. DOI: https://doi.org/10.1109/TCOM.1986.1096482
A. A. M. Ukasha, "Methods of Contour Compression in Time and Spectral Domains," PhD Thesis, Faculty of Electrical Engineering, Automatics, Computer Science and Electronics, AGH-University of Science and Technology Poland, 2006.
A. Dziech, "Contour Extraction and Compression-Selected Topics," in Mobile Robots: Perception and Navigation, S. Kolski, Ed., ed Germany/ ARS Austria: INTECH Open Access Publisher, 2007, pp.187-214. DOI: https://doi.org/10.5772/4774
Majdi Farag Mohammed El Bireki, Ruqiya M Albahi Ali, Ali Abdrhman M. Ukasha and M. F. L. Abdullah. “An Adaptive-Triangle Method for Binary Image Contour Data Approximation.” Journal of Theoretical and Applied Information Technology. 2015. 81(2), pp. 343-348,.
A. A. Ukasha, "A New Method for Contour Approximation Using Basic Ramer Idea," World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, vol. 5, pp. 33-38, 2011.
A. A. U. A. B. Abdurrhman, "New Method for Contour Extraction & Compression using Ramer Algorithm & Wavelet Transform," in 6th European Computing Conference 2012, Advances in Computer Science, 2012, pp. 210-215.
Majdi Farag Mohammed El Bireki, M. F. L. Abdullah, Ali Abdrhman M. Ukasha and Ali A. Elrowayati. “Digital Image Watermarking Based on Joint (DCT-DWT) and Arnold Transform.” International Journal of Security and Its Applications. 2016. 10(5). pp.107-118. DOI: https://doi.org/10.14257/ijsia.2016.10.5.10
Jagadeesh, B., Kumar, P. R. and Reddy, P. C. Fuzzy Inference System Based Robust Digital Image Watermarking Technique Using Discrete Cosine Transform. Procedia Computer Science. 2015. 46: 1618-1625. DOI: https://doi.org/10.1016/j.procs.2015.02.095
Jagadeesh, B., Jaganmohan, P. and AppalaRaju, M. HVS based Robust Image Watermarking in DCT Domain using Neural Networks. International Journal of New Trends in Electronics and Communication (IJNTEC). 2013. 1(2): 5-9.
Ukasha, A. A. An Efficient Spatial Domain Methods & Wavelet Transform for Contour Compression. International Conference on Artificial Intelligence and Image Processing (ICAIIP). (UAE).2012.pp.225-229.
Downloads
Published
Conference Proceedings Volume
Section
License
Copyright (c) 2021 مجدي فرج البريكي، علي عبد الرحمن عكاشة ، جمال علي دوفان ، محمد فايز عبد الله

This work is licensed under a Creative Commons Attribution 4.0 International License.