Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Performance Evaluation of Watermarking Algorithms  
  Authors : Dr. S. Thabasu Kannan; S. Azhagu Senthil
  Cite as:

 

Now-a-days watermarking plays a pivotal role in most of the industries for providing security to their own as well as hired or leased data. This paper its main aim is to study Spatial and Fractal watermarking algorithms and also choosing the effective and efficient one for improving the resistance in data compression. In the Spatial domain method, there is no costly transforms needed to be computed for watermark embedding. The luminance values will be manipulated directly. The fractal domain is to determine a set of contractive transformation to approximate each block of the image with a larger block. The composition of all these transformations has the image as its fixed point. Starting with any image hence to apply the composition of the transformations repeatedly and get an approximation of the original image. For the implementation, we have used minimum nine coordinate positions. The watermarking algorithms to be taken for this study are Bruyn algorithm and Langelaar algorithm. In all graph, we have plotted X axis as peak signal to noise ratio (PSNR) and y axis as Correlation with original watermark. The threshold value ? is set to 5. The result is smaller than the threshold value then it is feasible, otherwise it is not.

 

Published In : IJCSN Journal Volume 4, Issue 2

Date of Publication : April 2015

Pages : 181 - 186

Figures : 09

Tables : --

Publication Link : Performance Evaluation of Watermarking Algorithms

 

 

 

Dr. S. Thabasu Kannan : has been working as Professor and Principal in Pannai College of Engineering and Technology, Sivagangai and rendered his valuable services for more than two decades in various executive positions. He has published more than 100 research level papers in various refereed International/National level journals/proceedings. He has authored for 11 text/reference books on IT domain. He has received 11 awards in appreciation of his excellence in the field of research/education. He has visited 6 countries to present his research papers/articles in various foreign universities. He has been acting as consultant for training activities for various organizations in and around Madurai. His area of interest is Big data applications for bioinformatics domain. Under his guidance 8 Ph.D scholars pursuing and more than 150 M.Phil scholars were awarded. His several research papers have been cited in various citations.

Mrs. S. Azhagu Senthil : has been working as a Lecturer in Department of Computer Science in Raja Doraisingam Govt Arts College, Sivagangai for last 11 years. Her area of interest is Computer Security exclusively with Watermarking. She is pursuing her Ph.D degree in Computer Science under the guidance of Dr. S. Thabasu Kannan. She is handling various subjects related to Computer Science for both UG and PG.

 

 

 

 

 

 

 

Watermarking

Luminance

Steganographic

Transformation

Domain

In this paper it is clearly understood that noise is unwanted thing for both text and images. This paper clearly identifies that comparatively the effective and efficient watermarking algorithm. The result displays that Bruyn watermarking algorithm is better than any other algorithm compared with Langelaar watermarking algorithm. As compared the Bruyn watermarking algorithm and Kutterwatermarking algorithm, the former its efficiency is better for some cases and the latter its effectiveness is better for some cases. The main factor which influences to get the efficiency is “environment”.

 

 

 

 

 

 

 

 

 

1) R.C.Gonzalez and R.E.Woods, "Digital Image Processing", Addison-Wesley Publishing company, Inc., 2008. 2) B.Pfitzmann, "Information Hiding Terminology", Proc. of First Int. Workshop on Information Hiding, Cambridge, UK, May30-June1, 2009, Lecture notes in Computer Science, Vol.1174, Ross Anderson(Ed.), pp.347-350. 3) F.A.P.Petitcolas, et al., "Information Hiding - A Survey", Proceedings of the IEEE, Vol.87, No.7, July 1999, pp.1062-1078. 4) Hal Berghel, "Watermarking Cyberspace", Communications of the ACM, Nov.2009, Vol.40, No.11, pp.19-24. 5) F. Mintzer, et.al., "Effective and Ineffective Digital Watermarks", IEEE Intl. Conference on Image Processing, ICIP-97, Vol.3, pp.9-12. 6) J. M. Acken, "How Watermarking Value to Digital Content?",Communications of the ACM, July 1998, Vol.41, No.7, pp.75-77. 7) I. J. Cox and M. Miller, "A Review of Watermarking and Importance of perceptual Modelling", Proc. SPIE Human Vision and Imaging, SPIE-3016, Feb 2008. 8) R.Barnett, "Digital Watermarking: application, techniques, and challengs", IEE Electronics and Communication Engineering Journal, August 1999, pp.173-183. 9) R. G. Van Schyndel, et.al., "A Digital Watermark", Proc. IEEE Intl. Conf. on Image Processing, ICIP-94, Vol.2, pp.86-90. 10) W. Bendor, et. al., "Techniques for Data Hiding", IBM Systems Journal, Vol.35, No.3 and 4, pp. 313-336, 1996. 11) E. Franz, et. al., "Computer Based Steganography", Proc. First Intl. Workshop on Information Hiding, Cambridge, UK, May 30 - June 1, 1996, Lecture notes in Computer Science, Vol.1174, Ross Anderson(Ed.). 12) F.A.P.Petitcolas, et al., "Information Hiding - A Survey", Proceedings of the IEEE, Vol.87, No.7, July 1999, pp.1062-1078. 13) J. Cox and M. Miller, "A Review of Watermarking and Importance of perceptual Modelling", Proc. SPIE Human Vision and Imaging, SPIE-3016, Feb 1997. 14) F. Mintzer, et. al., "Opportunities for Watermarking Standards", Communications of the ACM, July 1998, Vol.41, No.7, pp.57-64. 15) G.Voyatzis and I.Pitas, "The Use of Watermarks in the Protection of Digital Multimedia Products", Proceedings of the IEEE, Vol.87, No.7, July 1999, pp.1197-1207.