Nowadays digital image captured through Photoelectric Technique have undergone with malicious modifications. The proposed paper tells on a high quality recovery of digital document using absolute watermarking approach. The recoveries of lost informations are identified using bit values. Whereas the problem on recovering scaled, rotated and translated images exist still. Thus the absolute watermarking approach assures the recovery of digital images from any format of manipulations providing high quality pictures. The different sort of bits used for this purpose is classified into audit bit, carrier bit and output bit. Here the consistent feature of the original image is coded and the output bit is protected using a carrier encoder. This enables the audit bit to detect the erasure locations and retrieve the manipulated areas of the image with high quality pictures in low cost.
Published in | American Journal of Science, Engineering and Technology (Volume 2, Issue 1) |
DOI | 10.11648/j.ajset.20170201.16 |
Page(s) | 33-38 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2017. Published by Science Publishing Group |
Carrier Encoding, Tamper Proofing, SIFT, Predictive Coding, Spoofing Detection, Compression
[1] | Swaminathan, Y. Mao, and M. Wu, “Robust and secure image hashing,” IEEE Trans. Information Forensics Security, vol. 1, no. 2, pp. 215–230, Jun. 2006. |
[2] | S. Roy and Q. Sun, “Robust hash for detecting and localizing image tampering,” in Proc. IEEE Int. Conf. Image Process. (ICIP), vol. 6. Sep./Oct. 2007, pp. VI-117–VI-120. |
[3] | M. Tagliasacchi, G. Valenzise, and S. Tubaro, “Hash-based identification of sparse image tampering,” IEEE Trans. Image Process., vol. 18, no. 11, pp. 2491–2504, Nov. 2009. |
[4] | X. Zhang, Z. Qian, Y. Ren, and G. Feng, “Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 4, pp. 1223–1232, Dec. 2011. |
[5] | M. Wu and B. Liu, “Watermarking for image authentication,” in Proc. Int. Conf. Image Process. (ICIP), vol. 2. 1998, pp. 437–441. |
[6] | J. Fridrich, “Image watermarking for tamper detection,” in Proc. Int. Conf. Image Process. (ICIP), vol. 2. Oct. 1998, pp. 404–408. |
[7] | I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” NEC Res. Inst., Princeton, NJ, Tech. Rep. 95-10, 1995. |
[8] | K. C. Liu, “Colour image watermarking for tamper proofing and pattern based recovery,” IET Image Process., vol. 6, no. 5, pp. 445–454, Jul. 2012. |
[9] | J. J. K. O Ruanaidh, W. J. Dowling, and F. M. Boland, “Watermarking digital images for copyright protection,” in IEE Proc. Vision, Image and Signal Processing, Aug. 1996, vol. 143, pp. 250–256. |
[10] | J. F. Delaigle, C. De Vleeschouwer, and B. Macq, “Digital watermarking,” in Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques, Feb. 1996, vol. 2659, pp. 99–110. |
[11] | E. Koch and J. Zhao, “Toward robust and hidden image copyright labeling,” in Proc. Workshop on Nonlinear Signal and Image Processing, I. Pitas, Ed., June 1995, pp. 452–455. |
[12] | X. B. Kang and S. M. Wei, “Identifying tampered regions using singular value decomposition in digital image forensics,” in Proc. Int. Conf. Comput. Sci. Software Engg. vol. 3. Dec. 2008, pp. 926–930. |
[13] | G. Voyatzis and I. Pitas, “Applications of toral automorphisms in image watermarking,” in Proc. IEEE Int. Conf. Image Processing, 1996, vol. 2, pp. 237–240. |
[14] | D. Kundur and D. Hatzinakos, “A robust digital image watermarking method using wavelet-based fusion,” in Proc. IEEE Int. Conf. Image Processing, 1997, vol. 1, pp. 544–547. |
[15] | D. Zou, Y. Q. Shi, Z. Ni, and W. Su, “A semi-fragile lossless digital watermarking scheme based on integer wavelet transform,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 10, pp. 1294–1300, Oct. 2006. |
[16] | A. Swaminathan, M. Wu, and K. J. R. Liu, “Digital image forensics via intrinsic fingerprints,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 101–117, Mar. 2008. |
[17] | C. B. Adsumilli, M. C. Q. Farias, S. K. Mitra, and M. Carli, “A robust error concealment technique using data hiding for image and video transmission over lossy channels,” IEEE Trans. Circuits Syst. Video Technol., vol. 15, no. 11, pp. 1394–1406, Nov. 2005. |
[18] | M. Chen, Y. Zheng, and M. Wu, “Classification–based spatial error concealment for visual communications,” EURASIP J. Appl. Signal Process, vol. 2006, pp. 1–17, Jan. 2006, Art. ID 13438. |
[19] | G. Gur, Y. Altug, E. Anarim, and F. Alagoz, “Image error concealment using watermarking with sub bands for wireless channels,” IEEE Commun. Lett., vol. 11, no. 2, pp. 179–181, Feb. 2007. |
[20] | A. Yilmaz and A. A. Alatan, “Error detection and concealment for video transmission using information hiding,” Signal Process, Image Commun., vol. 23, no. 4, pp. 298–312, 2008. |
[21] | J. Fridrich and M. Goljan, “Images with self-correcting capabilities,” in Proc. Int. Conf. Image Process. (ICIP), vol. 3. 1999, pp. 792–796. |
[22] | M. Wu and B. Liu, “Data hiding in binary image for authentication and annotation,” IEEE Trans. Multimedia, vol. 6, no. 4, pp. 528–538, Aug. 2004. |
[23] | X. Zhang, S. Wang, Z. Qian, and G. Feng, “Reversible fragile watermarking for locating tampered blocks in JPEG images,” Signal Process., vol. 90, no. 12, pp. 3026–3036, 2010. |
[24] | X. Zhu, A. T. Ho, and P. Marziliano, “A new semi fragile image watermarking with robust tampering restoration using irregular sampling,” Signal Process., Image Commun., vol. 22, no. 5, pp. 515–528, 2007. |
[25] | X. Zhang and S. Wang, “Fragile watermarking with error-free restoration capability,” IEEE Trans. Multimedia, vol. 10, no. 8, pp. 1490–1499, Dec. 2008. |
[26] | Lowe, D. G. 2001. Local feature view clustering for 3D object recognition. IEEE Conference on Computer Vision and Pattern Recognition, Kauai, Hawaii, pp. 682-688. |
APA Style
A. Suresh, A. Reyana. (2017). Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach. American Journal of Science, Engineering and Technology, 2(1), 33-38. https://doi.org/10.11648/j.ajset.20170201.16
ACS Style
A. Suresh; A. Reyana. Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach. Am. J. Sci. Eng. Technol. 2017, 2(1), 33-38. doi: 10.11648/j.ajset.20170201.16
@article{10.11648/j.ajset.20170201.16, author = {A. Suresh and A. Reyana}, title = {Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach}, journal = {American Journal of Science, Engineering and Technology}, volume = {2}, number = {1}, pages = {33-38}, doi = {10.11648/j.ajset.20170201.16}, url = {https://doi.org/10.11648/j.ajset.20170201.16}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajset.20170201.16}, abstract = {Nowadays digital image captured through Photoelectric Technique have undergone with malicious modifications. The proposed paper tells on a high quality recovery of digital document using absolute watermarking approach. The recoveries of lost informations are identified using bit values. Whereas the problem on recovering scaled, rotated and translated images exist still. Thus the absolute watermarking approach assures the recovery of digital images from any format of manipulations providing high quality pictures. The different sort of bits used for this purpose is classified into audit bit, carrier bit and output bit. Here the consistent feature of the original image is coded and the output bit is protected using a carrier encoder. This enables the audit bit to detect the erasure locations and retrieve the manipulated areas of the image with high quality pictures in low cost.}, year = {2017} }
TY - JOUR T1 - Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach AU - A. Suresh AU - A. Reyana Y1 - 2017/02/13 PY - 2017 N1 - https://doi.org/10.11648/j.ajset.20170201.16 DO - 10.11648/j.ajset.20170201.16 T2 - American Journal of Science, Engineering and Technology JF - American Journal of Science, Engineering and Technology JO - American Journal of Science, Engineering and Technology SP - 33 EP - 38 PB - Science Publishing Group SN - 2578-8353 UR - https://doi.org/10.11648/j.ajset.20170201.16 AB - Nowadays digital image captured through Photoelectric Technique have undergone with malicious modifications. The proposed paper tells on a high quality recovery of digital document using absolute watermarking approach. The recoveries of lost informations are identified using bit values. Whereas the problem on recovering scaled, rotated and translated images exist still. Thus the absolute watermarking approach assures the recovery of digital images from any format of manipulations providing high quality pictures. The different sort of bits used for this purpose is classified into audit bit, carrier bit and output bit. Here the consistent feature of the original image is coded and the output bit is protected using a carrier encoder. This enables the audit bit to detect the erasure locations and retrieve the manipulated areas of the image with high quality pictures in low cost. VL - 2 IS - 1 ER -