Cart (Loading....) | Create Account
Close category search window
 

A New Introduction towards Invisible Image Watermarking on Color Image

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Das, S. ; Dept. of Comput. Applic., Techno India, Kolkata ; Bandyopadhyay, P. ; Paul, S. ; Ray, A.S.
more authors

Easy availability of internet, together with relatively inexpensive digital recording and storage peripherals has created an era where duplication, unauthorized use and maldistribution of digital content has become easier. To prevent unauthorized use, misappropriation, misrepresentation; authentication of multimedia contents achieved a broad attention in recent days. In this regard we've already introduced a technique for invisible image watermarking for color image authentication. In this paper we propose a method for embedding color watermark image to color host image in a more efficient manner. We introduce a new arena of embedding color watermark image to different positions of color host image in this paper. The host image is simply divided into some blocks so that as per our proposed technique we are able to embed watermark at LSB of all such blocks. and perceptually it is entirely invisible to human visual system. In proposed watermarking framework, it allows a user with an appropriate secret key and a hash function to verify the authencity, integrity and ownership of an image. If the user performs the watermark extraction with an incorrect key and inappropriate hash function, the user obtains an image that resembles noise. So that authencity will not be preserved even if a single pixel of the image is changed. This embedding method is beneficial to us at the watermark extraction end. We are using blind extraction method. At the time of extraction the watermark can easily be resolved combining LSB from different blocks of the watermarked image.

Published in:

Advance Computing Conference, 2009. IACC 2009. IEEE International

Date of Conference:

6-7 March 2009

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.