Please use this identifier to cite or link to this item:
Title: Some studies on data hiding using watermarking for authentication and security
Researcher: Kurshid Jinna S
Guide(s): Ganesan, L.
Keywords: Data hiding, watermarking, authentication, security, Laplacian, Bit plane coding
Upload Date: 28-Nov-2013
University: Anna University
Completed Date: 
Abstract: The proposed work addresses authentication by watermarking for security of digital images with no loss and minimum distortion constraints. The proposed algorithms enhance the signal quality and embedding capacity. In this context, three new algorithms which embed watermark information in the cover image have been proposed. They can perform tamper detection and authentication as well as information hiding. All the three algorithms are implemented in frequency domain using integer wavelets. The first algorithm embeds data into a cover signal while inherently preserving the statistics of the image to some extent. The method is not reversible but is simple. The algorithm is neighbor correlation method which embeds watermark as bytes directly into the cover image as opposed to the existing bit oriented schemes. The second algorithm makes use of the bit planes of the image to embed the data. Bit plane coding and lossless compression method is used to create space for embedding the watermark data. Suitable headers are augmented to the watermark data for exact reconstruction of the cover image. Arithmetic coding is used for lossless compression. The third algorithm makes use of histogram shifting to embed the watermark data. Data is embedded by shifting the wavelet histograms of the image. The Laplacian distribution of the wavelet histogram is exploited in data hiding. The performances of the above algorithms are tested under the influence of noise. The noise may be unintentional or due to modification of the watermarked image by an unauthorized person. The proposed methods thoroughly analyse the embedding capacity of each algorithm for a given wavelet decomposition of the original image used for watermarking. Experiments are carried out to test all the proposed algorithms and they are successful in identifying the targeted attacks in a watermarked image while overcoming the limitations of the existing schemes. newline newline newline
Pagination: xvi, 167
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File49.68 kBAdobe PDFView/Open
02_certificates.pdf907.07 kBAdobe PDFView/Open
03_abstract.pdf12.58 kBAdobe PDFView/Open
04_acknowledgement.pdf13.37 kBAdobe PDFView/Open
05_contents.pdf33.96 kBAdobe PDFView/Open
06_chapter 1.pdf96.33 kBAdobe PDFView/Open
07_chapter 2.pdf97.75 kBAdobe PDFView/Open
08_chapter 3.pdf161.9 kBAdobe PDFView/Open
09_chapter 4.pdf2.8 MBAdobe PDFView/Open
10_chapter 5.pdf1.44 MBAdobe PDFView/Open
11_chapter 6.pdf4.08 MBAdobe PDFView/Open
12_chapter 7.pdf16.9 kBAdobe PDFView/Open
13_references.pdf56.65 kBAdobe PDFView/Open
14_publications.pdf13.78 kBAdobe PDFView/Open
15_vitae.pdf11.84 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.