Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking

Authors

  • Habib Izadkhah University of Tabriz, Tabriz, Iran.
  • ramin meshkabadi ahar branch, Islamic Azad University
Abstract:

Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibility with perfectly tamper detection zone. In this article, innovative image has been divided into blocks and the main pixel is chosen for watermark insertion, where the embedding/extraction operate in the spatial domain. Based on the experimental results, the imperceptibility and robustness of our watermarking approach are proven and showing perfectly the detection of the image.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Multimedia asymmetric watermarking and encryption

An asymmetric watermarking algorithm is presented, involving a private key for embedding and a public key for detection, joint with a suitable encryption scheme, thus achieving a double security level for digital data protection. A commutative scheme is designed based on linear algebra and on a secret random permutation, allowing both to cipher watermarked data and to mark encrypted data withou...

full text

Watermarking for Multimedia Security Using Complex Wavelets

This paper investigates the application of complex wavelet transforms to the field of digital data hiding. Complex wavelets offer improved directional selectivity and shift invariance over their discretely sampled counterparts allowing for better adaptation of watermark distortions to the host media. Two methods of deriving visual models for the watermarking system are adapted to the complex wa...

full text

An Efficient Approach of Sensitive Area Watermarking with Encryption Security

Recently in the field of watermarking there are lots of facilities in communication, transmission and changes of data or information. There are lot of digital watermarking techniques have been made and implemented to stop the illegal use of the digital multimedia images or data. Robust and reversible watermarking technique is one of them. In this paper, we propose a reversible visible watermark...

full text

A New Approach for Information Security using Asymmetric Encryption and Watermarking Technique

Rapid growth of internet and networked information systems has contributed a lot in the increase of multimedia contents. As digital contents are increasing day by day on internet it has raised requirement for the effective protection of multimedia assets (images, audios, videos). This paper proposes a new approach to protect the multimedia contents using image watermarking, asymmetric encryptio...

full text

A Dual Security Approach for Medical Images using Encryption and Watermarking Optimized by Differential Evolution Algorithm

Cryptography and watermarking combination appears as a good promising tool in regard to medical image security and management. In this paper a dual security approach of watermarking and encryption is proposed along with a Multi-objective function for medical image watermarking to ensure that the watermark maintains its structural integrity along with robustness and imperceptibility. Differentia...

full text

Multimedia Security: Watermarking Techniques

A recent proliferation and success of the Internet, together with availability of relatively inexpensive digital recording and storage devices has created an environment in which it became very easy to obtain, replicate and distribute digital content without any loss in quality. This has become a great concern to the multimedia content (music, video, and image) publishing industries, because te...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 6  issue 24

pages  57- 63

publication date 2018-03-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023