One small step for a man
One Giant leap for the mankind

There is no wealth like Knowledge
                            No Poverty like Ignorance
Journal of Emerging Trends in Computing and Information Sciences Logo

Journal of Emerging Trends in Computing and Information Sciences >> Call for Papers Vol. 8 No. 3, March 2017

Journal of Emerging Trends in Computing and Information Sciences

Twofold Watermarking Technique for Enhancement of Security Issues in Grey Scale Still Image

Full Text Pdf Pdf
Author B.P.Mishra, Dr.H.N.Pratihari, Dr.P.Das
ISSN 2079-8407
On Pages 174-179
Volume No. 6
Issue No. 3
Issue Date April 1, 2015
Publishing Date April 1, 2015
Keywords Watermarking, Walsh Coding, DCT, Gray Scale image, Fingerprint, Secret Key


Security issues of gray scale still image pose a great challenge where old and traditional images are need to be secured during communication from one place to another. This paper presents a novel technique of embedding two different protection media by using one dimensional Walsh code to improve the robustness of watermarking. The proposed technique inserts two watermarking i.e. bits of binary fingerprint and Secret key in the DCT blocks of a digital gray scale still image to enhance the security issues needed to be maintained during the transformation. In the proposed method, the 1-D Walsh functions are used to encode the biometric image as first watermarking and Secret Key as second watermarking before being embedded in the host image. The application of Walsh coding is made using the horizontal one dimensional Walsh coding. By utilizing this type of coding, each row of the watermark’s vectors will be replaced by its equivalent Walsh code where they will make a queue horizontally to get the modulated signal. During the decoding process, the authorized biometric fingerprint is applied to authenticate the extraction process and the original secret key’s bits were recognized by the use of odd and even functions. The technique has been tested using several images. Furthermore, to test the robustness of the technique, the watermarked image was exposed to four types of attacks. The proposed technique retains the image quality and produces robustness against JPEG compression.

    Journal of Computing | Call for Papers (CFP) | Journal Blog | Journal of Systems and Software | ARPN Journal of Science and Technology | International Journal of Health and Medical Sciences | International Journal of Economics, Finance and Management     
© 2015 Journal of Computing