SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012



         Rotation Scale Invariant Semi Blind Biometric
          Watermarking Technique for Colour Image
                                Vandana Inamdar 1, Priti Rege 2, and Chandrama Thorat                  3
              1
                College of Engineering, Department of Computer Engineering and IT, Shivajinagar, Pune-5, India
                                                Email: vhj.comp@coep.ac.in
           2
             College of Engineering, Department of Electronics and telecommunication, Shivajinagar, Pune-5, India
                                                Email: ppr.extc@coep.ac.in
              3
                College of Engineering, Department of Computer Engineering and IT, Shivajinagar, Pune-5, India
                                             Email: chandrama1684@gmail.com

Abstract—This paper presents a rotation scale invariant digital          various attacks. Among all attacks, especially geometric
color image watermarking technique using Scale Invariant                 attacks are known as one of the difficult attack to survive.
Feature Transform (SIFT) which is invariant to geometric                 This is mainly due to the fact that slight geometric
transformation. The image descriptors extracted using SIFT               manipulation to the marked image desynchronizes the location
transform of original image and watermarked image are used
                                                                         of the watermark and causes incorrect watermark detection
for estimating the scaling factor and angle of rotation of
attacked image. Using estimated factors attacked image is
                                                                         [4]. Geometric variation of watermarked media can induce
then restored to its original size for synchronization purpose.          synchronization errors between the extracted watermark and
As a result of synchronization, watermark detection is done              the original watermark during the detection process. It is very
correctly. In proposed approach the offline signature, which is          difficult to cope with geometric distortions especially for
a biometric characteristics of owner is embedded in second               robust watermarking systems since these attacks break the
level detailed coefficients of discrete wavelet transform of             synchronization between the watermark and detector.
cover image. The simulation results show that the algorithm              Several approaches have been developed for synchronizing
is robust against signal processing and geometric attack.                schemes, which can be divided into following categories.

Index Terms — Biometric watermarking, Bi-Orthogonal
                                                                          Use periodic sequence to embed the watermark in a repetitive
wavelet , geometric attacks, SIFT                                        pattern, allowing the detector to estimate the performed attack
                                                                         due to altered periodicities.
                         I. INTRODUCTION                                  Use of invariant-transform to maintain synchronization
                                                                         under rotation, scaling, and translation is the second
    The rapid development of new information technologies                approach. Examples of these transforms are log-polar
has improved the ease of access to digital information. It also          mapping of DFT [8,9] and fractal transform coefficients [10],
leads to the problem of illegal copying and redistribution of            Fourier-Mellin transform, radon transform, Mexican Hat
digital media. The concept of digital watermarking came up               wavelet transform etc. Though these schemes are
while trying to solve the problems related to the management             theoretically effective but difficult to implement due to poor
of intellectual property of media. Access control or                     interpolation accuracy during log-polar and inverse log-polar
authenticity verification has been addressed by digital                  mapping.
watermarking as well as by biometric authentication [2,3].                Template based approach to embed reference template to
Recently, biometrics is adaptively merged into watermarking              assist watermark synchronization during the detection
technology to enhance the credibility of the conventional                process [11]. The template should be invisible and have low
watermarking technique. By embedding biometrics in the                   interference with the previously embedded watermarks.
host, it formulates a reliable individual identification as               Moments based watermarking schemes makes use of
biometrics possesses exclusive characteristics that can be               magnitudes of Zernike moments as they are rotation invariant.
hardly counterfeited. Hence, the conflicts related to the                Magnitudes of moments can be used as a watermark signal
intellectual property rights protection can be potentially               or be further modified to carry embedded data [3,14].
resolved [4]. Biometric watermarking is a special case of digital         Content based scheme is another solution for watermark
watermarking where the content of watermark or the host                  synchronization. Media contents represent an invariant
data (or both) are biometric entities. This imparts an additional        reference for geometric distortions so that referring to content
layer of authentication to the underlying media [3].                     can solve the problem of watermark synchronization, i.e., the
      Though novel and efficient watermarking algorithms                 location of the watermark is not related to image coordinates,
have been developed, attempts also have been made by                     but to image semantics [6].In this approach feature points
hackers to remove or destroy embedded watermark through                  are used as a content descriptor. The extracted feature of
                                                                         image content can be used for both watermark embedding
                                                                         and detection.


© 2012 ACEEE                                                        15
DOI: 01.IJSIP.03.01.80
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


Among all synchronization scheme, most promising class of                Gaussian kernel successively smooths original images with
synchronization method is feature based approach. In the                 a variable-scale and calculate the scale-space images by
proposed method Shift Invariant Feature Transform (SIFT)                 subtracting two successive smoothed images. The parameter
is used for synchronization purpose. SIFT is used to extract             is a variance, called a scale of the Gaussian function. In these
the feature points by considering local image properties and             scale space images, all local maxima and minima are retrieved
it is invariant to rotation, scaling, translation and partial            by checking the closest eight neighbors in the same scale
illumination changes [12]. Feature points, which are also called         and nine neighbors in the scales above and below. These
as keypoints are localized elements of a cover image that are            extrema determine the location (x,y) and the scale ‘S’ of the
inherently linked to that image and usually contain semantic             SIFT features, which are invariant to the scale and orientation
information. They have the property of being reasonably
                                                                         change of images.
stable and are more difficult to remove by a malicious attacker.
                                                                                              III. PROPOSED SCHEME
In this paper we propose a watermarking scheme which is
resistant to geometric and signal processing attacks for color               The proposed watermarking method embeds offline
image. Feature points of original image and watermarked image            handwritten signature of the owner which is a biometric
are used for synchronization purpose at the time of watermark            characteristic as a watermark in color image. The color image
detection. These feature points are calculated by applying               is separated into three channels red, blue and green. Red
SIFT. Geometric manipulation is estimated by matching basic              channel is used to extract feature points using SIFT and these
feature points of original image with attacked image. Offline            feature points are saved as synchronous registration
hand written signature of owner is embedded as a watermark               information which is required for watermark detection. As
in second level detailed coefficients of discrete wavelet                human eye is less sensitive to changes in blue color, we
transform of cover object. The cover image is decomposed                 prefer to embed watermark in blue channel. Feature point
using biorthogonal wavelet transform. The rationale behind               extraction channel and watermark embedding channel are
using handwritten signature as a watermark is that it is a               separated intentionally to achieve stable feature. The original
socially accepted trait for authentication purpose and closely           image is not required for watermark detection but feature
related with copyright holder.The paper is organized as                  points are used to estimate geometric distortion. Thus, it is a
follows: A brief review of SIFT is provided in section II.               semiblind algorithm. An offline hand written signature from
Section III provides the outline of the method employed and              the user is pre-processed and converted into a binary bit
the results are provided in the next section. The last section           string before embedding.
summarizes the work and future scope.                                         The proposed scheme is carried out in four phases,
                             II. SIFT                                    watermark preparation, watermark embedding phase, the
                                                                         geometric attack estimation phase, and watermark detection
      Feature points are elements of information inherently
                                                                         phase. Fig.1 shows the block diagram of proposed
linked to the content. These local invariant features are highly
                                                                         watermarking scheme.
distinctive and matched with a high probability against large
image distortions. As a result, the relative position of such a          A. WATERMARK PREPARATION
feature point remains constant after an attack and hence it is             The offline handwritten signature of the owner which is
suitable for synchronization.                                            used for authentication purpose is converted to a 1-D binary
      Though numerous techniques can be applied for feature              string through vector division with values ranging between
extraction, SIFT proposed by David Lowe [12] has proved to               0 and 1 only. This is essential as watermarking will be done
be very efficient. Even when the image is subjected to attacks           based on these two values only.
like image zoom, rotate, brightness change and affine
transform, the local features based on SIFT will not be                  B. WATERMARK EMBEDDING
changed. Considering the local image characteristics, SIFT                 Watermark embedding consists of following steps:
operator extracts features and their properties such as the              1. Separate the colour carrier image into three colour channels.
location (x,y), scale S, and orientation è. The basic idea of the        2. Calculate feature points of red channel by using SIFT and
SIFT is to extract features through a staged filtering that              save as synchronous registration information.
identifies stable points in the scale space by selecting                 3. Perform 2-level DWT using bi-orthogonal wavelet transform
candidates for features by searching for peaks in the scale              on the blue and green components of carrier image.
space. In order to extract candidate locations for features,             4. Using a private key generate the pseudorandom sequence
the scale space              is computed using Difference of             which is equal to the length of watermark.
Gaussian (DoG) function as given by equation (1).                        5. Select the LH subband of blue and green channel of
                                                                         decomposed image and generate the perceptual mask that
                                                                         selects the wavelet coefficients from these bands. This is
                                                                         based on pseudorandom sequence using private key.
                                                                         6. Embed the watermark in selected coefficients of blue
                                                                         component of the host image as based on following logic.


© 2012 ACEEE                                                        16
DOI: 01.IJSIP.03.01.80
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012




                                      Figure1. Watermark embedding and extraction scheme



i) For entire length of watermark                                   the geometric distortion by using feature points of both
ii) Compare blue channel coefficientswith green channel             original and watermarked image. For estimation of geometric
coefficients                                                        transform, we have considered the approach of [1].
iii) If Watermark bit is ‘1’
                                                                    A. SCALE ESTIMATION AND CORRECTION
iv) Set blue channel coefficient to a value higher than
corresponding green channel coefficient                                 Feature points are suitable for watermarking with implicit
v) Else if watermark bit is ‘0’                                     synchronization as those have covariance with geometric
vi) Set blue channel coefficient to a value smaller than            transformations.
corresponding green channel coefficient
vii) End if
viii) End for                                                       Where ‘m ‘ is the total number of matched feature points of
7. Reconstruct the watermarked image using inverse discrete         original image and watermarked image, ‘S’ is the scaling factor
wavelet transform                                                   of attacked watermark image,        and    are the scales of
   The offset value (OV) that is to be added or subtracted
                                                                    matched feature points of original and watermarked image.
from green channel coefficients to make corresponding blue
                                                                    Scaling correction is done by resizing the attacked
channel coefficients smaller or larger based on watermarking
                                                                    watermarked image by scale correction factor given by
bits is given by
                                                                    equation (4).


Where Avg_lum is the intensity of blue component of image,          B.   ROTATION ESTIMATION CORRECTION
m and n are the dimensions of image. Traditionally, offset
                                                                        Angle of rotation of attacked image can be calculated
value is fixed. In proposed scheme the offset is adapted
                                                                    based on orientation difference of matched feature points of
depending upon the image. This results in better PSNR than
                                                                    original and attacked image. Assuming watermarked image is
fixed offset value.                                                 rotated by an angle ‘è’, total number of matched feature points
C. GEOMETRIC ATTACK ESTIMATION                                      as ’m’, the centre angle of original image feature points as
   Feature points can be used either for watermark                  and that of corresponding matched feature point of rotated
embedding/detection or for synchronization. Our approach            image as ,the estimation of angle by which watermarked
uses SIFT feature points for synchronization.It can estimate        image is rotated can be computed as follow:

© 2012 ACEEE                                                   17
DOI: 01.IJSIP.03.01.80
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012

                                                                          TABLEI. PERCENTAGE OF ACCURACY OF ESTIMATED
                                                                                              SCALE FACTOR


The image is restored to its original shape by rotating it by
anti_rotation factor given by equation (6)


D. WATERMARK DETECTION.
     In this stage, watermarked image is checked for any
geometric distortions such as scaling, rotation or a
combination of both. Watermark detection steps are as follow:
1. Segregate the three channels of watermarked colour image
and extract the feature points of red channel using SIFT.              Standard images used for watermarking are Leena, Baboon,
2. Synchronization step:                                               Pepper, Cameraman etc, while fourteen different signatures
Compare these feature points with feature points of original           are taken as a watermark. Table I shows the actual scaling
image to estimation geometric distortion.                              factor, estimated scaling factor and percentage of accuracy.
3. Correct these geometric distortions.                                Table II shows the angle by which image is rotated, estimated
4. Apply 2 level wavelet transform using bi-orthogonal wavelet
                                                                       rotation angle and percentage of accuracy.
on blue and green channel
5. Using the private key, generate pseudorandom sequence                 TABLEII. PERCENTAGE OF ACCURACY OF ESTIMATED
equal to length of watermark which is used as perceptual                                 ROTATION ANGLE
mask.
6. Using perceptual mask identify the coefficients of blue
and green channel from LH band of second level
decomposition.
7. Watermark detection is based on following logic:
i) While length of watermark
ii) Compare blue channel coefficients with corresponding
green channel coefficients
iii) If blue channel coefficient is higher than corresponding
green channel coefficient
iv) Set watermark bit equal to one
v) Else if blue channel coefficient is smaller than
corresponding green channel coefficient
vi) Set watermark bit equal to zero
vii) End if
viii) End while
8.Reshape it to form two dimensional signature image
E. EXPERIMENTATION AND RESULTS
    The evaluation of proposed scheme is performed by
keeping in mind that the embedded watermark should be
invisible and fidelity of host image is maintained. Watermark
data size is variable depending upon the size of the signature             To verify the invisibility of embedded watermark, quality
image, however the general range is in between 60 × 30 to 120          of watermarked image, quality of extracted watermark and
× 120.                                                                 robustness of scheme against various attacks rigorous
    Apart from the perceptual quality of the watermarked               simulation testing is carried out. A sample output of original
image and recovered watermark, the quantitative metrics used           image, watermarked image along with original and recovered
to evaluate the quality of watermarked image are PSNR and              watermark is shown in Fig. 2.The average PSNR of
SNR, while that of recovered signature is Structural Similarity        watermarked image without any attack is above 40dB. SSIM
Index Measure (SSIM) [13].                                             of extracted signature from watermarked image under different
                                                                       signal processing and geometric attack is tabulated in Table
                                                                       III. The perceptual quality of extracted signature is marked
                                                                       on a scale of three as good, recognizable and poor.



© 2012 ACEEE                                                      18
DOI: 01.IJSIP.03.01. 80
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012

                                                                                      TABLE III. SUMMARY OF ATTACKS




             (a)                                (b)




             (c)                                 (d)

  Figure 2 Watermarked image along with original and recovered
                          watermark

  A sample of watermarked image which is rotated by 120
degree and extracted watermark is shown in Fig. 3.




  Figure3. Attacked watermarked image and extracted watermark

Some of the extracted signatures under different attacks are
                      shown in Fig. 4




       (a) Brightness               (b) Rotation 50 degree
                                                                                        CONCLUSION   AND   FUTURE   SCOPE

                                                                             The paper proposes a novel biometric watermarking
                                                                         technique using an amalgamation SIFT. The technique is
                                                                         highly robust against numerous geometric and signal
                                                                         processing attacks like cropping, scaling, rotation, median
        (c) Scaled twice           (d) Salt and Pepper noise             and Weiner filtering, Gaussian and salt and pepper noise,
                                                                         histogram equalization and JPEG compression.
                                                                             The fidelity of watermarked image is highly maintained as
                                                                         PSNR is above 40dB. However, survival against a combination
                                                                         of geometric attack like scaling and rotation, shearing and
                                                                         scaling is still a challenge. The current study can be extended
     (e) Cropping 40 percent          (f)   Row column copying           to develop watermarking scheme using RST invariant
                                                                         transform like Complex wavelet transform, Zernike moments
      Figure4. Extracted watermarks under different attacks              or combination of both which is resilient to complex
                                                                         geometric attacks.



© 2012 ACEEE                                                        19
DOI: 01.IJSIP.03.01.80
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


                           REFERENCES                                       M. Lui, “Rotation, scale and translation resilient public watermarking
                                                                            for images,” Proc. SPIE Security Watermarking Multimedia
[1] Wei Yan, Yihong Hu, Guochu Shou, Zongjue Qian , “The                    Contents II, vol. 3971, pp. 90–98, 2000.
Algorithm of Color Image Watermarking Based on SIFT,”                       [9] S. Pereira and T. Pun, “Robust template matching for affine
proceedings of IEEE international conference on e-Business and              resistant image watermarks,” IEEE Transaction on Image Processing,
Information Security, 22-23 May 2010                                        vol. 9, pp. 1123–119, June 2000.
[2] Cox I. Kilian , J. Leighton T.,” Secure spread spectrum                 [10] Z. Ni,E. Sung, and Y. Q. Shi, “Enhancing robustness of digital
watermarking for multimedia ,” IEEE Transaction on Image                    watermarking against geometric attack based on fractal transform,”
Processing ,vol. 6, pp.1673–1687,1997.                                      in Proceeding IEEE International Conference Multimedia Expo.,
[3] Zheng, D., Liu, Y., Zhao, J., and El Saddik, “A survey of RST           vol. 2, 2000, pp. 1033–1036
invariant image watermarking algorithms,” ACM Computing                     [11] S. Pereira and T. Pun, “Robust template matching for affine
Surveys vol. 39, no.2, Article 5 , June 2007                                resistant image watermarks,” IEEE Transaction on Image Processing,
[4] Liu Jing1 , Liu Gang, Zhang Jiulong, “Robust Image                      vol. 9, pp. 1123–1129, June 2000
Watermarking Based on SIFT Feature and Optimal Triangulation,”              [12] Lowe, D. G., “Distinctive Image Features from Scale-Invariant
2009 International Forum on Information Technology and                      Key points,” International. Journal of Computer Vision, 91-110
Applications                                                                2004.
[5] Chih-Wei Tang and Hsueh-Ming Hang, “A Feature-Based Robust              [13] Zhou Wang, Alan Bovik, Hamid Shaikh, Eero Simoncelli ,
Digital Image Watermarking Scheme ,” IEEE transaction on Signal             “Image Quality Assessment: From Error Visibility to structural
Processing, vil. 51, no. 4, April 2003                                      Similarity,” IEEE Transaction on Image Processing, vol. 13, no. 4,
[6] Hae-Yeoun Lee , Hyungshin Kim, Heung-Kyu Lee,” Robust                   April 2004
image watermarking using local invariant features ,” Optical                [14] Xiang-Yang Wang, Li-Min Hou,” A new robust digital image
Engineering 45 (3), 037002 , March 2006                                     watermarking based on pseudo-Zernike moments,” Springer
[7] M, Kutter,” Watermarking resisting to translation , rotation and        Multidimensional System and Signal Processing (2010) 21:179–
scaling,” proc. SPIE 3528, 423-431,1998                                     196 DOI10.1007/s11045-009-0.
[8] C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y.




© 2012 ACEEE                                                           20
DOI: 01.IJSIP.03.01.80

Weitere ähnliche Inhalte

Was ist angesagt?

Self Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMSelf Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMIDES Editor
 
Dc31472476
Dc31472476Dc31472476
Dc31472476IJMER
 
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...CSCJournals
 
A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...
A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...
A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...Best Jobs
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkeSAT Publishing House
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...prjpublications
 
ANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKINGANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKINGijma
 
Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943IJMER
 
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...IDES Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Robust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS BasedRobust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS BasedCSCJournals
 
Dual-layer Digital Image Watermarking for Intellectual Property Right Protection
Dual-layer Digital Image Watermarking for Intellectual Property Right ProtectionDual-layer Digital Image Watermarking for Intellectual Property Right Protection
Dual-layer Digital Image Watermarking for Intellectual Property Right ProtectionIDES Editor
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingEditor IJMTER
 

Was ist angesagt? (18)

Self Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMSelf Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOM
 
1674 1677
1674 16771674 1677
1674 1677
 
Dc31472476
Dc31472476Dc31472476
Dc31472476
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
F010413438
F010413438F010413438
F010413438
 
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
 
A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...
A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...
A Segmentation Based Sequential Pattern Matching for Efficient Video Copy Det...
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
 
ANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKINGANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKING
 
E04552327
E04552327E04552327
E04552327
 
Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943
 
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Robust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS BasedRobust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS Based
 
Dual-layer Digital Image Watermarking for Intellectual Property Right Protection
Dual-layer Digital Image Watermarking for Intellectual Property Right ProtectionDual-layer Digital Image Watermarking for Intellectual Property Right Protection
Dual-layer Digital Image Watermarking for Intellectual Property Right Protection
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 

Ähnlich wie Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colour Image

A130104
A130104A130104
A130104irjes
 
A130104
A130104A130104
A130104irjes
 
Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Usi...
Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Usi...Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Usi...
Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Usi...IOSR Journals
 
Robust content based watermarking algorithm using singular value decompositio...
Robust content based watermarking algorithm using singular value decompositio...Robust content based watermarking algorithm using singular value decompositio...
Robust content based watermarking algorithm using singular value decompositio...sipij
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
 
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...cscpconf
 
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMA SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMijfcstjournal
 
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMA SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMijfcstjournal
 
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...IRJET Journal
 
A new watermarking schme against local attacks
A new watermarking schme against local attacksA new watermarking schme against local attacks
A new watermarking schme against local attackseSAT Publishing House
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessIRJET Journal
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesEditor IJMTER
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...gerogepatton
 
IRJET- A Survey on Image Forgery Detection and Removal
IRJET-  	  A Survey on Image Forgery Detection and RemovalIRJET-  	  A Survey on Image Forgery Detection and Removal
IRJET- A Survey on Image Forgery Detection and RemovalIRJET Journal
 

Ähnlich wie Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colour Image (20)

dwm
dwmdwm
dwm
 
A130104
A130104A130104
A130104
 
A130104
A130104A130104
A130104
 
Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Usi...
Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Usi...Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Usi...
Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Usi...
 
Robust content based watermarking algorithm using singular value decompositio...
Robust content based watermarking algorithm using singular value decompositio...Robust content based watermarking algorithm using singular value decompositio...
Robust content based watermarking algorithm using singular value decompositio...
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
 
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
 
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMA SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
 
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMA SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
 
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...
 
K42016368
K42016368K42016368
K42016368
 
A new watermarking schme against local attacks
A new watermarking schme against local attacksA new watermarking schme against local attacks
A new watermarking schme against local attacks
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniques
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
 
IRJET- A Survey on Image Forgery Detection and Removal
IRJET-  	  A Survey on Image Forgery Detection and RemovalIRJET-  	  A Survey on Image Forgery Detection and Removal
IRJET- A Survey on Image Forgery Detection and Removal
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Kürzlich hochgeladen

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Kürzlich hochgeladen (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colour Image

  • 1. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colour Image Vandana Inamdar 1, Priti Rege 2, and Chandrama Thorat 3 1 College of Engineering, Department of Computer Engineering and IT, Shivajinagar, Pune-5, India Email: vhj.comp@coep.ac.in 2 College of Engineering, Department of Electronics and telecommunication, Shivajinagar, Pune-5, India Email: ppr.extc@coep.ac.in 3 College of Engineering, Department of Computer Engineering and IT, Shivajinagar, Pune-5, India Email: chandrama1684@gmail.com Abstract—This paper presents a rotation scale invariant digital various attacks. Among all attacks, especially geometric color image watermarking technique using Scale Invariant attacks are known as one of the difficult attack to survive. Feature Transform (SIFT) which is invariant to geometric This is mainly due to the fact that slight geometric transformation. The image descriptors extracted using SIFT manipulation to the marked image desynchronizes the location transform of original image and watermarked image are used of the watermark and causes incorrect watermark detection for estimating the scaling factor and angle of rotation of attacked image. Using estimated factors attacked image is [4]. Geometric variation of watermarked media can induce then restored to its original size for synchronization purpose. synchronization errors between the extracted watermark and As a result of synchronization, watermark detection is done the original watermark during the detection process. It is very correctly. In proposed approach the offline signature, which is difficult to cope with geometric distortions especially for a biometric characteristics of owner is embedded in second robust watermarking systems since these attacks break the level detailed coefficients of discrete wavelet transform of synchronization between the watermark and detector. cover image. The simulation results show that the algorithm Several approaches have been developed for synchronizing is robust against signal processing and geometric attack. schemes, which can be divided into following categories. Index Terms — Biometric watermarking, Bi-Orthogonal  Use periodic sequence to embed the watermark in a repetitive wavelet , geometric attacks, SIFT pattern, allowing the detector to estimate the performed attack due to altered periodicities. I. INTRODUCTION  Use of invariant-transform to maintain synchronization under rotation, scaling, and translation is the second The rapid development of new information technologies approach. Examples of these transforms are log-polar has improved the ease of access to digital information. It also mapping of DFT [8,9] and fractal transform coefficients [10], leads to the problem of illegal copying and redistribution of Fourier-Mellin transform, radon transform, Mexican Hat digital media. The concept of digital watermarking came up wavelet transform etc. Though these schemes are while trying to solve the problems related to the management theoretically effective but difficult to implement due to poor of intellectual property of media. Access control or interpolation accuracy during log-polar and inverse log-polar authenticity verification has been addressed by digital mapping. watermarking as well as by biometric authentication [2,3].  Template based approach to embed reference template to Recently, biometrics is adaptively merged into watermarking assist watermark synchronization during the detection technology to enhance the credibility of the conventional process [11]. The template should be invisible and have low watermarking technique. By embedding biometrics in the interference with the previously embedded watermarks. host, it formulates a reliable individual identification as  Moments based watermarking schemes makes use of biometrics possesses exclusive characteristics that can be magnitudes of Zernike moments as they are rotation invariant. hardly counterfeited. Hence, the conflicts related to the Magnitudes of moments can be used as a watermark signal intellectual property rights protection can be potentially or be further modified to carry embedded data [3,14]. resolved [4]. Biometric watermarking is a special case of digital  Content based scheme is another solution for watermark watermarking where the content of watermark or the host synchronization. Media contents represent an invariant data (or both) are biometric entities. This imparts an additional reference for geometric distortions so that referring to content layer of authentication to the underlying media [3]. can solve the problem of watermark synchronization, i.e., the Though novel and efficient watermarking algorithms location of the watermark is not related to image coordinates, have been developed, attempts also have been made by but to image semantics [6].In this approach feature points hackers to remove or destroy embedded watermark through are used as a content descriptor. The extracted feature of image content can be used for both watermark embedding and detection. © 2012 ACEEE 15 DOI: 01.IJSIP.03.01.80
  • 2. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 Among all synchronization scheme, most promising class of Gaussian kernel successively smooths original images with synchronization method is feature based approach. In the a variable-scale and calculate the scale-space images by proposed method Shift Invariant Feature Transform (SIFT) subtracting two successive smoothed images. The parameter is used for synchronization purpose. SIFT is used to extract is a variance, called a scale of the Gaussian function. In these the feature points by considering local image properties and scale space images, all local maxima and minima are retrieved it is invariant to rotation, scaling, translation and partial by checking the closest eight neighbors in the same scale illumination changes [12]. Feature points, which are also called and nine neighbors in the scales above and below. These as keypoints are localized elements of a cover image that are extrema determine the location (x,y) and the scale ‘S’ of the inherently linked to that image and usually contain semantic SIFT features, which are invariant to the scale and orientation information. They have the property of being reasonably change of images. stable and are more difficult to remove by a malicious attacker. III. PROPOSED SCHEME In this paper we propose a watermarking scheme which is resistant to geometric and signal processing attacks for color The proposed watermarking method embeds offline image. Feature points of original image and watermarked image handwritten signature of the owner which is a biometric are used for synchronization purpose at the time of watermark characteristic as a watermark in color image. The color image detection. These feature points are calculated by applying is separated into three channels red, blue and green. Red SIFT. Geometric manipulation is estimated by matching basic channel is used to extract feature points using SIFT and these feature points of original image with attacked image. Offline feature points are saved as synchronous registration hand written signature of owner is embedded as a watermark information which is required for watermark detection. As in second level detailed coefficients of discrete wavelet human eye is less sensitive to changes in blue color, we transform of cover object. The cover image is decomposed prefer to embed watermark in blue channel. Feature point using biorthogonal wavelet transform. The rationale behind extraction channel and watermark embedding channel are using handwritten signature as a watermark is that it is a separated intentionally to achieve stable feature. The original socially accepted trait for authentication purpose and closely image is not required for watermark detection but feature related with copyright holder.The paper is organized as points are used to estimate geometric distortion. Thus, it is a follows: A brief review of SIFT is provided in section II. semiblind algorithm. An offline hand written signature from Section III provides the outline of the method employed and the user is pre-processed and converted into a binary bit the results are provided in the next section. The last section string before embedding. summarizes the work and future scope. The proposed scheme is carried out in four phases, II. SIFT watermark preparation, watermark embedding phase, the geometric attack estimation phase, and watermark detection Feature points are elements of information inherently phase. Fig.1 shows the block diagram of proposed linked to the content. These local invariant features are highly watermarking scheme. distinctive and matched with a high probability against large image distortions. As a result, the relative position of such a A. WATERMARK PREPARATION feature point remains constant after an attack and hence it is The offline handwritten signature of the owner which is suitable for synchronization. used for authentication purpose is converted to a 1-D binary Though numerous techniques can be applied for feature string through vector division with values ranging between extraction, SIFT proposed by David Lowe [12] has proved to 0 and 1 only. This is essential as watermarking will be done be very efficient. Even when the image is subjected to attacks based on these two values only. like image zoom, rotate, brightness change and affine transform, the local features based on SIFT will not be B. WATERMARK EMBEDDING changed. Considering the local image characteristics, SIFT Watermark embedding consists of following steps: operator extracts features and their properties such as the 1. Separate the colour carrier image into three colour channels. location (x,y), scale S, and orientation è. The basic idea of the 2. Calculate feature points of red channel by using SIFT and SIFT is to extract features through a staged filtering that save as synchronous registration information. identifies stable points in the scale space by selecting 3. Perform 2-level DWT using bi-orthogonal wavelet transform candidates for features by searching for peaks in the scale on the blue and green components of carrier image. space. In order to extract candidate locations for features, 4. Using a private key generate the pseudorandom sequence the scale space is computed using Difference of which is equal to the length of watermark. Gaussian (DoG) function as given by equation (1). 5. Select the LH subband of blue and green channel of decomposed image and generate the perceptual mask that selects the wavelet coefficients from these bands. This is based on pseudorandom sequence using private key. 6. Embed the watermark in selected coefficients of blue component of the host image as based on following logic. © 2012 ACEEE 16 DOI: 01.IJSIP.03.01.80
  • 3. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 Figure1. Watermark embedding and extraction scheme i) For entire length of watermark the geometric distortion by using feature points of both ii) Compare blue channel coefficientswith green channel original and watermarked image. For estimation of geometric coefficients transform, we have considered the approach of [1]. iii) If Watermark bit is ‘1’ A. SCALE ESTIMATION AND CORRECTION iv) Set blue channel coefficient to a value higher than corresponding green channel coefficient Feature points are suitable for watermarking with implicit v) Else if watermark bit is ‘0’ synchronization as those have covariance with geometric vi) Set blue channel coefficient to a value smaller than transformations. corresponding green channel coefficient vii) End if viii) End for Where ‘m ‘ is the total number of matched feature points of 7. Reconstruct the watermarked image using inverse discrete original image and watermarked image, ‘S’ is the scaling factor wavelet transform of attacked watermark image, and are the scales of The offset value (OV) that is to be added or subtracted matched feature points of original and watermarked image. from green channel coefficients to make corresponding blue Scaling correction is done by resizing the attacked channel coefficients smaller or larger based on watermarking watermarked image by scale correction factor given by bits is given by equation (4). Where Avg_lum is the intensity of blue component of image, B. ROTATION ESTIMATION CORRECTION m and n are the dimensions of image. Traditionally, offset Angle of rotation of attacked image can be calculated value is fixed. In proposed scheme the offset is adapted based on orientation difference of matched feature points of depending upon the image. This results in better PSNR than original and attacked image. Assuming watermarked image is fixed offset value. rotated by an angle ‘è’, total number of matched feature points C. GEOMETRIC ATTACK ESTIMATION as ’m’, the centre angle of original image feature points as Feature points can be used either for watermark and that of corresponding matched feature point of rotated embedding/detection or for synchronization. Our approach image as ,the estimation of angle by which watermarked uses SIFT feature points for synchronization.It can estimate image is rotated can be computed as follow: © 2012 ACEEE 17 DOI: 01.IJSIP.03.01.80
  • 4. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 TABLEI. PERCENTAGE OF ACCURACY OF ESTIMATED SCALE FACTOR The image is restored to its original shape by rotating it by anti_rotation factor given by equation (6) D. WATERMARK DETECTION. In this stage, watermarked image is checked for any geometric distortions such as scaling, rotation or a combination of both. Watermark detection steps are as follow: 1. Segregate the three channels of watermarked colour image and extract the feature points of red channel using SIFT. Standard images used for watermarking are Leena, Baboon, 2. Synchronization step: Pepper, Cameraman etc, while fourteen different signatures Compare these feature points with feature points of original are taken as a watermark. Table I shows the actual scaling image to estimation geometric distortion. factor, estimated scaling factor and percentage of accuracy. 3. Correct these geometric distortions. Table II shows the angle by which image is rotated, estimated 4. Apply 2 level wavelet transform using bi-orthogonal wavelet rotation angle and percentage of accuracy. on blue and green channel 5. Using the private key, generate pseudorandom sequence TABLEII. PERCENTAGE OF ACCURACY OF ESTIMATED equal to length of watermark which is used as perceptual ROTATION ANGLE mask. 6. Using perceptual mask identify the coefficients of blue and green channel from LH band of second level decomposition. 7. Watermark detection is based on following logic: i) While length of watermark ii) Compare blue channel coefficients with corresponding green channel coefficients iii) If blue channel coefficient is higher than corresponding green channel coefficient iv) Set watermark bit equal to one v) Else if blue channel coefficient is smaller than corresponding green channel coefficient vi) Set watermark bit equal to zero vii) End if viii) End while 8.Reshape it to form two dimensional signature image E. EXPERIMENTATION AND RESULTS The evaluation of proposed scheme is performed by keeping in mind that the embedded watermark should be invisible and fidelity of host image is maintained. Watermark data size is variable depending upon the size of the signature To verify the invisibility of embedded watermark, quality image, however the general range is in between 60 × 30 to 120 of watermarked image, quality of extracted watermark and × 120. robustness of scheme against various attacks rigorous Apart from the perceptual quality of the watermarked simulation testing is carried out. A sample output of original image and recovered watermark, the quantitative metrics used image, watermarked image along with original and recovered to evaluate the quality of watermarked image are PSNR and watermark is shown in Fig. 2.The average PSNR of SNR, while that of recovered signature is Structural Similarity watermarked image without any attack is above 40dB. SSIM Index Measure (SSIM) [13]. of extracted signature from watermarked image under different signal processing and geometric attack is tabulated in Table III. The perceptual quality of extracted signature is marked on a scale of three as good, recognizable and poor. © 2012 ACEEE 18 DOI: 01.IJSIP.03.01. 80
  • 5. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 TABLE III. SUMMARY OF ATTACKS (a) (b) (c) (d) Figure 2 Watermarked image along with original and recovered watermark A sample of watermarked image which is rotated by 120 degree and extracted watermark is shown in Fig. 3. Figure3. Attacked watermarked image and extracted watermark Some of the extracted signatures under different attacks are shown in Fig. 4 (a) Brightness (b) Rotation 50 degree CONCLUSION AND FUTURE SCOPE The paper proposes a novel biometric watermarking technique using an amalgamation SIFT. The technique is highly robust against numerous geometric and signal processing attacks like cropping, scaling, rotation, median (c) Scaled twice (d) Salt and Pepper noise and Weiner filtering, Gaussian and salt and pepper noise, histogram equalization and JPEG compression. The fidelity of watermarked image is highly maintained as PSNR is above 40dB. However, survival against a combination of geometric attack like scaling and rotation, shearing and scaling is still a challenge. The current study can be extended (e) Cropping 40 percent (f) Row column copying to develop watermarking scheme using RST invariant transform like Complex wavelet transform, Zernike moments Figure4. Extracted watermarks under different attacks or combination of both which is resilient to complex geometric attacks. © 2012 ACEEE 19 DOI: 01.IJSIP.03.01.80
  • 6. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 REFERENCES M. Lui, “Rotation, scale and translation resilient public watermarking for images,” Proc. SPIE Security Watermarking Multimedia [1] Wei Yan, Yihong Hu, Guochu Shou, Zongjue Qian , “The Contents II, vol. 3971, pp. 90–98, 2000. Algorithm of Color Image Watermarking Based on SIFT,” [9] S. Pereira and T. Pun, “Robust template matching for affine proceedings of IEEE international conference on e-Business and resistant image watermarks,” IEEE Transaction on Image Processing, Information Security, 22-23 May 2010 vol. 9, pp. 1123–119, June 2000. [2] Cox I. Kilian , J. Leighton T.,” Secure spread spectrum [10] Z. Ni,E. Sung, and Y. Q. Shi, “Enhancing robustness of digital watermarking for multimedia ,” IEEE Transaction on Image watermarking against geometric attack based on fractal transform,” Processing ,vol. 6, pp.1673–1687,1997. in Proceeding IEEE International Conference Multimedia Expo., [3] Zheng, D., Liu, Y., Zhao, J., and El Saddik, “A survey of RST vol. 2, 2000, pp. 1033–1036 invariant image watermarking algorithms,” ACM Computing [11] S. Pereira and T. Pun, “Robust template matching for affine Surveys vol. 39, no.2, Article 5 , June 2007 resistant image watermarks,” IEEE Transaction on Image Processing, [4] Liu Jing1 , Liu Gang, Zhang Jiulong, “Robust Image vol. 9, pp. 1123–1129, June 2000 Watermarking Based on SIFT Feature and Optimal Triangulation,” [12] Lowe, D. G., “Distinctive Image Features from Scale-Invariant 2009 International Forum on Information Technology and Key points,” International. Journal of Computer Vision, 91-110 Applications 2004. [5] Chih-Wei Tang and Hsueh-Ming Hang, “A Feature-Based Robust [13] Zhou Wang, Alan Bovik, Hamid Shaikh, Eero Simoncelli , Digital Image Watermarking Scheme ,” IEEE transaction on Signal “Image Quality Assessment: From Error Visibility to structural Processing, vil. 51, no. 4, April 2003 Similarity,” IEEE Transaction on Image Processing, vol. 13, no. 4, [6] Hae-Yeoun Lee , Hyungshin Kim, Heung-Kyu Lee,” Robust April 2004 image watermarking using local invariant features ,” Optical [14] Xiang-Yang Wang, Li-Min Hou,” A new robust digital image Engineering 45 (3), 037002 , March 2006 watermarking based on pseudo-Zernike moments,” Springer [7] M, Kutter,” Watermarking resisting to translation , rotation and Multidimensional System and Signal Processing (2010) 21:179– scaling,” proc. SPIE 3528, 423-431,1998 196 DOI10.1007/s11045-009-0. [8] C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. © 2012 ACEEE 20 DOI: 01.IJSIP.03.01.80