SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Short Paper
                                                           ACEEE Int. J. on Information Technology, Vol. 3, No. 1, March 2013



    Self Attested Images for Secured Transactions using
                      Superior SOM
                                   Asst. Prof. N. Chenthalir Indra1, Prof. Dr. E. Ramaraj2,
                               1
                               S.T. Hindu College/Computer Science Department, Nagercoil, India
                  2
                      Alagappa University/Department of computer Science and Engineering, Karaikudi, India
                                    Email:1 ncigk@rediffmail.com,2 eramaraj@rediffmail.com

Abstract—Separate digital signals are usually used as the              watermarked image is an essential part of communication. In
digital watermarks. But this paper proposes rebuffed                   this system the vital image is transferred in open with its self
untrained minute values of vital image as a digital watermark,         signature. The actual image, which is to be transferred from
since no host image is needed to hide the vital image for its
                                                                       one end to other end, is known as vital image. At the other
safety. The vital images can be transformed with the self
attestation. Superior Self Organized Maps is used to derive
                                                                       end this signature value is tested for the authorization. Hence
self signature from the vital image. This analysis work                the vital image referred to in this scheme is host image. The
constructs framework with Superior Self Organizing Maps                self signature value, which is generated from the same image
(SSOM) against Counter Propagation Network for watermark               by using the Superior Self Organizing Maps (SSOM), is called
generation and detection. The required features like                   as digital watermark value. For embedding, the Discrete
robustness, imperceptibility and security was analyzed to prove        Wavelet Transform (DWT) is used. For this process SSOM
that which neural network is appropriate for mining watermark          is the significant algorithm. This is proved by comparing the
from the host image. SSOM network is proved as an efficient            system with CPN based similar framework.
neural trainer for the proposed watermarking technique. The
                                                                           This paper proposes SSOM Neural Network for
paper presents one more contribution to the watermarking
                                                                       watermarking. Section III describes the SSOM. Watermark
area.
                                                                       value generation from host color image and the watermark
Index Terms— Superior Self Organizing Maps, Counter                    extraction from watermarked image are done here by SSOM.
Propagation Network, mining, watermarking, embedding, host             Generation and detection processes are presented in section
image, vital image.                                                    IV. The same framework of watermark generation and detection
                                                                       are done with both CPN and SSOM and the robustness,
                         I. INTRODUCTION                               imperceptibility and security of watermark is analyzed in
                                                                       section V.
    Digital watermarking is the process of embedding
information into a digital signal in a way that is difficult to
                                                                             II. REVIEW ON EXISTING NEURAL NETWORK BASED
remove. The information to be embedded is called a digital
                                                                                            WATERMARKING
watermark. The signal where the watermark is to be embedded
is called the host signal. In embedding, an algorithm accepts              In the paper [11], neural network was used to learn the
the host and the data to be embedded and produces a                    relationship between the embedded watermark and the
watermarked signal. A watermarking system is usually divided           watermarked image. The relationship learnt by the neural
into three distinct steps, embedding, attack and detection.            network is then used as a digital signature in the extraction
Embedding signal produces watermarked signal,                          process. In [9], a technique presents the method of deciding
modifications on these signal by any intruders are called              watermarking strength in DCT domain using artificial neural
attacks.                                                               network.
    Neural algorithm in watermarking research is common                    A BPN model is used to learn the relationship between
today. But the early methods used Neural Network logics for            the watermark and the watermarked image [7]. Zhang [6]
finding and maximizing the strength of watermark, embedding            proposed a blind watermarking algorithm using Hopfield
and detecting processes. The following section II states the           neural network and then analyzed the watermarking capacity
references for the existing contribution of neural networks in         based on the neural network. Chang [4] presented a specific
watermarking. Common algorithms used for watermarking are              designed FCPN for digital image watermarking. Different from
Counter Propagation Network (CPN), Back Propagation                    the traditional methods, the watermark was embedded in the
Network (BPN), Hopfield Neural Network and Radial Base                 synapses of the FCNN instead of the cover image. [1]
Function network (RBF). The major role was done by Full                Proposed a new blind watermarking scheme in which a
Counter Propagation Network (FCPN) and Back Propagation                watermark was embedded into the DWT domain. It also
Network.The proposed system gives new dimension to the                 utilized RBF Neural network to learn the characteristic of the
watermarking field. Existing techniques use host image (cover          image, using which, the watermark would be embedded and
image) to hide the authorized image for further secured                extracted. The embedding scheme resulted in a good quality
transformation. Here maintaining the robustness of the                 watermarked image.Yi [10] proposed a novel digital
embedded image is more important. In this analysis the                 watermarking scheme basedon improved BPN for color images
© 2013 ACEEE                                                      37
DOI: 01.IJIT.3.1.1023
Short Paper
                                                                 ACEEE Int. J. on Information Technology, Vol. 3, No. 1, March 2013


The watermark was embedded into the discrete wavelet                     Step5: For units j within a specified neighborhood of
domain of the original image and extracted by training the               J and for all i, W ij ( new )  W ij ( old )   X i  W ij ( old ) 
BPN which learnt the characteristics of the image. Huang                     Step6: The learning rate is updated.
[12] proposed a novel watermarking technique based on image                  Step7: The Radius of topological is reduced at specified
features and neural networks. Here, the Arnold transform is              times
used to increase the security of watermark. The BPN is applied               Step8: The condition is verified. Condition is based on
to improve its imperceptibility and robustness. C.-Y. Chang              the size of the input.
et al. [5] used a FCNN for copyright protection where the                    SSOM exactly imitates human neural learning logic. Hence
ownership information was embedded and detected by a                     trivial imbalanced values can be identified through the
specific FCNN.                                                           analysis. These insignificant map elements in SSOM network
    The above mentioned papers exhibit the neural networks               is determined and used as watermark values.
contribution in the field of watermarking. Most of the systems
used CPN, BPN and RBF algorithms. However this paper                     B. Discrete Wavelet Transformation
makes an attempt with SSOM, not for embedding and                            For embedding process the scheme uses Discrete Wavelet
detention of watermark as in the early techniques, but for               Transformation (DWT). The first DWT was invented by the
watermark value generation and detection.                                Hungarian mathematician Alfred Haar. For an input
                                                                         represented by a list of 2n numbers, the Haar wavelet
                       III. REQUIRED TECHNIQUES                          transform may be considered to simply pair up input values,
    The scheme proposed in this extension research process               storing the difference and passing the sum. This process is
uses SSOM as its main algorithm. SSOM is an unsupervised                 repeated recursively, pairing up the sums to provide the next
competitive learner, which is used for mining process. Mining            scale: finally resulting in 2n “ 1 differences and one final sum.
means extracting useful information from the existing data.              The wavelet transform decomposes input image into four
SSOM’s learning capacity is very high than the traditional               components namely LL, HL, LH and HH. The lowest resolution
Kohonen Self Organizing Maps (KSOM), which uses the                      level LL consists of the approximation part of the original
Euclidean distance as its winner selector. More over the                 image. The remaining three resolution levels consist of the
FCPN in the early papers which has proved its efficiency is              detail parts and give the vertical high (LH), horizontal high
used KSOM training in its first phase and second phase uses              (HL) and high (HH) frequencies. For one level decomposition,
Gross berg’s logic. The first phase plays an important role in           the discrete two-dimensional wavelet transform of the image
FCPN procedure.SSOM proved its efficiency against                        function f(x,y) can be written as
traditional KSOM in the early papers [2] [3]. Hence the                      LL     f x. y  *   x   y 2 n , 2 m n , m  z          2

improvised Superior SOM is the best choice for this process.
No neural process was used for digital watermark making.                     LH      f  x. y  *   x   y 2 n ,2 m n , m  z
                                                                                                                                                 2

Early methods used neural networks for finding and
maximizing strength of watermark, watermark embedding and                    HL      f x . y  *   x   y 2 n , 2 m  n , m  z   2


detection processes. Where as this paper applies SSOM for                    HH   f  x. y  *  x   y 2 n,2 m  n , m  z 2
                                                                                                        
watermark signal making from host image and watermark
detection from transformed watermarked image.                                Where  t  is a low pass scaling function and  t  is
                                                                         the associated band pass wavelet function. In the proposed
A. Superior SOM
                                                                         technique, embedding and extraction of watermark takes place
    Step0: Weights are initialized with random method or by              in the high frequency component. For a one level
having previous knowledge of pattern distribution.                       decomposition, the discrete two-dimensional wavelet
Topological neighborhood parameters are set. Learning rate               transform of the image function f(x, y) is found in [8] [13].
(0.6 to 1) parameter is set.                                             DWT transform based watermarking scheme is robust against
    Step1: The steps 2 – 8 are repeated by testing the                   many common image attacks. The analysis results proved
condition.                                                               robustness very well.
    Step2: For each input vector x, do steps 3– 5
    Step3: For each j , compute d  j  by using any one of the          C. Counter Propagation Network
following distance measures Eqns.(1) or (2).                                 The Counter Propagation Network is a hybrid network.
    a) Manhattan Distance:                                               This section explains its algorithm because the same is used
                            M
                                                                         to compare the strength of the proposed system. CPN is a
    d   x   , y                x   i      y   i       (1)           neural network model developed by Robert Hecht-Nielsen
                            i1                                          [14]. There is an input layer, a hidden layer (called the Kohonen
   b) Lee distance:                                                      layer) and an output layer called the Grossberg layer. The
                     M                                                   network is fully feed forward connected. Training takes place
    d m x , y      x
                     i 1
                            i    y i , q  xi  y i      (2)           in two stages.
                                                                             Stage 1:
   Step4: Index J is found such that d ( j) is a minimum.

© 2013 ACEEE                                                        38
DOI: 01.IJIT.3.1. 1023
Short Paper
                                                           ACEEE Int. J. on Information Technology, Vol. 3, No. 1, March 2013


 First, the Kohonen layer is trained in an unsupervised          3) The resultant 3-D image values are stored using .jpg format.
manner.                                                           (compressed watermarked host image is ready for
 This trains the processing elements in the layer to             transmission).
differentiate between different input vectors.
                                                                  E. Watermark Detection and Separation:
Stage 2:
 The second phase trains the Grossberg layer in a supervised         Projected watermarking proposal is capable of mine
manner.                                                           watermark information in the absence of the original image or
 This trains the Grossberg layer to associate an output vector   secret key. Hence it is unsighted watermarking.
with each recognised input vector.                                1) One level DWT is triggered to the destination image and
 Once trained, the network will output an appropriate output     the embedded watermark is taken away from the HH sub band.
vector for any given input vector.                                2) Watermark from the transferred image is regenerated by
                                                                  using SSOM neural logic as mentioned in the generation
            IV. PROPOSED WATERMARKING SCHEME                      algorithm.
                                                                      Quality of transferred watermarked image is analyzed by
The following algorithm presents overall structure of the         using PSNR measure given in Eqn. (3).
proposed technique.                                                                                       2
                                                                                                   255       
A. Preprocessing the Image:                                           PSNR       10 log     10   
                                                                                                   MSE       
                                                                                                                            (3)
                                                                                                             
1) The input images are collected. The host image is selected         Where, MSE is Mean Squared Error between original
for watermarking. Read its RGB values (3-D) as X  x, y , z      image and watermarked image. Similarity ratio between the
2) Its Red, Green and Blue color attributes are extracted in      host image and watermarked image is calculated by using
separate 2-D spaces Xr (x,y), Xg(x,y) and Xb(x,y)                 Jaccard similarity measure given in the Eqn. (4). The similarity
respectively.                                                     ratio (SR) is 1 for the exactly same images and 0 for the entirely
                                                                  different images. This paper accepts the range from 0.8 to 1
B. Water Mark Value Mining:                                       as the best validity of similarity ratio.
1) The SSOM network is set with three layers. (Input, three                                         k
hidden and output with two dimensional space matrix).
                                                                  simxi , w j  
                                                                                                         x w jh
                                                                                                    h 1 ih
2) Its weight vectors are initialized with integer numbers by                        k     2        k     2        k           (4)
using any existing auto random number generator function.                               x
                                                                                     h 1 ih
                                                                                                      w  h1 xih w jh
                                                                                                    h 1 jh
Red, green and blue related SOM weight vectors are Wr(x,y),
Wg(x,y) and Wb(x,y) respectively (random numbers between                     V. ANALYSIS ON SSOM WATERMARKING
0 and 255 integer values).
3) Learning rate a is initialized as 0.8 (this threshold value        The framework was constructed to conduct analysis on
may vary between 0.5 and 1.0).                                    proposed watermarking scheme with both the networks,
4) Red, Green and Blue feature 2-D matrix values are supplied     Superior Self Organizing Maps (SSOM) and Counter
to the input layer of SOM network. The network is trained by      propagation Network (CPN). The results of watermarking
using the feasible measures given in the SSOM. SSOM uses          using SSOM were compared with the same results with CPN.
Manhattan measure in the Eqn. (1) or Lee distance Eqn. (2)        Every aspect of watermarking features such as robustness,
instead of Euclidian distance                                     imperceptibility and security was analyzed. The host image
5) Trained RGB attributes are obtained in the output layer.       was selected and given as input to the watermark value mining
6) The difference between input values and trained values of      process. The RGB feature values are extracted and three sets
each color are found. The resultant values are accepted as        of 2-D matrix values are constructed according to the image
digital watermark values. Thus this process brings out three      pattern. These RGB 2-D plane are trained by SSOM algorithm
sets of digital watermarks.                                       with its authenticated initial settings. The trained network
                                                                  weight vectors are compared with host image color pixel
C. Embedding Watermark:                                           values Minute significant values are identified as digital
1) 1-level DWT is activated to original image’s red vectors.      watermark. The digital watermark is embedded by using single
2) The red attribute watermark is embedded in the high            level DWT.
frequency component HH of DWT.                                        The Table I shows the quality of watermarked image.
3) Inverse wavelet transform is executed to obtain the            Superior SOM based watermark embedding yields reasonable
watermarked red features.                                         PSNR value and high-quality SR value. Whereas CPN based
4) The above three steps are repeated for other two green         watermark embedding gives away lower PSNR & SR values
and blue colors too.                                              than the SSOM. No techniques can guess these water mark
                                                                  values because the SOM is unsupervised learner and
D. Watermarked Image Accumulation:
                                                                  moreover the experiment uses random numbers to initialize
1) The watermarked 2-D space values of each color are             the weight vector of hidden layer. Results were analyzed with
collected.                                                        two modes one by Counter Propagation Network (CPN) and
2) They are combined together into 3-D space data type.
© 2013 ACEEE                                            39
DOI: 01.IJIT.3.1. 1023
Short Paper
                                                               ACEEE Int. J. on Information Technology, Vol. 3, No. 1, March 2013


                                                                         with CPN. But with Superior SOM the watermarked image is
                                                                         impeccable, which is given in the Fig. 1 (d). The watermark
                                                                         values mined from host image is given in the Fig. 1 (a) & (b).
                                                                         The CPN based watermark value is of its high RGB range (1
                                                                         to 255). While the SSOM generated digital watermark range
                                                                         is very small (0 to 4.5). Embedding lower values produces
                                                                         imperceptible watermarking. If the digital value is high the
                                                                         visual degradation is unavoidable. Fig. 1 (a) & (b) x-axis
                                                                         denotes image size (128 x 128). Y-axis gives RGB value range
                                                                         from 1 to 255.The robustness of the watermark is verified
                                                                         through the watermark detection process. At the destination
                                                                         side transferred watermarked image was collected and
                (a) SSOM mined watermark value                           detection technique was applied to separate the watermark
                                                                         value from the image. No supporting keys are needed to
                                                                         regenerate watermark because the SSOM is a self organizing
                                                                         network. It regenerates the watermark value with its own
                                                                         training process.
                                                                             TABLE II. SIMILARITY BETWEEN D IGITAL WATERMARK AND DETECTED
                                                                                                      WATERMARK




                 (b) CPN mined watermark value




                                                                             The detected watermark value is compared with the origi-
                                                                         nal watermark value by PSNR and SR calculations and the
                                                                         results are tabulated in the Table II. SSOM based watermark
                                                                         is robust. Even after the noise attack SSOM can detect the
                                                                         watermark values with acceptable PSNR & SR values. The
                         (c) Input Image                                 CPN based watermark detector fails to find the good quality
                                                                         watermark even with image, which is not attacked by any
                                                                         sources. Its SR is very low. SSOM based watermark detector
                                                                         produces first-rate PSNR and SR values. The Fig. 2 clearly
                                                                         displays that the SSOM robustness is higher than the CPN
                                                                         based watermarking. If the CPN is used the watermark detec-
                                                                         tion process fails to retrieve good quality watermark signal.
                                                                         On the other hand SSOM retrieves the watermark after the
                                                                         malicious attacks. But the strength of attack degrades the
   (d) SSOM-Watermarked                 (e) CPN– Watermarked             watermark’s similarity ratio to optimum level.Security based
 Fig. 1. (a)&(b)Digital Watermark Values (c) Host Image (d) & (e)        analysis results are put on show in the Table III. Watermark
                    Watermark embedded image                             was detected and removed from the transferred image. Then
other with proposed Superior SOM.Fig. 1(e) is the evidence               the watermark removed image was compared with the autho-
for the watermark embedded image which is visually degraded              rized image at the destination node by calculating PSNR and
                                                                         SR. The watermarked transferred image with no attack pro-
           TABLE I. TYPE SIZES FOR CAMERA-R EADY PAPERS
                                                                         duces real quality image with high level PSNR and SR values.
                                                                         Specifically its similarity ratio is very accurate (SR=1). If the
                                                                         mistreat of the watermarked image was handled while trans-
                                                                         ferring the image, the real image with ‘1’ as its SR value can
                                                                         not be produced. Thus the proposed system promises the
                                                                         authorization confirmation.
© 2013 ACEEE                                                        40
DOI: 01.IJIT.3.1. 1023
Short Paper
                                                                ACEEE Int. J. on Information Technology, Vol. 3, No. 1, March 2013

                                                                                 and RBF Neural Network for Digital Image”, ICNC 2006,Part
                                                                                 1, LNCS 4221, pp. 493-496, 2006.
                                                                           [2] Chenthalir Indra N, Dr. E. Ramaraj: “Magnitude of Self
                                                                                 Systematizing Resemblance Measures in Knowledge Mining”:
                                                                                 In Software Technology and Engineering Proceedings of the
                                                                                 International Conference on ICSTE 2009,pp.239-
                                                                                 43,DOINo:10.1142/97889814289986_0044, World Scientific
                                                                                 Publications.
                                                                           [3] Chenthalir Indra N and Dr. E. Ramaraj, “Similar - Dissimilar
                                                                                 Victor Measure Analysis to Improve Image Knowledge
                                                                                 Discovery Capacity of SOM “.: In International Conference
                                                                                 on Information and Communication Technologies, ICT 2010
                                                                                 Proceedings. Volume 101, Part 2, pp.389-393, DOI: 10.1007/
                                                                                 978-3-642-15766-0_61. published by Springer-Verlag.
                                                                           [4] Chuan-Yu Chang and Sheng-Jyun Su, “The Application of a
Fig. 2. Robustness Comparison between CPN and SSOM watermark                     Full Counterpropagation Neural Network to Image
                      with various attacks                                       Watermarking”, 2005.
 TABLE III. RECEIVED IMAGE QUALITY AFTER T HE REMOVAL O F WATERMARK        [5] Chuan-Yu Cahng, Hung-Jen Wang, Sheng-Jyun Su, “Copyright
                                                                                 authentication for images with a full ounterpropagation neural
                                                                                 network”, Expert Systems with Applications 37, 2010.
                                                                           [6] Fan Zhang, Hongbin Zhang, “Applications of Neural Network
                                                                                 to Watermarking Capacity”, International Symposium on
                                                                                 Communications and Information Technologies, October 26-
                                                                                 29, 2004.
                                                                           [7] Jun Zhang, Nenchao Wang, Feng Xiong, “Hiding a Logo
                                                                                 Watermark into the Multiwavelet Domain using Neural
                                                                                 Networks”, In the Proceedings of the 14th IEEE International
                                                                                 Conference on Tools with Artificial Intelligence, 2002.
                                                                           [8] Kumar, S., Raman, B., Thakur, M.: “Real Coded Genetic
                                                                                 Algorithm based Stereo image Watermarking”. In: IJSDIA
                                                                                 1(1),pp.23–33 (2009).
                          CONCLUSIONS                                      [9] Mei Shi-chun, Li Ren-hou, Dang Hong-mei, Wang Yunkuan,
                                                                                 “Decision of Image Watermarking strength based on Artificial
In the existing watermarking techniques neural algorithms                        Neural Networks”, In the Proceedings of the 9th International
are used to embed watermark image in the host image. In this                     Conference on Neural Information Processing, Vol. 5, 2002.
proposed system no separate host image is used. The vital                   [10] Qianhui Yi and Ke Wang, “An Improved Watermarking method
image which is to be transferred is used as host image too.                      based on Neural Network for Color Image”, In the Proceedings
Since the self signature is unique for each image, watermark                     of the 2009 IEEE International Conference on Mechatronics
value regeneration is only possible from the original image.                     and Automation, August 9-12, 2009.
                                                                           [11] Pao-Ta Yu, Hung-Hsu Tsai, Jyh-Shyan Lin, “ Digital
So the proposed image transformation endorses that no one
                                                                                 watermarking based on neural networks for color images”,
can claim otherwise for the image. If the malicious attack is                    Signal Processing, pp 663-671, 2001.
happened during the transformation, the attacked image can                 [12] Song Huang, Wei Zhang, “Digital Watermarking based on
be identified with confirmation test at the destination side.                    Neural Network and Image Features”, 2nd International
The image with similarity ratio ‘1’ can not be got back from                     Conference on Information and Computing Science, 2009.
the watermarked image if it is attacked.                                   [13] S.S. Sujatha and M. Mohamed Sathik “Feature Based
                                                                                 Watermarking Algorithm by Adopting Arnold Transform” ICT
                           REFERENCES                                            2010, CCIS 101, pp. 78–82, 2010. © Springer-Verlag Berlin
                                                                                 Heidelberg 2010.
[1] Cheng-Ri Piao, Suenghwa Beack, Dong-Min Woo and Seung-                 [14] Valluru B. Rao and Hayagriva V.Rao “Neural Networks &
    Soo Han, “A Blind Watermarking Algorithm based on HVS                        FuzzyLogic”, ISBN 81-7029-694-3. BPB Publications. Second
                                                                                 edition.




© 2013 ACEEE                                                          41
DOI: 01.IJIT.3.1. 1023

Weitere ähnliche Inhalte

Was ist angesagt?

Real Time Localization Using Receiver Signal Strength Indicator
Real Time Localization Using Receiver Signal Strength IndicatorReal Time Localization Using Receiver Signal Strength Indicator
Real Time Localization Using Receiver Signal Strength IndicatorRana Basheer
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
 
International Journal for Research in Applied Science & Engineering
International Journal for Research in Applied Science & EngineeringInternational Journal for Research in Applied Science & Engineering
International Journal for Research in Applied Science & Engineeringpriyanka singh
 
Paper id 24201422
Paper id 24201422Paper id 24201422
Paper id 24201422IJRAT
 
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESijiert bestjournal
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...gerogepatton
 
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...IDES Editor
 
FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...
FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...
FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...TELKOMNIKA JOURNAL
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithmeSAT Journals
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithmeSAT Publishing House
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...ijma
 

Was ist angesagt? (19)

Real Time Localization Using Receiver Signal Strength Indicator
Real Time Localization Using Receiver Signal Strength IndicatorReal Time Localization Using Receiver Signal Strength Indicator
Real Time Localization Using Receiver Signal Strength Indicator
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
 
International Journal for Research in Applied Science & Engineering
International Journal for Research in Applied Science & EngineeringInternational Journal for Research in Applied Science & Engineering
International Journal for Research in Applied Science & Engineering
 
Paper id 24201422
Paper id 24201422Paper id 24201422
Paper id 24201422
 
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
kanimozhi2019.pdf
kanimozhi2019.pdfkanimozhi2019.pdf
kanimozhi2019.pdf
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
92 97
92 9792 97
92 97
 
14 vikram kumar_150-159
14 vikram kumar_150-15914 vikram kumar_150-159
14 vikram kumar_150-159
 
1674 1677
1674 16771674 1677
1674 1677
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
 
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
 
FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...
FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...
FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithm
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithm
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
I017535359
I017535359I017535359
I017535359
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
 

Ähnlich wie Self Attested Images for Secured Transactions using Superior SOM

DETECTION AND EXTRACTION OF SEA MINE FEATURES USING CNN ARCHITECTURE
DETECTION AND EXTRACTION OF SEA MINE FEATURES USING CNN ARCHITECTUREDETECTION AND EXTRACTION OF SEA MINE FEATURES USING CNN ARCHITECTURE
DETECTION AND EXTRACTION OF SEA MINE FEATURES USING CNN ARCHITECTUREIRJET Journal
 
Attention correlated appearance and motion feature followed temporal learning...
Attention correlated appearance and motion feature followed temporal learning...Attention correlated appearance and motion feature followed temporal learning...
Attention correlated appearance and motion feature followed temporal learning...IJECEIAES
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
 
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...IRJET Journal
 
Machine learning based augmented reality for improved learning application th...
Machine learning based augmented reality for improved learning application th...Machine learning based augmented reality for improved learning application th...
Machine learning based augmented reality for improved learning application th...IJECEIAES
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
 
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...IDES Editor
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
 
A Literature Survey: Neural Networks for object detection
A Literature Survey: Neural Networks for object detectionA Literature Survey: Neural Networks for object detection
A Literature Survey: Neural Networks for object detectionvivatechijri
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
 
Robust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkRobust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkShamika Ganesan
 

Ähnlich wie Self Attested Images for Secured Transactions using Superior SOM (20)

Matlab 2013 14 papers astract
Matlab 2013 14 papers astractMatlab 2013 14 papers astract
Matlab 2013 14 papers astract
 
DETECTION AND EXTRACTION OF SEA MINE FEATURES USING CNN ARCHITECTURE
DETECTION AND EXTRACTION OF SEA MINE FEATURES USING CNN ARCHITECTUREDETECTION AND EXTRACTION OF SEA MINE FEATURES USING CNN ARCHITECTURE
DETECTION AND EXTRACTION OF SEA MINE FEATURES USING CNN ARCHITECTURE
 
Attention correlated appearance and motion feature followed temporal learning...
Attention correlated appearance and motion feature followed temporal learning...Attention correlated appearance and motion feature followed temporal learning...
Attention correlated appearance and motion feature followed temporal learning...
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
 
Machine learning based augmented reality for improved learning application th...
Machine learning based augmented reality for improved learning application th...Machine learning based augmented reality for improved learning application th...
Machine learning based augmented reality for improved learning application th...
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
1820 1824
1820 18241820 1824
1820 1824
 
1820 1824
1820 18241820 1824
1820 1824
 
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
 
A Literature Survey: Neural Networks for object detection
A Literature Survey: Neural Networks for object detectionA Literature Survey: Neural Networks for object detection
A Literature Survey: Neural Networks for object detection
 
92 97
92 9792 97
92 97
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
 
dwm
dwmdwm
dwm
 
E035425030
E035425030E035425030
E035425030
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
Robust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkRobust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention Network
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Kürzlich hochgeladen

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Kürzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Self Attested Images for Secured Transactions using Superior SOM

  • 1. Short Paper ACEEE Int. J. on Information Technology, Vol. 3, No. 1, March 2013 Self Attested Images for Secured Transactions using Superior SOM Asst. Prof. N. Chenthalir Indra1, Prof. Dr. E. Ramaraj2, 1 S.T. Hindu College/Computer Science Department, Nagercoil, India 2 Alagappa University/Department of computer Science and Engineering, Karaikudi, India Email:1 ncigk@rediffmail.com,2 eramaraj@rediffmail.com Abstract—Separate digital signals are usually used as the watermarked image is an essential part of communication. In digital watermarks. But this paper proposes rebuffed this system the vital image is transferred in open with its self untrained minute values of vital image as a digital watermark, signature. The actual image, which is to be transferred from since no host image is needed to hide the vital image for its one end to other end, is known as vital image. At the other safety. The vital images can be transformed with the self attestation. Superior Self Organized Maps is used to derive end this signature value is tested for the authorization. Hence self signature from the vital image. This analysis work the vital image referred to in this scheme is host image. The constructs framework with Superior Self Organizing Maps self signature value, which is generated from the same image (SSOM) against Counter Propagation Network for watermark by using the Superior Self Organizing Maps (SSOM), is called generation and detection. The required features like as digital watermark value. For embedding, the Discrete robustness, imperceptibility and security was analyzed to prove Wavelet Transform (DWT) is used. For this process SSOM that which neural network is appropriate for mining watermark is the significant algorithm. This is proved by comparing the from the host image. SSOM network is proved as an efficient system with CPN based similar framework. neural trainer for the proposed watermarking technique. The This paper proposes SSOM Neural Network for paper presents one more contribution to the watermarking watermarking. Section III describes the SSOM. Watermark area. value generation from host color image and the watermark Index Terms— Superior Self Organizing Maps, Counter extraction from watermarked image are done here by SSOM. Propagation Network, mining, watermarking, embedding, host Generation and detection processes are presented in section image, vital image. IV. The same framework of watermark generation and detection are done with both CPN and SSOM and the robustness, I. INTRODUCTION imperceptibility and security of watermark is analyzed in section V. Digital watermarking is the process of embedding information into a digital signal in a way that is difficult to II. REVIEW ON EXISTING NEURAL NETWORK BASED remove. The information to be embedded is called a digital WATERMARKING watermark. The signal where the watermark is to be embedded is called the host signal. In embedding, an algorithm accepts In the paper [11], neural network was used to learn the the host and the data to be embedded and produces a relationship between the embedded watermark and the watermarked signal. A watermarking system is usually divided watermarked image. The relationship learnt by the neural into three distinct steps, embedding, attack and detection. network is then used as a digital signature in the extraction Embedding signal produces watermarked signal, process. In [9], a technique presents the method of deciding modifications on these signal by any intruders are called watermarking strength in DCT domain using artificial neural attacks. network. Neural algorithm in watermarking research is common A BPN model is used to learn the relationship between today. But the early methods used Neural Network logics for the watermark and the watermarked image [7]. Zhang [6] finding and maximizing the strength of watermark, embedding proposed a blind watermarking algorithm using Hopfield and detecting processes. The following section II states the neural network and then analyzed the watermarking capacity references for the existing contribution of neural networks in based on the neural network. Chang [4] presented a specific watermarking. Common algorithms used for watermarking are designed FCPN for digital image watermarking. Different from Counter Propagation Network (CPN), Back Propagation the traditional methods, the watermark was embedded in the Network (BPN), Hopfield Neural Network and Radial Base synapses of the FCNN instead of the cover image. [1] Function network (RBF). The major role was done by Full Proposed a new blind watermarking scheme in which a Counter Propagation Network (FCPN) and Back Propagation watermark was embedded into the DWT domain. It also Network.The proposed system gives new dimension to the utilized RBF Neural network to learn the characteristic of the watermarking field. Existing techniques use host image (cover image, using which, the watermark would be embedded and image) to hide the authorized image for further secured extracted. The embedding scheme resulted in a good quality transformation. Here maintaining the robustness of the watermarked image.Yi [10] proposed a novel digital embedded image is more important. In this analysis the watermarking scheme basedon improved BPN for color images © 2013 ACEEE 37 DOI: 01.IJIT.3.1.1023
  • 2. Short Paper ACEEE Int. J. on Information Technology, Vol. 3, No. 1, March 2013 The watermark was embedded into the discrete wavelet Step5: For units j within a specified neighborhood of domain of the original image and extracted by training the J and for all i, W ij ( new )  W ij ( old )   X i  W ij ( old )  BPN which learnt the characteristics of the image. Huang Step6: The learning rate is updated. [12] proposed a novel watermarking technique based on image Step7: The Radius of topological is reduced at specified features and neural networks. Here, the Arnold transform is times used to increase the security of watermark. The BPN is applied Step8: The condition is verified. Condition is based on to improve its imperceptibility and robustness. C.-Y. Chang the size of the input. et al. [5] used a FCNN for copyright protection where the SSOM exactly imitates human neural learning logic. Hence ownership information was embedded and detected by a trivial imbalanced values can be identified through the specific FCNN. analysis. These insignificant map elements in SSOM network The above mentioned papers exhibit the neural networks is determined and used as watermark values. contribution in the field of watermarking. Most of the systems used CPN, BPN and RBF algorithms. However this paper B. Discrete Wavelet Transformation makes an attempt with SSOM, not for embedding and For embedding process the scheme uses Discrete Wavelet detention of watermark as in the early techniques, but for Transformation (DWT). The first DWT was invented by the watermark value generation and detection. Hungarian mathematician Alfred Haar. For an input represented by a list of 2n numbers, the Haar wavelet III. REQUIRED TECHNIQUES transform may be considered to simply pair up input values, The scheme proposed in this extension research process storing the difference and passing the sum. This process is uses SSOM as its main algorithm. SSOM is an unsupervised repeated recursively, pairing up the sums to provide the next competitive learner, which is used for mining process. Mining scale: finally resulting in 2n “ 1 differences and one final sum. means extracting useful information from the existing data. The wavelet transform decomposes input image into four SSOM’s learning capacity is very high than the traditional components namely LL, HL, LH and HH. The lowest resolution Kohonen Self Organizing Maps (KSOM), which uses the level LL consists of the approximation part of the original Euclidean distance as its winner selector. More over the image. The remaining three resolution levels consist of the FCPN in the early papers which has proved its efficiency is detail parts and give the vertical high (LH), horizontal high used KSOM training in its first phase and second phase uses (HL) and high (HH) frequencies. For one level decomposition, Gross berg’s logic. The first phase plays an important role in the discrete two-dimensional wavelet transform of the image FCPN procedure.SSOM proved its efficiency against function f(x,y) can be written as traditional KSOM in the early papers [2] [3]. Hence the LL   f x. y  *   x   y 2 n , 2 m n , m  z 2 improvised Superior SOM is the best choice for this process. No neural process was used for digital watermark making. LH   f  x. y  *   x   y 2 n ,2 m n , m  z  2 Early methods used neural networks for finding and maximizing strength of watermark, watermark embedding and HL   f x . y  *   x   y 2 n , 2 m  n , m  z 2 detection processes. Where as this paper applies SSOM for HH   f  x. y  *  x   y 2 n,2 m  n , m  z 2  watermark signal making from host image and watermark detection from transformed watermarked image. Where  t  is a low pass scaling function and  t  is the associated band pass wavelet function. In the proposed A. Superior SOM technique, embedding and extraction of watermark takes place Step0: Weights are initialized with random method or by in the high frequency component. For a one level having previous knowledge of pattern distribution. decomposition, the discrete two-dimensional wavelet Topological neighborhood parameters are set. Learning rate transform of the image function f(x, y) is found in [8] [13]. (0.6 to 1) parameter is set. DWT transform based watermarking scheme is robust against Step1: The steps 2 – 8 are repeated by testing the many common image attacks. The analysis results proved condition. robustness very well. Step2: For each input vector x, do steps 3– 5 Step3: For each j , compute d  j  by using any one of the C. Counter Propagation Network following distance measures Eqns.(1) or (2). The Counter Propagation Network is a hybrid network. a) Manhattan Distance: This section explains its algorithm because the same is used M to compare the strength of the proposed system. CPN is a d x , y   x i  y i (1) neural network model developed by Robert Hecht-Nielsen i1 [14]. There is an input layer, a hidden layer (called the Kohonen b) Lee distance: layer) and an output layer called the Grossberg layer. The M network is fully feed forward connected. Training takes place d m x , y    x i 1 i  y i , q  xi  y i  (2) in two stages. Stage 1: Step4: Index J is found such that d ( j) is a minimum. © 2013 ACEEE 38 DOI: 01.IJIT.3.1. 1023
  • 3. Short Paper ACEEE Int. J. on Information Technology, Vol. 3, No. 1, March 2013  First, the Kohonen layer is trained in an unsupervised 3) The resultant 3-D image values are stored using .jpg format. manner. (compressed watermarked host image is ready for  This trains the processing elements in the layer to transmission). differentiate between different input vectors. E. Watermark Detection and Separation: Stage 2:  The second phase trains the Grossberg layer in a supervised Projected watermarking proposal is capable of mine manner. watermark information in the absence of the original image or  This trains the Grossberg layer to associate an output vector secret key. Hence it is unsighted watermarking. with each recognised input vector. 1) One level DWT is triggered to the destination image and  Once trained, the network will output an appropriate output the embedded watermark is taken away from the HH sub band. vector for any given input vector. 2) Watermark from the transferred image is regenerated by using SSOM neural logic as mentioned in the generation IV. PROPOSED WATERMARKING SCHEME algorithm. Quality of transferred watermarked image is analyzed by The following algorithm presents overall structure of the using PSNR measure given in Eqn. (3). proposed technique. 2  255  A. Preprocessing the Image: PSNR  10 log 10   MSE   (3)   1) The input images are collected. The host image is selected Where, MSE is Mean Squared Error between original for watermarking. Read its RGB values (3-D) as X  x, y , z  image and watermarked image. Similarity ratio between the 2) Its Red, Green and Blue color attributes are extracted in host image and watermarked image is calculated by using separate 2-D spaces Xr (x,y), Xg(x,y) and Xb(x,y) Jaccard similarity measure given in the Eqn. (4). The similarity respectively. ratio (SR) is 1 for the exactly same images and 0 for the entirely different images. This paper accepts the range from 0.8 to 1 B. Water Mark Value Mining: as the best validity of similarity ratio. 1) The SSOM network is set with three layers. (Input, three k hidden and output with two dimensional space matrix). simxi , w j    x w jh h 1 ih 2) Its weight vectors are initialized with integer numbers by k 2 k 2 k (4) using any existing auto random number generator function.  x h 1 ih  w  h1 xih w jh h 1 jh Red, green and blue related SOM weight vectors are Wr(x,y), Wg(x,y) and Wb(x,y) respectively (random numbers between V. ANALYSIS ON SSOM WATERMARKING 0 and 255 integer values). 3) Learning rate a is initialized as 0.8 (this threshold value The framework was constructed to conduct analysis on may vary between 0.5 and 1.0). proposed watermarking scheme with both the networks, 4) Red, Green and Blue feature 2-D matrix values are supplied Superior Self Organizing Maps (SSOM) and Counter to the input layer of SOM network. The network is trained by propagation Network (CPN). The results of watermarking using the feasible measures given in the SSOM. SSOM uses using SSOM were compared with the same results with CPN. Manhattan measure in the Eqn. (1) or Lee distance Eqn. (2) Every aspect of watermarking features such as robustness, instead of Euclidian distance imperceptibility and security was analyzed. The host image 5) Trained RGB attributes are obtained in the output layer. was selected and given as input to the watermark value mining 6) The difference between input values and trained values of process. The RGB feature values are extracted and three sets each color are found. The resultant values are accepted as of 2-D matrix values are constructed according to the image digital watermark values. Thus this process brings out three pattern. These RGB 2-D plane are trained by SSOM algorithm sets of digital watermarks. with its authenticated initial settings. The trained network weight vectors are compared with host image color pixel C. Embedding Watermark: values Minute significant values are identified as digital 1) 1-level DWT is activated to original image’s red vectors. watermark. The digital watermark is embedded by using single 2) The red attribute watermark is embedded in the high level DWT. frequency component HH of DWT. The Table I shows the quality of watermarked image. 3) Inverse wavelet transform is executed to obtain the Superior SOM based watermark embedding yields reasonable watermarked red features. PSNR value and high-quality SR value. Whereas CPN based 4) The above three steps are repeated for other two green watermark embedding gives away lower PSNR & SR values and blue colors too. than the SSOM. No techniques can guess these water mark values because the SOM is unsupervised learner and D. Watermarked Image Accumulation: moreover the experiment uses random numbers to initialize 1) The watermarked 2-D space values of each color are the weight vector of hidden layer. Results were analyzed with collected. two modes one by Counter Propagation Network (CPN) and 2) They are combined together into 3-D space data type. © 2013 ACEEE 39 DOI: 01.IJIT.3.1. 1023
  • 4. Short Paper ACEEE Int. J. on Information Technology, Vol. 3, No. 1, March 2013 with CPN. But with Superior SOM the watermarked image is impeccable, which is given in the Fig. 1 (d). The watermark values mined from host image is given in the Fig. 1 (a) & (b). The CPN based watermark value is of its high RGB range (1 to 255). While the SSOM generated digital watermark range is very small (0 to 4.5). Embedding lower values produces imperceptible watermarking. If the digital value is high the visual degradation is unavoidable. Fig. 1 (a) & (b) x-axis denotes image size (128 x 128). Y-axis gives RGB value range from 1 to 255.The robustness of the watermark is verified through the watermark detection process. At the destination side transferred watermarked image was collected and (a) SSOM mined watermark value detection technique was applied to separate the watermark value from the image. No supporting keys are needed to regenerate watermark because the SSOM is a self organizing network. It regenerates the watermark value with its own training process. TABLE II. SIMILARITY BETWEEN D IGITAL WATERMARK AND DETECTED WATERMARK (b) CPN mined watermark value The detected watermark value is compared with the origi- nal watermark value by PSNR and SR calculations and the results are tabulated in the Table II. SSOM based watermark is robust. Even after the noise attack SSOM can detect the watermark values with acceptable PSNR & SR values. The (c) Input Image CPN based watermark detector fails to find the good quality watermark even with image, which is not attacked by any sources. Its SR is very low. SSOM based watermark detector produces first-rate PSNR and SR values. The Fig. 2 clearly displays that the SSOM robustness is higher than the CPN based watermarking. If the CPN is used the watermark detec- tion process fails to retrieve good quality watermark signal. On the other hand SSOM retrieves the watermark after the malicious attacks. But the strength of attack degrades the (d) SSOM-Watermarked (e) CPN– Watermarked watermark’s similarity ratio to optimum level.Security based Fig. 1. (a)&(b)Digital Watermark Values (c) Host Image (d) & (e) analysis results are put on show in the Table III. Watermark Watermark embedded image was detected and removed from the transferred image. Then other with proposed Superior SOM.Fig. 1(e) is the evidence the watermark removed image was compared with the autho- for the watermark embedded image which is visually degraded rized image at the destination node by calculating PSNR and SR. The watermarked transferred image with no attack pro- TABLE I. TYPE SIZES FOR CAMERA-R EADY PAPERS duces real quality image with high level PSNR and SR values. Specifically its similarity ratio is very accurate (SR=1). If the mistreat of the watermarked image was handled while trans- ferring the image, the real image with ‘1’ as its SR value can not be produced. Thus the proposed system promises the authorization confirmation. © 2013 ACEEE 40 DOI: 01.IJIT.3.1. 1023
  • 5. Short Paper ACEEE Int. J. on Information Technology, Vol. 3, No. 1, March 2013 and RBF Neural Network for Digital Image”, ICNC 2006,Part 1, LNCS 4221, pp. 493-496, 2006. [2] Chenthalir Indra N, Dr. E. Ramaraj: “Magnitude of Self Systematizing Resemblance Measures in Knowledge Mining”: In Software Technology and Engineering Proceedings of the International Conference on ICSTE 2009,pp.239- 43,DOINo:10.1142/97889814289986_0044, World Scientific Publications. [3] Chenthalir Indra N and Dr. E. Ramaraj, “Similar - Dissimilar Victor Measure Analysis to Improve Image Knowledge Discovery Capacity of SOM “.: In International Conference on Information and Communication Technologies, ICT 2010 Proceedings. Volume 101, Part 2, pp.389-393, DOI: 10.1007/ 978-3-642-15766-0_61. published by Springer-Verlag. [4] Chuan-Yu Chang and Sheng-Jyun Su, “The Application of a Fig. 2. Robustness Comparison between CPN and SSOM watermark Full Counterpropagation Neural Network to Image with various attacks Watermarking”, 2005. TABLE III. RECEIVED IMAGE QUALITY AFTER T HE REMOVAL O F WATERMARK [5] Chuan-Yu Cahng, Hung-Jen Wang, Sheng-Jyun Su, “Copyright authentication for images with a full ounterpropagation neural network”, Expert Systems with Applications 37, 2010. [6] Fan Zhang, Hongbin Zhang, “Applications of Neural Network to Watermarking Capacity”, International Symposium on Communications and Information Technologies, October 26- 29, 2004. [7] Jun Zhang, Nenchao Wang, Feng Xiong, “Hiding a Logo Watermark into the Multiwavelet Domain using Neural Networks”, In the Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence, 2002. [8] Kumar, S., Raman, B., Thakur, M.: “Real Coded Genetic Algorithm based Stereo image Watermarking”. In: IJSDIA 1(1),pp.23–33 (2009). CONCLUSIONS [9] Mei Shi-chun, Li Ren-hou, Dang Hong-mei, Wang Yunkuan, “Decision of Image Watermarking strength based on Artificial In the existing watermarking techniques neural algorithms Neural Networks”, In the Proceedings of the 9th International are used to embed watermark image in the host image. In this Conference on Neural Information Processing, Vol. 5, 2002. proposed system no separate host image is used. The vital [10] Qianhui Yi and Ke Wang, “An Improved Watermarking method image which is to be transferred is used as host image too. based on Neural Network for Color Image”, In the Proceedings Since the self signature is unique for each image, watermark of the 2009 IEEE International Conference on Mechatronics value regeneration is only possible from the original image. and Automation, August 9-12, 2009. [11] Pao-Ta Yu, Hung-Hsu Tsai, Jyh-Shyan Lin, “ Digital So the proposed image transformation endorses that no one watermarking based on neural networks for color images”, can claim otherwise for the image. If the malicious attack is Signal Processing, pp 663-671, 2001. happened during the transformation, the attacked image can [12] Song Huang, Wei Zhang, “Digital Watermarking based on be identified with confirmation test at the destination side. Neural Network and Image Features”, 2nd International The image with similarity ratio ‘1’ can not be got back from Conference on Information and Computing Science, 2009. the watermarked image if it is attacked. [13] S.S. Sujatha and M. Mohamed Sathik “Feature Based Watermarking Algorithm by Adopting Arnold Transform” ICT REFERENCES 2010, CCIS 101, pp. 78–82, 2010. © Springer-Verlag Berlin Heidelberg 2010. [1] Cheng-Ri Piao, Suenghwa Beack, Dong-Min Woo and Seung- [14] Valluru B. Rao and Hayagriva V.Rao “Neural Networks & Soo Han, “A Blind Watermarking Algorithm based on HVS FuzzyLogic”, ISBN 81-7029-694-3. BPB Publications. Second edition. © 2013 ACEEE 41 DOI: 01.IJIT.3.1. 1023