Open Access   Article Go Back

Watermarking Image Depending on Mojette Transform for Hiding Information

Hewa Majeed Zangana1

Section:Research Paper, Product Type: Journal Paper
Volume-8 , Issue-1 , Page no. 8-12, Jan-2020

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v8i1.812

Online published on Jan 31, 2020

Copyright © Hewa Majeed Zangana . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Hewa Majeed Zangana, “Watermarking Image Depending on Mojette Transform for Hiding Information,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.8-12, 2020.

MLA Style Citation: Hewa Majeed Zangana "Watermarking Image Depending on Mojette Transform for Hiding Information." International Journal of Computer Sciences and Engineering 8.1 (2020): 8-12.

APA Style Citation: Hewa Majeed Zangana, (2020). Watermarking Image Depending on Mojette Transform for Hiding Information. International Journal of Computer Sciences and Engineering, 8(1), 8-12.

BibTex Style Citation:
@article{Zangana_2020,
author = {Hewa Majeed Zangana},
title = {Watermarking Image Depending on Mojette Transform for Hiding Information},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2020},
volume = {8},
Issue = {1},
month = {1},
year = {2020},
issn = {2347-2693},
pages = {8-12},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4988},
doi = {https://doi.org/10.26438/ijcse/v8i1.812}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i1.812}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4988
TI - Watermarking Image Depending on Mojette Transform for Hiding Information
T2 - International Journal of Computer Sciences and Engineering
AU - Hewa Majeed Zangana
PY - 2020
DA - 2020/01/31
PB - IJCSE, Indore, INDIA
SP - 8-12
IS - 1
VL - 8
SN - 2347-2693
ER -

VIEWS PDF XML
283 435 downloads 159 downloads
  
  
           

Abstract

This paper describes a new image watermarking method for which is suitable for both copyright protection and information hiding. The presented method is based upon the morphological mathematics properties of the Mojette Transform [1,2] and the Mojette Phantoms[3]. The main properties of the Mojette transform are briefly introduced and the concept of linked phantoms which depicts the null space of the operator is presented. In this paper the Mojette Phantoms can be used not only as the embedded watermark, but also can be used as the mark which is inscribed with some certain information, e.g. Chinese characters. Corresponding embedding and extractions of either the mark or the hidden message are then described. Finally, experimental results are presented in the last section.

Key-Words / Index Term

Mojette, Watermarking, Transform, Hiding, Image

References

[1] N. Normand, JP. Guédon, “La transformée Mojette: une représentation redondante pour l`image”, Comptes rendus Académie des sciences de Paris, theoretical computer science section, p. 124-127. January 1998.
[2] F. Autrusseau, J. V. Guedon, and Y. Bizais. Mojette cryptomarking scheme for medical images. Volume 5032, pages 958–965. SPIE, 2003.
[3] F Autrusseau, JV Guedon Image Watermarking for Copyright Protection and Data Hiding via the Mojette Transform Proceedings of SPIE, 2002
[4] J. RADON. Ober die Bestimmung von Funktio-nen durch ihre Integralwerte l¨angs gewisser Mannigfaltigkeiten. Computed Tomography, 27, 1983.
[5] F. Autrusseau, A. Saadane, D. Barba “ Psychovisual Approach for Watermarking", SPIE Electronic Imaging: Security and watermarking of multimedia contents, January 2001, San Jose, CA.
[6] M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking systems” , Proc. SPIE Electronic Imaging Security and watermarking of multimedia contents, San Jose, CA, Vol. 3657, p. 226-239, January 1999.
[7] JP. Guédon, B. Parrein, N. Normand, “Internet distributed image databases", Integrated Computer Aided Engineering, Vol.8, p. 205-214, 2001.
[8] M. Katz, “Questions of uniqueness and resolution in reconstruction from projections”, Springer Verlag, 1977.
[9] Hewa Majeed Zangana, “Watermarking System Using LSB”, IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 19, Issue 3, Ver. II, P. 75-79, (May.-June. 2017).
[10] Harshal V. Patil1, B. H. Barhate2, "A Review Paper on Data Hiding Techniques: Stegnography", International Journal of Scientific Research in Computer Science and Engineering, Vol.06, Issue.01, pp.64-67, 2018
[11] Manisha Verma, Hardeep Singh Saini, "Analysis of Various Techniques for Audio Steganography in Data Security", International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.2, pp.1-5, 2019