Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Intelligent hybrid watermarking ancient-document wavelet packet decomposition-singular value decomposition-based schema

The ancient documents represent one of the author's history pillars that preserve the historical events for the next generation. Many digitisation projects have been launched to preserve and to diffuse them to the public. However, ensuring security is a challenge since digital documents are susceptible to be hacked. Thus, watermarking the images of the documents seems to be a promising solution mainly for protect the copyright. Many watermarking algorithms have been proposed particularly in the medical field. However, no solution has been recommended for the images of ancient documents. In this study, the authors present a watermarking approach devoted to store images. Their algorithm is based on a wavelet packet decomposition, an intelligent choice of the best base carrier points by way of the singular value decomposition. In their approach, the insertion base and the carrier points of the signature are dynamic, varying from one image to another. For a better preservation of the watermark, they exploited a convolutional encoder to encode data. The results recorded in a set of images of ancient documents taken from the National Library of Tunisia and from the National Archives of Tunis have shown promising results.

References

    1. 1)
      • 2. Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: ‘Digital Watermarking and Steganography’ (Morgan Kaufmann, 2007, 2nd edn.), p. 624.
    2. 2)
      • 16. Chemak, C., Lapayre, J.C., Bouhlel, M.S.: ‘A new scheme of image watermarking based on 5/3 wavelet decomposition and turbo-code’, WSEAS Trans. Biol. Biomed, 2007, 4, (4), pp. 4552.
    3. 3)
    4. 4)
      • 17. Lévy Véhel, J., Manoury, A.: ‘Wavelet packet based digital watermarking’. Proc. Int. Conf. Pattern Recognition, 2000, vol. 3, pp. 413416.
    5. 5)
      • 14. Dhavale, S.: ‘Blind robust image adaptive watermarking for medical images with multilevel security’, Int. J. Comput. Sci. Appl., 2010, pp. 8790.
    6. 6)
    7. 7)
      • 37. Wioletta, W., Marek, R.O.: ‘Security issues on digital watermarking algorithms’, Ann. UMCS Inf., 2013, 12, (4), pp. 123139.
    8. 8)
      • 33. Lagzian, S., Soryani, M., Fathy, M.: ‘A new robust watermarking scheme based on RDWT-SVD’, Int. J. Intell. Inf. Process., 2011, 2, (1), pp. 2229.
    9. 9)
      • 20. Maatouk, M.N., Bellaj, M., Essoukri Ben Amara, N.: ‘Watermarking ancient documents schema using wavelet packets and convolutional code’. Proc. Int. Conf. Image Processing Theory, Tools and Applications, July 2010, pp. 172176.
    10. 10)
      • 34. Liang, L., Qi, S.: ‘A new SVD-DWT composite watermarking’. Proc. IEEE Int. Conf. on Signal Processing, 2006, vol. 4.
    11. 11)
    12. 12)
      • 28. Bergman, C., Davidson, J.: ‘Unitary embedding for data hiding with the SVD’. Proc. SPIE Int. Conf. Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, USA, 2005, vol. 5681, pp. 619630.
    13. 13)
      • 10. Ben Abdejlil, J., Kricha, A., Essoukri Ben Amara, N.: ‘Exploring a new wavelet in image processing’. Proc. IEEE Int. Conf. Industrial Electronics, 2008, pp.780785.
    14. 14)
    15. 15)
      • 19. Maatouk, M.N., Jedidi, O., Essoukri Ben Amara, N.: ‘Watermarking ancient documents based on wavelet packets’. Proc. SPIE Int. Conf. Document Recognition and Retrieval XVI, 2009, vol. 7247, no. 72470Y, pp. 72387247.
    16. 16)
      • 31. Sverdlov, A.: ‘Robust DCT-SVD domain image watermarking for copyright protection: embedding data in all frequencies’. Proc. Int. Conf. European Signal Processing, 2005, pp. 48.
    17. 17)
      • 12. Bas, P., Chassery, M., Macq, B.: ‘Toward a content-based watermarking scheme’, Signal Process., 2002, 19, (1), pp. 1117.
    18. 18)
      • 21. Maatouk, M.N., Kricha, A., Essoukri Ben Amara, N.: ‘Watermarking ancient documents based on the selection of the best base of wavelet packets and a convolutional ECC’, J. Comput., 2011, 3, (4), pp. 205213.
    19. 19)
    20. 20)
    21. 21)
    22. 22)
      • 22. Abrahamsen, A., Richards, D.: ‘Image compression using singular value decomposition’, Linear Algebr. Appl., 2001, pp. 114.
    23. 23)
      • 3. Mittelholzer, T.: ‘An information theoretic approach to steganography and watermarking’. Proc. Springer Int. Conf. Information Hiding, 1999 September, pp. 116.
    24. 24)
      • 6. Ganic, E., Eskiciglu, A.: ‘Secure DWT-SVD domain image watermarking: embedding data in all frequencies’. Proc. ACM Int. Conf. Multimedia and Security, September 2004, pp. 166174.
    25. 25)
    26. 26)
    27. 27)
    28. 28)
      • 11. Ghardallou, A., Kricha, A., Essoukri Ben Amara, N.: ‘Graph matching measure for document retrieval’, Int. J. Comput. Netw. Sec., 2010, 2, (5), pp. 134146.
    29. 29)
      • 15. Maitre, H., Sankur, B., Collorec, R.: ‘Relevance of watermarking in medical imaging’. Proc. Int. Conf. Information Technology Applications in Biomedicine, 2000, pp. 250255.
    30. 30)
      • 2. Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: ‘Digital Watermarking and Steganography’ (Morgan Kaufmann, 2007, 2nd edn.), p. 624.
    31. 31)
      • 23. Jiazhong, H., Minghui, D.: ‘Face recognition based on projection map and SVD method for one training image per person’. Proc. Int. Conf. Intelligent Agents, Web Technologies and Internet Commerce, November 2005, vol. 1, pp. 2024.
    32. 32)
      • 9. http://www.archives.nat.tn.
    33. 33)
      • 27. Gaurav, B., Balasubramanian, R.: ‘Robust watermarking using distributed MR-DCT and SVD’. Proc. Int. Conf. Advances in Pattern Recognition, February 2009, pp. 2124.
    34. 34)
      • 13. Lin, C., Pan, J., Liao, B.: ‘Parity modulation based watermarking resisting to cropping’. Proc. IEEE Int. Conf. Innovative Computing, Information and Control, 2007, pp. 294297.
    35. 35)
    36. 36)
    37. 37)
    38. 38)
      • 8. http://www.bnt.nat.tn.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2013.0546
Loading

Related content

content/journals/10.1049/iet-ipr.2013.0546
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address