Work place: Indira Gandhi Institute of Technology, Sarang, India
E-mail: daspranati@yahoo.co.in
Website:
Research Interests: Computer systems and computational processes, Image Compression, Image Manipulation, Image Processing
Biography
P Das, female, is an Associate Professor in the department of Electrical Engineering at Indira Gandhi Institute of Technology, Sarang an Autonomous Institute of Government of Odisha, India. She has made her M.Tech & PhD from Indian Institute of Technology, Kharagpur, India and Engineering graduation from Sambalpur University, Odisha, India. She has published number of research and conference papers in both national and international forum. Her area of research interests are Image Processing and Signal Processing.
By B P Mishra P Das H N Pratihari
DOI: https://doi.org/10.5815/ijigsp.2015.11.05, Pub. Date: 8 Oct. 2015
During the recent development in image manipulating software and vast use of Internet, it is now becomes very difficult to protect the images that are precious and need to be secured so that they will survive against several image modification attacks. This paper represents a new technique to produce robust and efficient Twin blind digital Watermarking with the use of 2-D Walsh code and Discrete Cosine transform. Authentication matching process is introduced during the extraction process to provide extra security to the Host image. Both the Watermarks are embedded into host image through Walsh Code conversion. In this technique, the Embedding and extraction of Watermark is simpler than the other transform previously used. The proposed algorithm uses the YCbCr colour elements of the colour images in DCT province with low frequency components. During the first step the Principal Watermark i.e Hand written signature is embedded through 2-D Walsh coding and then the resultant watermark i.e Biometric fingerprint is embedded to the first Watermarked image through 2-D Walsh coding. The De-watermarking is dawn by checking the Authentication through Biometric fingerprint matching method. The technique is accessed by analyzing various performance parameters like SSIM, PSNR and NC. Further, the evaluation is made through various attacks by using StirMark tool. It was observed from the result that, by utilizing 2-D Walsh coding technique, better robustness is maintained and the proposed technique survived against various attacks such as JPEG compression, median, noise etc.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals