Home   >   CSC-OpenAccess Library   >    Manuscript Information
A New Wavelet based Digital Watermarking Method for Authenticated Mobile Signals
B. Eswara Reddy, P. Harini, S. Maruthu Perumal, V. VijayaKumar
Pages - 13 - 24     |    Revised - 31-03-2011     |    Published - 04-04-2011
Volume - 5   Issue - 1    |    Publication Date - March / April 2011  Table of Contents
MORE INFORMATION
KEYWORDS
Mobile Network, Wavelet Transform, Even-Odd Method, Statistical Measures
ABSTRACT
The mobile network security is becoming more important as the number of data being exchanged on the internet increases. The growing possibilities of modern mobile computing environment are potentially more vulnerable to attacks. As a result, confidentiality and data integrity becomes one of the most important problems facing Mobile IP (MIP). To address these issues, the present paper proposes a new Wavelet based watermarking scheme that hides the mobile signals and messages in the transmission. The proposed method uses the successive even and odd values of a neighborhood to insert the authenticated signals or digital watermark (DW). That is the digital watermark information is not inserted in the adjacent column and row position of a neighborhood. The proposed method resolves the ambiguity between successive even odd gray values using LSB method. This makes the present method as more simple but difficult to break, which is an essential parameter for any mobile signals and messages. To test the efficacy of the proposed DW method, various statistical measures are evaluated, which indicates high robustness, imperceptibility, un-ambiguity, confidentiality and integrity of the present method.
CITED BY (6)  
1 Kekre, H. B., Sarode, T., & Natu, S. (2015). performance analysis of watermarking using svd and column/row hybrid wavelet transform of dct with walsh, haar and dkt. International Journal of Advances in Engineering & Technology, 8(1), 1985.
2 Kekre, H. B., Sarode, T., & Natu, S. (2014). Robust Watermarking Technique using Hybrid Wavelet Transform Generated from Kekre Transform and Discrete Cosine Transform. International Journal of Scientific and Research Publications, 4(2).
3 Kekre, H. B., & Natu, S. (2014). Performance Comparison of Watermarking by Sorting and Without Sorting the Hybrid Wavelet Transforms Generated from Sinusoidal and Non-sinusoidal Orthogonal Transforms. International Journal of Signal Processing, Image Processing and Pattern Recognition, 7(6), 163-182.
4 Kekre, H. B., Sarode, T., & Natu, S. Performance Analysis of Watermarking using Kronecker Product of Orthogonal Transforms and Wavelet Transforms.
5 Kekre, D. H., Sarode, D. T., & Natu, S. (2013). Robust watermarking using Walsh wavelets and SVD. International Journal of Advances in Science and Technology, 6(4), 8-23.
6 RoslineNesakumari, G., Vijayakumar, V., & Reddy, B. R. (2013). Generation of An Efficient Digital Watermark Key Based on Honey Comb Polynomial Interpolation Approach. International Journal of Computer Network and Information Security (IJCNIS), 5(3), 47.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 iSEEK 
5 Socol@r  
6 Scribd 
7 WorldCat 
8 SlideShare 
9 PdfSR 
A. Shamir, “Method and Apparatus for Protecting Visual Information With Printed Cryptographic Watermarks,” U.S. Patent 5488664, Jan. 1996.
Adrian Leung, Yingli Sheng, Haitham Cruickshank, “The security challenges for mobile ubiquitous services,” Information security technical report, Elsevier, Vol. 12, pp.162 – 171,2007.
Antonini, M., Barlaud, M., Mathieu, P., Daubechies, I., 1992. Image coding using wavelet transform. IEEE Trans. Image Process. 1 (2), 205–220.
Cox, J. Kilian, F. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, vol. 6, pp. 1673–1687, Dec. 1997.
Daubechies Ingrid “Ten Lectures on Wavelets,” Society for Industrial and Applied Mathematics, 1992.
Daubechies Ingrid., 1992. Ten Lectures on Wavelets. Rutgers University and AT&T Laboratories.
F. Mintzer, G. Braudaway, and M. Yeung, “Effective and ineffective image watermarks,”In Proceedings of the IEEE ICIP’97, pp. 9-12, 1997.
G. Braudaway, “Results of attacks on a claimed robust digital image watermark,” In Proceedings of the IS&T/SPIE Symposium onOptical Security and Counterfeit Deterrence Techniques, SPIE, pp. 122-131, 1998.
G. Braudaway, K. Magerlein, and F. Mintzer, “Color Correct Digital Watermarking of Images,” U.S. Patent 5 530 759, June 25, 1996.
H. Gladney, F. Mintzer, and F. Schiattarella, “Safeguarding digital library contents and users: Digital images of treasured antiquities,” DLIB Mag., 1997;
Houng.Jyh Wang and c.c, Jay Kuo, “Image protection via watermarking on perceptually significant wavelet coefficient”, IEEE 1998 workshop on multimedia signal processing,Redondo Beach, CA, Dec, 7-9,1998.
J. Brassil, S. Low, N. Maxemchuk, and L. O’Gorman, “Electronic Marking and Identification Techniques to Discourage Document Copying,” IEEE J. Select. Areas Commun., Vol. 13,pp.1495-1504, Oct. 1995.
J. Zhao and Fraunhofer Inst. For Computer Graphics (1996). [Online]. Available WWW:http://www.igd.fhg.de/~zhao/zhao.html.
J. Zhao, and E. Koch, “Embedding Robust Labels into Images for Copyright Protection,”Proceedings of the KnowRight’95 conference, pp. 242 – 251, 1995.
Jaideva C. Goswami and Andrew K. Chan “Fundamentals of Wavelets Theory, Algorithms,and Applications,” A wiley- Interscience Publications.
L. Boney, A.H. Tewfik, and K.N. Hamdy, “Digital Watermarks for Audio Signals,”Proceedings of MULITMEDIA’96, pp. 473- 480, 1996.
M. Swanson, B. Zhu, A.H. Tewfik, and L. Boney, “Robust Audio Watermarking using Perceptual Masking,” Signal Processing, (66), pp. 337-355, 1998.
M. Swanson, B. Zhu, A.H. Tewfik, “Object-based Transparent Video Watermarking,”Proceedings 1997 IEEE Multimedia Signal Processing Workshop, pp. 369-374, 1997.
M. Swanson, B. Zhu, and A.H. Tewfik, “Data Hiding for Video in Video,” Proceedings of the IEEE International Conference on Image Processing 1997, Vol. II, pp. 676-679, 1997.
M. Swanson, B. Zhu, and A.H. Tewfik, “Multiresolution Video Watermarking using Perceptual Models and Scene Segmentation,” Proceedings of the IEEE International Conference on Image Processing 1997, Vol. II, pp. 558-561, 1997.
Michael W. Frazier “An Introduction to Wavelets through Linear Algebra,” Replika Press Pvt Ltd, Delhi, India, 1999.
N. Maxemchuk, “Electronic Document Distribution,” AT&T Tech. J., pp. 73-80, Sept. 1994.
N. Nikolaidis and I. Pitas, “Copy right Protection of images using robust digital signatures”, in proceeding , IEEE International Conferences on Acoustics, Speech and signal processing ,Vol.4, May 1996,pp. 2168-2171.
Nievergelt Yves “Wavelets Made Easy,” R.R. Honnelley and Sons, Harrisonburg, USA,1999.
P. Vogel, “System For Altering Elements of a Text File to Mark Documents,” U.S. Patent 5338 194, Feb. 7, 1995.
Pankaj N. Topiwala “Wavelet Image and Video Compression”, Kluwer Academic Publishers,1998.
Prasad L. and Iyengar S.S. “Wavelet analysis with applications to image processing,” CRC press LLC, Florida, USA, 1997.
Rafael C. Gonzalez and Richard E. Woods “Digital Image Processing,” 2nd ed., Pearson Education (Singapore) Pte. Ltd, Indian Branch, 2003.
Raghuveer M. Rao and Ajit S. Bopardikar “Wavelet Transforms-Introduction to Theory and Applications,” Pearson Education, Published by Dorling Kindersley (India) Pvt. Ltd, 2006.
Ravik. Sharma, and SteveDecker,” Practical Challenges for Digital Watermarking Applications”, Proc. IEEE,2001.
S. Low, N. Maxemchuk, J. Brassil, and L. O’Gorman, “Document Marking and Identification Using Both Line and Word Shifting,” In Proc. Infocom’95, 1995. (Available WWW:http://www.research.att/com:80/lateinfo/projects/ecom.html.)
S.Craver, N. Memon, B.L and M.M Yeung “Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implication”, IEEE Journal on selected Areas in communications. Vol.16 Issue:4, May 1998, pp 573-586.
S.Katzenbeisser and F.A.P. Petitcolas, Information Hiding Techniques for steganography and Digital Watermarking. Norwood,MA: Artech House,2000.
Soman K.P. and Ramachandran K.I. “Insight into wavelets from theory to practice,” PrenticeHall of India Pvt. Limited, 2004.
Soman K.P. and Ramachandran K.I. “Insight into wavelets from theory to practice,” Second Edition, Prentice-Hall of India Pvt. Limited, 2006.
Soman K.P., Ramachandran K.I., “Insight into Wavelets from theory to practice,” Prentice Hall of India Pvt. Limited, 2004.
SysCoP, http://www.mediasec.com/products/products.html.
Associate Professor B. Eswara Reddy
- India
eswarcsejntu@gmail.com
Professor P. Harini
- India
Professor S. Maruthu Perumal
- India
Dr. V. VijayaKumar
- India


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS