Title :
Comparative analysis of digital watermarking scheme using enhanced playfair cipher in DCT & DWT
Author :
Pradhan, Chittaranjan ; Kabi, Kunal Kumar ; Saha, Bidyut Jyoti ; Arun
Author_Institution :
Sch. of Comput. Eng., KIIT Univ., Bhubaneswar, India
Abstract :
During past few decades, communication over internet increased to transfer digital data across worldwide. The development of communication media over untrusted network bring lot of challenges for the developers. The algorithms and techniques should be robust, complex, and secure as well as ease of use and implementation in order to secure digital content over from potential risk and threats. In this paper, we have compared new encryption techniques as a preprocessing step for digital watermarking in Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) using the basics of playfair cipher. The proposed preprocessing step is implemented in different transform domain techniques to find the robust and secure way to embed ownership details in a cover media. The watermark image is encrypted using modified playfair cipher to form encrypted image which is further hidden in host media using DCT and DWT. The comparisons between different approaches are analyzed with the encrypted watermark information. The results and analysis show the robustness and security of these algorithms.
Keywords :
Internet; cryptography; discrete cosine transforms; discrete wavelet transforms; trusted computing; watermarking; DCT; DWT; communication media; communication over Internet; comparative analysis; digital content; digital data across; digital watermarking scheme; discrete cosine transform; discrete wavelet transform; encrypted image; encrypted watermark information; encryption techniques; enhanced playfair cipher; transform domain techniques; untrusted network; watermark image; Ciphers; Discrete cosine transforms; Discrete wavelet transforms; Encryption; Robustness; Watermarking; Decryption; Digital Watermarking; Discrete Cosine Transform (DCT); Discrete Wavelet Transform (DWT); Embedding; Encryption; Extraction; Key Generation; Playfair;
Conference_Titel :
Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on
Conference_Location :
Hefei
Print_ISBN :
978-1-4799-2695-4
DOI :
10.1109/ICCCNT.2014.6963114