DocumentCode :
2346935
Title :
Hybrid digital-embedding using invisible watermarking
Author :
Bandyopadhyay, S.K. ; Bhattacharyya, Debnath ; Das, Poulami
Author_Institution :
Dept. of Comput., Calcutta Univ., Kolkata
fYear :
2008
fDate :
3-5 June 2008
Firstpage :
1881
Lastpage :
1885
Abstract :
In this paper, we propose a technique for embedding watermark bi-color image into color image. At the source, the handwritten signature image (bi-color image) is encoded at the end of the color image. Double folded security of handwritten signature can be achieved (over the untrusted network) by; first, the starting point of encoding the image data is depended on the size of the images; second, the starting point (byte location) of bi-color image encoding in the color image is stored within a four-byte block in encoded form. This four-byte location encoding is done by public key. At the target, first, the starting point of encoding bi-color image data (location) is decoded by private key and then, second, starts extracting the encoded bi-color image data from the color image. This technique requires knowledge of the color image for the recovery of the handwritten signature image. At the receiver, the algorithm reconstructs the original handwritten signature image. We examine the proposed technique for embedding a bi-color handwritten signature image of 70 times 50 pixels size in the color host image of 512 times 512 pixels. Simulation results show very low visible distortions in the host image and algorithms provides high degree of robustness.
Keywords :
handwriting recognition; image coding; image colour analysis; image reconstruction; watermarking; bi-color image encoding; double folded security; four-byte block; handwritten signature image; hybrid digital-embedding; image reconstruction; invisible watermarking; private key; public key; watermark bi-color image; Color; Data mining; Data security; Decoding; Encoding; Image coding; Image reconstruction; Pixel; Public key; Watermarking; Data Hiding; Watermarking; public key; security and transmission; untrusted network;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Industrial Electronics and Applications, 2008. ICIEA 2008. 3rd IEEE Conference on
Conference_Location :
Singapore
Print_ISBN :
978-1-4244-1717-9
Electronic_ISBN :
978-1-4244-1718-6
Type :
conf
DOI :
10.1109/ICIEA.2008.4582846
Filename :
4582846
Link To Document :
بازگشت