Implementation of Embedding and Extracting Watermarking

1
Dr. Kareem Mohammed Jubor
Dr. Kareem Mohammed Jubor
1 Thiqar university-Iraq

Send Message

To: Author

GJCST Volume 12 Issue F14

Article Fingerprint

ReserarchID

CSTGV9M42J

Implementation of Embedding and Extracting Watermarking Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

In this paper, we used an image with a gray scale (256 bits) and bmp type. An image can be converted into binary file by using one of filters (Sober, Prewitt, and Robert) to find edges of the original image. Then we input the watermark to prove the authentic and password that used as a key for ciphering the information. This information will embed by using the Vigenere system that will store the cipher information in the edge of the image. As a result invisible watermark is not noticeable to viewer and without any degrade the quality of the content. The product invisible watermark is robust against distortions processes and resistant to intentional tampering solely intended to remove the watermark. Only the person who know the password and watermark and the cipher system, can read the information, we use a visual basic 6.0 program to implement this work.

10 Cites in Articles

References

  1. M Shen,L Sun (1999). A method For Digital Image Watermarking Using ICA.
  2. S Katzenbeisser (2000). Information Hiding Techniques for Steganography and Digital Watermarking.
  3. J Neil,D Zoran,J Sushil (2001). Information Hiding Steganography and Watermarking.
  4. Homer (1972). Iliad.
  5. D Elizabeth (1983). Cryptography and data security.
  6. Ph Scott E Umbaugh Computer Vision and Image Processing.
  7. Eugene Lin,Christine Podilchuk,Edward Delp Iii (1995). <title>Detection of image alterations using semifragile watermarks</title>.
  8. F Jiri (1998). Application of Data Hiding in Digital Image.
  9. J Fridrich (2000). Image watermarking for tamper detection.
  10. Hal Berghel (1997). Watermarking Cyberspace.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Dr. Kareem Mohammed Jubor. 2012. \u201cImplementation of Embedding and Extracting Watermarking\u201d. Global Journal of Computer Science and Technology - F: Graphics & Vision GJCST-F Volume 12 (GJCST Volume 12 Issue F14): .

Download Citation

Issue Cover
GJCST Volume 12 Issue F14
Pg. 11- 14
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
Not Found
Version of record

v1.2

Issue date

November 24, 2012

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 9871
Total Downloads: 2639
2026 Trends
Research Identity (RIN)
Related Research

Published Article

In this paper, we used an image with a gray scale (256 bits) and bmp type. An image can be converted into binary file by using one of filters (Sober, Prewitt, and Robert) to find edges of the original image. Then we input the watermark to prove the authentic and password that used as a key for ciphering the information. This information will embed by using the Vigenere system that will store the cipher information in the edge of the image. As a result invisible watermark is not noticeable to viewer and without any degrade the quality of the content. The product invisible watermark is robust against distortions processes and resistant to intentional tampering solely intended to remove the watermark. Only the person who know the password and watermark and the cipher system, can read the information, we use a visual basic 6.0 program to implement this work.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Implementation of Embedding and Extracting Watermarking

Dr. Kareem Mohammed Jubor
Dr. Kareem Mohammed Jubor Thiqar university-Iraq

Research Journals