• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Nov 09, 2017 News!Vol.9, No.5 has been published with online version. 16 peer reviewed articles from 11 specific areas are published in this issue.   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2010 Vol.2(3): 338-344 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2010.V2.164

An Adaptive Data Hiding Technique for Digital Image Authentication

Sarabjeet S. Bedi, Shekhar Verma and Geetam Tomar
Abstract—The proposed scheme combines the advantages of cryptographic concept and imperceptibility feature of digital image watermarking in spatial domain. The watermark is first generated based on one-way hash function with the help of user key. Each bit of this new generated watermark is then embedded into respective blocks of the original image, in raster scan order. The embedding is performed by modifying the average value of pixel intensity of each block within a range specified by the contrast value for a given block. This reduces the effects of the modification as perceived by the human eye. The extraction procedure computes and compares the sum of the pixels values for the blocks of the original and watermarked image. The results demonstrates the robustness of scheme against common image processing operations like cropping, modification, low pass filter, median pass filter, scaled down and lossy JPEG compression with various quality index factor. Results also illustrate that the watermark is secure, recoverable and recognizable even after the watermarked image has been tampered, forged and modified by common image processing operations. The comparative study of proposed scheme with existing scheme has also been performed to observe the strength of the scheme.

Index Terms—Digital Watermarking (DWM), Joint Photographic Expert Group (JPEG), Message Digest (MD), One-way Hash, Spatial Domain.

First author, Sarbjit Singh Bedi is with department of Computer Science and Engineering, M.J.P. Rohelkhand University, Bareilly-243006, India. (e-mail: erbedi@ yahoo.com).
Second author, Shekhar Verma is with Department of Computer Science and Engineering, Indian Institute of Information Technology, Allahabad 211011, India. (e-mail: sv.iiitm@gmail.com).
Third author, Geetam Singh Tomar was with Vikrant Institute of Technology & management, Indore India. Now He is with Malwa Institute of Technology & Management, Gwalior, India as Principal and Machine Intelligence Research Laboratories, India Section, Gwalior, 474011 India. (e-mail: gstomar@ieee.org).

[PDF]

Cite: Sarabjeet S. Bedi, Shekhar Verma and Geetam Tomar, "An Adaptive Data Hiding Technique for Digital Image Authentication," International Journal of Computer Theory and Engineering vol. 2, no. 3, pp. 338-344, 2010.
Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com