-The present paper provides a new mechanism with two stages for efficient authentication based on Honey Comb Polynomial Interpolation (HCPI) and Morphological Border Sorted Pixel Value Difference (MBSPVD) scheme. A simple polynomial interpolation technique on new hexagonal structure called Honey Comb structure (HCS) is used for generating the key of the digital watermark. The polynomial interpolation gives a high secured key, which is difficult to break. HCS is used in the present paper to select pixel positions for generating the Digital Watermark key (DWK). The significant factor of the present method is, the digital watermark is generated by using DWK. The importance of HCS representation is that it possesses special computational features that are pertinent to the vision process. The HCS has features of higher degree of circular symmetry, uniform connectivity, greater angular resolution, and which leads to reduce storage and computation in image processing operations. The DWK is placed in the image by using MBSPVD method. Its guarantees high authentication, robustness, security and copyright protection. The Lagrange Polynomial interpolation (LPI) is used for retrieving the digital watermark from the DWK. The LPI accomplish the aim of image authentication and protection without reducing the image quality. The proposed HCPI-MBSPVD is tested with various attacks and compared with various existing image authentication and copyright protection methods. The comparisons and results indicate the efficacy of the proposed method.
In contemporary years, different watermarking schemes are proposed for image authentication and copyright protection. In images, any tiny change to the content is not acceptable; the embedding distortion has to be compensated for perfectly. In this paper a powerful Image watermarking method using DWT based on integrated normalized content based chaotic (DWT-INCC) system is proposed, to obtain better digital content authentication, originality, higher embedding capacity, quality of the information and better robustness. The objective of the proposed integrated scheme is to examine how content image normalization and discrete wavelet domain based chaotic system procedure are used to enhance robustness of a digital image watermark especially for statistical attacks. The proposed integrated scheme consists of four stages. In the stage two image normalization is performed, to achieve the scaling and rotational invariance. In stage two DWT is applied on the normalized image. In stage three a block based content authentication scheme is adopted on the normalized image of stage one for image authentication and tamper localization. In stage four chaotic models is adopted on the stage three to achieve excellent robustness against any statistical attacks and to increase the security of the digital watermarking system. The experimental result shows that the proposed DWT-INCC method is more robust and effective even in the presence of various attacks when compared with many existing methods.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.