Advertisement

Embedding Watermarking in Malaysia Halal Logo Using Spread Spectrum Watermarking

  • Rosmah Abd LatiffEmail author
  • Hilda A. Rahman
  • Norizan Mat Diah
  • Rose Hafsah Abd Rauf
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9429)

Abstract

Digital watermarking is a process whereby arbitrary information is encoded into an image in such way that the additional payload is imperceptible to the image observer. In the modern era, providing authenticity is becoming increasingly important as more of the world’s information is stored as readily transferable bits. Halal is an Arabic word which means lawful or permissible by Islamic laws. Halal logo is an image given by JAKIM to companies that have been issued Halal certificates. The companies need to produce the logo on their product packages and it is optional to display the halal logo on their websites. However, the Halal logo in the digital form used is not specific to one company and they can simply copy and alter it from other sources. Hence this matter causes the confusion on ensuring the authenticity of the Halal logo displayed on the websites of companies. Thus, a prototype applying watermarking using spread spectrum technique is developed to ensure authenticity of the Halal logo. This prototype has successfully embeds the watermark in the Halal logo image and several tests were done to ensure the system is working. Comparisons between texts files, images, sizes and histograms are conducted. In conclusion, by applying watermarking in Halal logo, the authenticity of it is assured and it is hoped to discourage and probably prevent people or companies to claim their product as Halal without receiving the Halal certification.

Keywords

Digital watermarking Halal logo Spread spectrum watermarking 

References

  1. 1.
    Halal Certificate Information from Malaysia. http://www.halal.gov.my
  2. 2.
    Zainal, A.J.: Personal communication. Director of Halal Hub, Halal Industry Development Corporation (HDC) Department of Audit and Certification, G Floor, Block 2200, Enterprise Building 3, Persiaran APEC, 63000 Cyberjaya, Selangor Darul Ehsan, Malaysia (2008)Google Scholar
  3. 3.
    Todorov, T.: Spread spectrum watermarking technique for information system securing. Int. J. Inf. Theor. Appl. 11, 405–408 (2004)Google Scholar
  4. 4.
    Katz, I.: A survey of digital watermarking techniques. PSYCH221 Projects (2006)Google Scholar
  5. 5.
    Saxena, V., Gupta, J.P.: Collusion attack resistant watermarking scheme for colored images using DCT. Int. J. Comput. Sci. 34, 2 (2007)Google Scholar
  6. 6.
    Cox, I.J., Miller, M., Bloom, J.: Digital Watermarking: Principle and Practice. Morgan Kaufmann, San Francisco (2002)Google Scholar
  7. 7.
    Podilchuck, C.I., Delp, E.J.: Digital watermarking: algorithms applications. IEEE Sig. Process. Mag. 18, 33–46 (2001)CrossRefGoogle Scholar
  8. 8.
    Hartung, F., Su, K.J., Girod, B.: Spread spectrum watermarking: malicious attacks and counterattacks. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents, San Jose, CA, pp. 147–158 (1999)Google Scholar
  9. 9.
    Cabeen, K., Gen, P.: Image compression and the discreet cosine transform. In: Student Project in Linear Algebra. College of the Redwoods, Eureka (1998)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Rosmah Abd Latiff
    • 1
    Email author
  • Hilda A. Rahman
    • 1
  • Norizan Mat Diah
    • 1
  • Rose Hafsah Abd Rauf
    • 1
  1. 1.Faculty of Computer and Mathematical ScienceUniversiti Teknologi MaraShah AlamMalaysia

Personalised recommendations