Skip to main content

Circular Quad-Octagon Bits: Stepwise Image Cubic Spread Authentication Analysis

  • Conference paper
  • First Online:
  • 905 Accesses

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 50))

Abstract

In this paper, a picture analysis technique by providing authentication to photographs is planned. In our approach, invisible watermark bits were taken in circular regular sequence in exceedingly quad-octagon patterns. Quad-octagon patterns are generating by considering thirty-two bits in at random continuation eight bit planes. In every bit plane, a regular equal quad image bits were extracted and interlinked with its beside the bit plane, quad image bits circularly, forming completely thirty-two bits. These circular pattern bits were entered stepwise in an exceedingly boxlike manner in embedded image bits. Many quad-octagon patterns were addressed in our planned technique. Recovered pictures from our technique shown higher survival technique beneath numerous attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Wong, Peter H.W., Au, Oscar C.: A capacity estimation technique for JPEG-to-JPEG image watermarking. IEEE Trans. Circuits Syst. Video Technol. 13(8), 746–752 (2003)

    Article  Google Scholar 

  2. Lu, C.-S., Mark, H.-Y.: Multipurpose watermarking for image authentication and protection. IEEE Trans. Image Process. 10(10), 1579–1592 (2001)

    Article  MATH  Google Scholar 

  3. Lin, C.-Y., Chang, S.-F.: A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol. 11(2), 153–168 (2001)

    Article  Google Scholar 

  4. Celik, M.U., Sharma, G., Saber, E., Tekal, A.M.: A hierarchical image authentication watermark with improved localization and security. In: Proceedings IEEE International Conference on Image Processing, vol. II, pp. 502–505, ©2001 IEEE, pp. 502–505, Oct 2001

    Google Scholar 

  5. Ni, Zhicheng, Shi, Yun Q., Ansari, Nirwan, Wei, Su, Sun, Qibin, Lin, Xiao: Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Trans. Circuits Syst. Video Technol. 18(4), 497–509 (2008)

    Article  Google Scholar 

  6. Hsu, Chiou-Ting, Ja-Ling, Wu: Hidden digital watermarks in images. IEEE Trans. Image Process. 8(1), 58–68 (1999)

    Article  Google Scholar 

  7. Cox, J., Miller, M.L., Mc Kellips, A.L.: Watermarking as communications with side information. In: Proceedings of IEEE, Special Issue on Identification and Protection of Multimedia Information, vol. 87, pp. 1127–1141, July 1999

    Google Scholar 

  8. Eggers, Joachim J., Bäuml, Robert, Tzschoppe, Roman, Girod, Bernd: Scalar costa scheme for information embedding. IEEE Trans. Signal Process. 51(4), 1003–1019 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  9. Tang, Chih-Wei, Hang, Hsueh-Ming: A feature-based robust digital image watermarking scheme. IEEE Trans. Signal Process. 51(4), 950–959 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  10. Barni, Mauro, Bartolini, Franco, Checcacci, Nicola: Watermarking of MPEG-4 video objects. IEEE Trans. Multimedia 7(1), 23–32 (2005)

    Article  Google Scholar 

  11. Bors, Adrian G.: Watermarking mesh-based representations of 3-D objects using local moments. IEEE Trans. Image Process. 15(3), 687–701 (2006)

    Article  Google Scholar 

  12. Akhaee, Mohammad Ali, Mohammad Ebrahim Sahraeian, S., Sankur, Bulent, Marvasti, Farokh: Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor. IEEE Trans. Multimedia 11(5), 822–833 (2009)

    Article  Google Scholar 

  13. Subramanyam, A.V., Emmanuel, Sabu, Kankanhalli, Mohan S.: Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Trans. Multimedia 14(3), 703–716 (2012)

    Article  Google Scholar 

  14. Chang, T., Kuo, C.-C.J.: Texture analysis and classification with tree-structure wavelet transform. IEEE Trans. Image Processing 2(4), 429–441 (1993)

    Article  Google Scholar 

  15. Unser, M.: Texture classification and segmentation using wavelet frames. IEEE Trans. Image Processing 4, 1549–1560 (1995)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vijayalakshmi Kakulapati .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Kakulapati, V., Pentapati, V. (2016). Circular Quad-Octagon Bits: Stepwise Image Cubic Spread Authentication Analysis. In: Satapathy, S., Das, S. (eds) Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 1. Smart Innovation, Systems and Technologies, vol 50. Springer, Cham. https://doi.org/10.1007/978-3-319-30933-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30933-0_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30932-3

  • Online ISBN: 978-3-319-30933-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics