Abstract
In this paper, a picture analysis technique by providing authentication to photographs is planned. In our approach, invisible watermark bits were taken in circular regular sequence in exceedingly quad-octagon patterns. Quad-octagon patterns are generating by considering thirty-two bits in at random continuation eight bit planes. In every bit plane, a regular equal quad image bits were extracted and interlinked with its beside the bit plane, quad image bits circularly, forming completely thirty-two bits. These circular pattern bits were entered stepwise in an exceedingly boxlike manner in embedded image bits. Many quad-octagon patterns were addressed in our planned technique. Recovered pictures from our technique shown higher survival technique beneath numerous attacks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Wong, Peter H.W., Au, Oscar C.: A capacity estimation technique for JPEG-to-JPEG image watermarking. IEEE Trans. Circuits Syst. Video Technol. 13(8), 746–752 (2003)
Lu, C.-S., Mark, H.-Y.: Multipurpose watermarking for image authentication and protection. IEEE Trans. Image Process. 10(10), 1579–1592 (2001)
Lin, C.-Y., Chang, S.-F.: A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol. 11(2), 153–168 (2001)
Celik, M.U., Sharma, G., Saber, E., Tekal, A.M.: A hierarchical image authentication watermark with improved localization and security. In: Proceedings IEEE International Conference on Image Processing, vol. II, pp. 502–505, ©2001 IEEE, pp. 502–505, Oct 2001
Ni, Zhicheng, Shi, Yun Q., Ansari, Nirwan, Wei, Su, Sun, Qibin, Lin, Xiao: Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Trans. Circuits Syst. Video Technol. 18(4), 497–509 (2008)
Hsu, Chiou-Ting, Ja-Ling, Wu: Hidden digital watermarks in images. IEEE Trans. Image Process. 8(1), 58–68 (1999)
Cox, J., Miller, M.L., Mc Kellips, A.L.: Watermarking as communications with side information. In: Proceedings of IEEE, Special Issue on Identification and Protection of Multimedia Information, vol. 87, pp. 1127–1141, July 1999
Eggers, Joachim J., Bäuml, Robert, Tzschoppe, Roman, Girod, Bernd: Scalar costa scheme for information embedding. IEEE Trans. Signal Process. 51(4), 1003–1019 (2003)
Tang, Chih-Wei, Hang, Hsueh-Ming: A feature-based robust digital image watermarking scheme. IEEE Trans. Signal Process. 51(4), 950–959 (2003)
Barni, Mauro, Bartolini, Franco, Checcacci, Nicola: Watermarking of MPEG-4 video objects. IEEE Trans. Multimedia 7(1), 23–32 (2005)
Bors, Adrian G.: Watermarking mesh-based representations of 3-D objects using local moments. IEEE Trans. Image Process. 15(3), 687–701 (2006)
Akhaee, Mohammad Ali, Mohammad Ebrahim Sahraeian, S., Sankur, Bulent, Marvasti, Farokh: Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor. IEEE Trans. Multimedia 11(5), 822–833 (2009)
Subramanyam, A.V., Emmanuel, Sabu, Kankanhalli, Mohan S.: Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Trans. Multimedia 14(3), 703–716 (2012)
Chang, T., Kuo, C.-C.J.: Texture analysis and classification with tree-structure wavelet transform. IEEE Trans. Image Processing 2(4), 429–441 (1993)
Unser, M.: Texture classification and segmentation using wavelet frames. IEEE Trans. Image Processing 4, 1549–1560 (1995)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Kakulapati, V., Pentapati, V. (2016). Circular Quad-Octagon Bits: Stepwise Image Cubic Spread Authentication Analysis. In: Satapathy, S., Das, S. (eds) Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 1. Smart Innovation, Systems and Technologies, vol 50. Springer, Cham. https://doi.org/10.1007/978-3-319-30933-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-30933-0_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30932-3
Online ISBN: 978-3-319-30933-0
eBook Packages: EngineeringEngineering (R0)