Chaotic Watermarking for Authentication
This research concerns with generating and hiding invisible chaotic watermarking, in a manner different from that used in the rest of the known watermarks, has been presented. The work has two phases in each of which the chaotic function has been used twice. In the first phase it is used to generate...
Saved in:
| Main Author: | |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Mosul University
2013-07-01
|
| Series: | Al-Rafidain Journal of Computer Sciences and Mathematics |
| Subjects: | |
| Online Access: | https://csmj.mosuljournals.com/article_163498_c18450bd02e3331f86dfcbdd72b34d25.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849744770255028224 |
|---|---|
| author | Melad Saeed |
| author_facet | Melad Saeed |
| author_sort | Melad Saeed |
| collection | DOAJ |
| description | This research concerns with generating and hiding invisible chaotic watermarking, in a manner different from that used in the rest of the known watermarks, has been presented.
The work has two phases in each of which the chaotic function has been used twice. In the first phase it is used to generate the watermark from the same cover picture then embedding it in another level of the cover depending on the chaotic positions in order to increase authenticity and fortification against attacks. As for the second phase, the chaotic function has been used to generate and retrieve the watermark and compare them to ensure authenticity. Through the practical results that were obtained using the measurements of Correlation, PSNR, and MSE the quality of this algorithm has been shown. Some of the image processing procedures have been used to measure the robustness of this algorithm through calculating the correlation coefficient. |
| format | Article |
| id | doaj-art-3df95ac0283f446e90c81a0a69e33baf |
| institution | DOAJ |
| issn | 1815-4816 2311-7990 |
| language | English |
| publishDate | 2013-07-01 |
| publisher | Mosul University |
| record_format | Article |
| series | Al-Rafidain Journal of Computer Sciences and Mathematics |
| spelling | doaj-art-3df95ac0283f446e90c81a0a69e33baf2025-08-20T03:09:45ZengMosul UniversityAl-Rafidain Journal of Computer Sciences and Mathematics1815-48162311-79902013-07-0110224325710.33899/csmj.2013.163498163498Chaotic Watermarking for AuthenticationMelad Saeed0College of Computer Science and Mathematics University of Mosul, Mosul, IraqThis research concerns with generating and hiding invisible chaotic watermarking, in a manner different from that used in the rest of the known watermarks, has been presented. The work has two phases in each of which the chaotic function has been used twice. In the first phase it is used to generate the watermark from the same cover picture then embedding it in another level of the cover depending on the chaotic positions in order to increase authenticity and fortification against attacks. As for the second phase, the chaotic function has been used to generate and retrieve the watermark and compare them to ensure authenticity. Through the practical results that were obtained using the measurements of Correlation, PSNR, and MSE the quality of this algorithm has been shown. Some of the image processing procedures have been used to measure the robustness of this algorithm through calculating the correlation coefficient.https://csmj.mosuljournals.com/article_163498_c18450bd02e3331f86dfcbdd72b34d25.pdfwatermarkingchaoticauthenticitypsnr |
| spellingShingle | Melad Saeed Chaotic Watermarking for Authentication Al-Rafidain Journal of Computer Sciences and Mathematics watermarking chaotic authenticity psnr |
| title | Chaotic Watermarking for Authentication |
| title_full | Chaotic Watermarking for Authentication |
| title_fullStr | Chaotic Watermarking for Authentication |
| title_full_unstemmed | Chaotic Watermarking for Authentication |
| title_short | Chaotic Watermarking for Authentication |
| title_sort | chaotic watermarking for authentication |
| topic | watermarking chaotic authenticity psnr |
| url | https://csmj.mosuljournals.com/article_163498_c18450bd02e3331f86dfcbdd72b34d25.pdf |
| work_keys_str_mv | AT meladsaeed chaoticwatermarkingforauthentication |