Chaotic Watermarking for Authentication

This research concerns with generating and hiding invisible chaotic watermarking, in a manner different from that used in the rest of the known watermarks, has been presented. The work has two phases in each of which the chaotic function has been used twice. In the first phase it is used to generate...

Full description

Saved in:
Bibliographic Details
Main Author: Melad Saeed
Format: Article
Language:English
Published: Mosul University 2013-07-01
Series:Al-Rafidain Journal of Computer Sciences and Mathematics
Subjects:
Online Access:https://csmj.mosuljournals.com/article_163498_c18450bd02e3331f86dfcbdd72b34d25.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849744770255028224
author Melad Saeed
author_facet Melad Saeed
author_sort Melad Saeed
collection DOAJ
description This research concerns with generating and hiding invisible chaotic watermarking, in a manner different from that used in the rest of the known watermarks, has been presented. The work has two phases in each of which the chaotic function has been used twice. In the first phase it is used to generate the watermark from the same cover picture then embedding it in another level of the cover depending on the chaotic positions in order to increase authenticity and fortification against attacks. As for the second phase, the chaotic function has been used to generate and retrieve the watermark and compare them to ensure authenticity. Through the practical results that were obtained using the measurements of Correlation, PSNR, and MSE the quality of this algorithm has been shown. Some of the image processing procedures have been used to measure the robustness of this algorithm through calculating the correlation coefficient.
format Article
id doaj-art-3df95ac0283f446e90c81a0a69e33baf
institution DOAJ
issn 1815-4816
2311-7990
language English
publishDate 2013-07-01
publisher Mosul University
record_format Article
series Al-Rafidain Journal of Computer Sciences and Mathematics
spelling doaj-art-3df95ac0283f446e90c81a0a69e33baf2025-08-20T03:09:45ZengMosul UniversityAl-Rafidain Journal of Computer Sciences and Mathematics1815-48162311-79902013-07-0110224325710.33899/csmj.2013.163498163498Chaotic Watermarking for AuthenticationMelad Saeed0College of Computer Science and Mathematics University of Mosul, Mosul, IraqThis research concerns with generating and hiding invisible chaotic watermarking, in a manner different from that used in the rest of the known watermarks, has been presented. The work has two phases in each of which the chaotic function has been used twice. In the first phase it is used to generate the watermark from the same cover picture then embedding it in another level of the cover depending on the chaotic positions in order to increase authenticity and fortification against attacks. As for the second phase, the chaotic function has been used to generate and retrieve the watermark and compare them to ensure authenticity. Through the practical results that were obtained using the measurements of Correlation, PSNR, and MSE the quality of this algorithm has been shown. Some of the image processing procedures have been used to measure the robustness of this algorithm through calculating the correlation coefficient.https://csmj.mosuljournals.com/article_163498_c18450bd02e3331f86dfcbdd72b34d25.pdfwatermarkingchaoticauthenticitypsnr
spellingShingle Melad Saeed
Chaotic Watermarking for Authentication
Al-Rafidain Journal of Computer Sciences and Mathematics
watermarking
chaotic
authenticity
psnr
title Chaotic Watermarking for Authentication
title_full Chaotic Watermarking for Authentication
title_fullStr Chaotic Watermarking for Authentication
title_full_unstemmed Chaotic Watermarking for Authentication
title_short Chaotic Watermarking for Authentication
title_sort chaotic watermarking for authentication
topic watermarking
chaotic
authenticity
psnr
url https://csmj.mosuljournals.com/article_163498_c18450bd02e3331f86dfcbdd72b34d25.pdf
work_keys_str_mv AT meladsaeed chaoticwatermarkingforauthentication