PENERAPAN DIGITAL WATERMARK SEBAGAI VALIDASI KEABSAHAN GAMBAR DIGITAL DENGAN SKEMA BLIND WATERMARK

Adi Suheryadi

Abstract


Digital watermarking is an important field of technological development that has now grown in the digital era. Digital era encourage the spread digital images on internet by the websites with a large scale. On the other hand, digital images are objects that are very easy to change or manipulate, and even copied irresponsibly. Meanwhile it is very difficult to prove the image has been changed by existing equipment at this time, and it is difficult to prove its ownership. This is an important issue, when the image is one of the evidences for legal cases, news reporting and medical filing, where the image must be ensured that the digital image is not subject to change or manipulation. In this paper, we present the application of digital watermarking to authentication and ownership validation of digital image so the image can be ascertained its validity. This research applies blind watermark scheme by using secret key that inserted at least-significant bits (LSB) of host image therefore the watermark is invisible watermark. The result of watermarked image has a small decrease in quality with the mean value of PSNR and MSE about 34.08 and 14.62.

Full Text:

PDF 1-6

References


S. Lagzian, M. Soryani, M. Fathy, "A New Robust Watermarking Scheme Based on RDWT-SVD", International Journal of Intelligent Information Processing, vol. 2, no. 1, pp. 22-29, 2011.

F. Hartung, M. Kutter, "Multimedia watermarking techniques", Proc. IEEE, vol. 87, pp. 1079-1107, July 1999.

A. Sverdlov, S. Dexter, A.M. Eskicioglu, “Robust DCT-SVD Domain Image Watermarking For Copyright Protection: Embedding Data In All Frequencies”, Proceedings of the 13th European Signal Processing Conference (EUSIPCO2005), Antalya, Turkey, September 2005.

V.M. Potdar, S. Han, E. Chang, "A Survey of Digital Image Watermarking Techniques", Proc. IEEE International Conference on Industrial Informatics, Aug. 2005.

Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification.

Guorong Xuan, Yun Q. Shi & Chengyun Yang “Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique” 0-7803-9332-5/05/$20.00 ©2005 IEEE.

R. L. Rivest, “The MD5 message digest algorithm,” Tech. Rep., 1992.

N. Divecha and D. N. N. Jani, "Implementation and performance analysis of DCT-DWT-SVD based watermarking algorithms for color images," International Conference on Intelligent Systems and Signal Processing (ISSP), pp. 204-208, 2013.

J. Guru, H. Dhamecha and B. Patel, "Fusion of DWT and SVD digital watermarking Techniques for robustness," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, no. 9, pp. 791-797, 2014.




DOI: https://doi.org/10.31884/jtt.v3i2.54

Refbacks

  • There are currently no refbacks.


Copyright (c) 2017 JTT (Jurnal Teknologi Terapan)



View Stats

 

 Creative Common Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)