Watermarking On Compressed & Encrypted JPEG 2000 Images Using Rational Dither Modulation
K. P. Tayade1, S. S. Bobde2
1Mr. Krishna P. Tayade, Student, Department of Computer Engineering, Maharashtra Institute of Technology, Kothrud, Pune, University of Pune, India.
2Prof. S. S. Bobde, Department of Computer Engineering, Maharashtra Institute of Technology, Kothrud, Pune, University of Pune, India.
Manuscript received on September 11, 2013. | Revised Manuscript received on September 15, 2013. | Manuscript published on September 25, 2013. | PP: 11-17 | Volume-1, Issue-11, September 2013. | Retrieval Number: K04610911113/2013©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Rational Dither Modulation (RDM) is an efficient method of watermarking which is sensitive to variations in the amplitude of signals. In the digital world, images are available in various formats. They are simple to copy and resell without any loss of quality. In Digital Asset Management System (DAMS), media data is handled in compressed and encrypted form. It becomes necessary to watermark this form of data to copyright management purpose, ownership declaration and tamper detection. By watermarking the compressed and encrypted data, there is degradation of an image quality. Rational Dither Modulation is an alternative to Quantization Index Modulation with volumetric invariance. In the proposed scheme, using compression, the information of raw media is packed and an encryption algorithm randomize the compressed bit stream. Rational Dither Modulation embeds watermark in the compressed and encrypted domain and extraction of watermark can be done in encrypted and decrypted domain. The digital media is often distributed by multiple levels of distributors in encrypted and compressed form. Rational Dither Modulation investigates security, perceptual quality, embedding capacity and robustness.
Keywords: Rational Dither Modulation, Spread Spectrum, Scalar Costa Scheme and Quantization Index Modulation, Digital Right Management, JPEG2000, Stream Cipher.