Logo ICITKM

Annals of Computer Science and Information Systems, Volume 14

Proceedings of the 2017 International Conference on Information Technology and Knowledge Management

Logo PTI

An Adaptive Approach for image adaptive watermarking using Elliptical curve cryptography (ECC)

, ,

DOI: http://dx.doi.org/10.15439/2017KM19

Citation: Proceedings of the 2017 International Conference on Information Technology and Knowledge Management, Ajay Jaiswal, Vijender Kumar Solanki, Zhongyu (Joan) Lu, Nikhil Rajput (eds). ACSIS, Vol. 14, pages 8992 ()

Full text

Abstract. Elliptical curve cryptography (ecc) is a public key encryption approach based on elliptic curve idea that may be used to create quicker, smaller, and greater green cryptographic keys. Ecc generates keys through the houses of the elliptic curve equation in area of the traditional approach of generation as the manufactured from very huge prime numbers. The technology may be used at the side of maximum public key encryption strategies, together with rsa, and diffiehellman. Consistent with some researchers, ecc can yield a degree of safety with a 164-bit key that different structures require a 1,024-bit key to advantage. Because of the fact ecc helps to establish equivalent safety with decrease computing power and battery useful resource usage, it's far turning into widely used for cellular programs. In this work we implement ECC Algorithm with altered approach for encrypting and decrypting the probe image and encrypted images respectively. Our proposed approach has proposed that the elapsed time to perform the task for same input image is less than the conventional approach. We have run the cryptography procedure for n number of iterations in order to get the accurate results and compared that particular elapsed time with the conventional approach. We have contemplated an approach in which we consider region of interest (ROI) unlike the conventional approach, the advantage of the proposed work is we n need not to cover all the pixel vectors but only those which is required to be encrypted or decrypted. The proposed work has applied ecc algorithm for error calculations which has been shown in the experimental results. The proposed work has compared the result in both the aspects in terms of elapsed time to perform the algorithm and ROI feature to get implemented at the same time.

References

  1. Stenger, A., Rabenstein, R.: Adaptive Volterra Filters For Nonlinear Acoustic Echo Cancellation. In: Proc. NSIP, vol. 2, pp. 679–683 (1999)
  2. 4. Paleologu, C., Benesty, J., Ciochin, S.: A Variable Step-Size Affine Projection Algorithm Designed for Acoustic Echo Cancellation. IEEE Transactions on Audio, Speech, and Language Processing 16, 1466–1478 (2008)
  3. Van Schyndel, R. G., Tirkel, A. Z., and Osborne, C. F., “A digital Watermark.” Proc. of the IEEE Int. Conference on Image Processing. Vol. 2, (1994): pp. 86-90.
  4. Swanson, M.D., Kobayashi, M., and Tewfik, A.H., “Multimedia Data-Embedding and Watermarking Technologies.” Proc. of the IEEE. Vol. 86, No. 6, (June 1998): pp. 1064– 1087.
  5. Petitcolas, F., Anderson, R., and Kuhn, M., “Information Hiding—a Survey.” Proc. of the IEEE. Vol. 87, No. 7, (July 2016): pp. 1062–1078.
  6. Barni, M., Bartolini, F., Cox, I.J., Hernandez, J., and Perez-Gonzalez, F., “Digital Watermarking for Copyright Protection: A communications perspective.” IEEE Communications Magazine. Vol. 39, No. 8, (August 2015):pp. 90–133.
  7. Langelaar, Gerhard C., Setyawan, I., and Lagendijk, R. L., “Watermarking Digital Image and Video Data: A state-of-the-art-overview.” IEEE Signal Processing Magazine. Vol. 17, No. 5, (September 2015): pp. 20-47.
  8. Voyatzis, G., Mikolaides, N., and Pitas, I., “Digital watermarking: An overview.” Proc. of IX European Signal Processing Conference(EUSIPCO), Island of Rhodes, Greece. (September 8-11, 2014): pp. 13-16.
  9. Wolfgang, R. B., Podilchuk, C. I., and Edward J. Delp, “Perceptual Watermarks for Image and Video.” Proc. of the IEEE. Vol. 87, No. 7, (July 2013): pp. 1109-1126.
  10. Cox, I. J., Miller, M. L., and Bloom, J. A., “Watermarking Applications and their Properties.” Proc. of IEEE Int. Conference on Information Technology, Las Vegas. (March 2012): pp. 6-10.
  11. Craver, S., Memon, N., Yeo, B.-L., and Yeung, M. M., “Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks and Implications.” IEEE Journal On Selected Areas in Communications. Vol. 16, No. 4, (May 1998): pp. 573-586
  12. Ruanaidh, J. J. K. O’, and Pun, T., “Rotation, Scale and Translation Invariant Digital Image Watermarking.” Proc. of IEEE Int. Conference on Image Processing, Santa Barbara, CA, USA. Vol. 1, (October 2011): pp. 536-539.
  13. Cox, I. J., Kilian, J., Leighton, F. T., and Shamoon, T., “Secure Spread Spectrum Watermarking for Multimedia.” Proc. of IEEE Int. Conference on Image Processing. Vol. 6, (December 2011): pp. 1673-1687.
  14. Boland, F. M., Ruanaidh, J. J. K. O’, and Dautzenberg, C. “Watermarking Digital Images for Copyright Protection.” Proc. of IEEE Int. Conference on Image Processing and its Application, Edinburgh, U.K. (July 2009): pp. 321-326.
  15. Barni, M., Bartolini, F., Cappellini, V., and Piva, A., “A DCT Domain System for Robust Image Watermarking.” Signal Processing Archive. Vol. 66, No. 3, (May 2008): pp. 357- 372.