{"title":"基于MD5和简化DES的图像水印方案","authors":"J. Aparna, Sonal Ayyappan","doi":"10.1109/COMPSC.2014.7032644","DOIUrl":null,"url":null,"abstract":"Digital watermarking is one of the prominent method to prevent illegal copying and duplication of digital media. It is the process of hiding digital data in any form of multimedia data such as image, audio, video, etc. This paper proposes a new block based watermarking technique in transform domain which uses cryptographic methods for embedding the watermark This method uses the MD5 hash of the cover image and the key generated from Simplified-DES to find out the bits to which the watermark is to be embedded. The hash of the cover image is encrypted using SDES and watermark embedding bits are selected. Experimental results shows that the method is robust against different geometrical attacks.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"37 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Image watermarking scheme based on MD5 and simplified DES\",\"authors\":\"J. Aparna, Sonal Ayyappan\",\"doi\":\"10.1109/COMPSC.2014.7032644\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Digital watermarking is one of the prominent method to prevent illegal copying and duplication of digital media. It is the process of hiding digital data in any form of multimedia data such as image, audio, video, etc. This paper proposes a new block based watermarking technique in transform domain which uses cryptographic methods for embedding the watermark This method uses the MD5 hash of the cover image and the key generated from Simplified-DES to find out the bits to which the watermark is to be embedded. The hash of the cover image is encrypted using SDES and watermark embedding bits are selected. Experimental results shows that the method is robust against different geometrical attacks.\",\"PeriodicalId\":388270,\"journal\":{\"name\":\"2014 First International Conference on Computational Systems and Communications (ICCSC)\",\"volume\":\"37 3\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 First International Conference on Computational Systems and Communications (ICCSC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMPSC.2014.7032644\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 First International Conference on Computational Systems and Communications (ICCSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPSC.2014.7032644","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Image watermarking scheme based on MD5 and simplified DES
Digital watermarking is one of the prominent method to prevent illegal copying and duplication of digital media. It is the process of hiding digital data in any form of multimedia data such as image, audio, video, etc. This paper proposes a new block based watermarking technique in transform domain which uses cryptographic methods for embedding the watermark This method uses the MD5 hash of the cover image and the key generated from Simplified-DES to find out the bits to which the watermark is to be embedded. The hash of the cover image is encrypted using SDES and watermark embedding bits are selected. Experimental results shows that the method is robust against different geometrical attacks.