Skip to main content
Top

2021 | OriginalPaper | Chapter

Digital Image Transmission Using Combination of DWT-DCT Watermarking and AES Technique

Author : Sudhanshu S. Gonge

Published in: Advances in Computing and Network Communications

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Internet technology brings big revolution in twenty-first century. It facilitates communication between man-to-man, man-to-machine, machine-to-machine, and vice versa. There are many applications, viz. (i) vehicle-to-vehicle, (ii) vehicle-to-infrastructure, (iii) drone communication, etc., which transmit and receive data in various formats like image data, audio data, video data, text data, etc. Bank system uses data communication technique for transferring money through debit card, net banking, credit card, demand draft, cheques, RTGS, NEFT, etc. Bank cheques are cleared through CTS system. For clearing the cheque, it is scanned, and image is transferred to cheque clearing house. During cheque image transmission, there is a need of security, confidentiality, integrity, authorization, copyright protection, and indexing services. There are many techniques and algorithm which provide this facility to overcome this issue. To solve this issue, combination of DWT-DCT watermarking along with AES technique is used. Its performance and analysis against various attacks are also explained in this research paper.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference W. Stallings, Advance encryption standard, in Cryptography and Network Security, 4th ed. (Pearson, India, 2005), pp. 134–165 W. Stallings, Advance encryption standard, in Cryptography and Network Security, 4th ed. (Pearson, India, 2005), pp. 134–165
2.
go back to reference Federal Information Processing Standards Publication 197, in Announcing the Advanced Encryption Standard (AES), 26 Nov 2001 Federal Information Processing Standards Publication 197, in Announcing the Advanced Encryption Standard (AES), 26 Nov 2001
3.
go back to reference I.J. Cox, M.L. Miller, J.A. Bloom, Digital Watermarking (Morgan Kaufmann Publishers, 2002) I.J. Cox, M.L. Miller, J.A. Bloom, Digital Watermarking (Morgan Kaufmann Publishers, 2002)
4.
go back to reference S. Wang, Y. Lin, wavelet tree quantization for copyright protection watermarking. IEEE Trans. Image Process. 13(2), 154–164 (2004)CrossRef S. Wang, Y. Lin, wavelet tree quantization for copyright protection watermarking. IEEE Trans. Image Process. 13(2), 154–164 (2004)CrossRef
5.
go back to reference M. Tsai, H. Hung, DCT and DWT based image watermarking using subsampling, in Proceedings of 4th IEEE International Conference on Machine Learning and Cybernetics, China (2005), pp. 5308–5313 M. Tsai, H. Hung, DCT and DWT based image watermarking using subsampling, in Proceedings of 4th IEEE International Conference on Machine Learning and Cybernetics, China (2005), pp. 5308–5313
8.
go back to reference R. Saikumar, D. Napoleon, An efficient watermarking and key generation technique using DWT algorithm in three-dimensional image. Int. J. Recent Technol. Eng. (IJRTE) 8(2) (2019). ISSN: 2277-3878 R. Saikumar, D. Napoleon, An efficient watermarking and key generation technique using DWT algorithm in three-dimensional image. Int. J. Recent Technol. Eng. (IJRTE) 8(2) (2019). ISSN: 2277-3878
9.
go back to reference J. Wang, S. Yuan, A novel security mobile payment system based on watermarked voice cheque, in Proceedings of 2nd International Conference on Mobile Technology, Applications and Systems (2005) J. Wang, S. Yuan, A novel security mobile payment system based on watermarked voice cheque, in Proceedings of 2nd International Conference on Mobile Technology, Applications and Systems (2005)
10.
go back to reference A. Al-Haj, Combined DWT-DCT digital image watermarking. J. Comput. Sci. 3(9), 740–746. ISSN 1549-3636 A. Al-Haj, Combined DWT-DCT digital image watermarking. J. Comput. Sci. 3(9), 740–746. ISSN 1549-3636
12.
go back to reference S.K. Amirgholipour, A.R. Naghsh-Nilchi, Robust digital image watermarking based on joint DWT-DCT. Int. J. Digital Content Technol. Its Appl. 3(2) (2009) S.K. Amirgholipour, A.R. Naghsh-Nilchi, Robust digital image watermarking based on joint DWT-DCT. Int. J. Digital Content Technol. Its Appl. 3(2) (2009)
13.
go back to reference A.M. Kothari, A.C. Suthar, R.S.Gajre, Performance analysis of digital image watermarking technique–Combined DWT–DCT over individual DWT. Int. J. Adv. Eng. Appl. 177–181, Jan 2010 A.M. Kothari, A.C. Suthar, R.S.Gajre, Performance analysis of digital image watermarking technique–Combined DWT–DCT over individual DWT. Int. J. Adv. Eng. Appl. 177–181, Jan 2010
14.
go back to reference M. Thapa, S.K. Sood, A.P. Meenakshi Sharma, Digital image watermarking technique based on different attacks. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 2(4) (2011) M. Thapa, S.K. Sood, A.P. Meenakshi Sharma, Digital image watermarking technique based on different attacks. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 2(4) (2011)
15.
go back to reference A. El-Mohandes, Hybrid DCT-DWT watermarking and IDEA encryption of internet contents. Int. J. Comput. Sci. Issues (IJCSI) 9(1), 1694–0814. www.IJCSI.org. A. El-Mohandes, Hybrid DCT-DWT watermarking and IDEA encryption of internet contents. Int. J. Comput. Sci. Issues (IJCSI) 9(1), 1694–0814. www.​IJCSI.​org.
16.
go back to reference M. Amini, H. Sadreazami, Image watermarking through joint spatial segmentation and wavelet packet frequency division, in Proceedings of 11th IEEE International Conference on Signal Processing (2012), pp. 632–635 M. Amini, H. Sadreazami, Image watermarking through joint spatial segmentation and wavelet packet frequency division, in Proceedings of 11th IEEE International Conference on Signal Processing (2012), pp. 632–635
17.
go back to reference A.V. Subramanayam, S. Emmanue, M.S. Kankanhalli, Robust watermarking of compressed and encrypted JPEG-2000 Images. IEEE Trans. Multimedia 14(4):703–716 (2012) A.V. Subramanayam, S. Emmanue, M.S. Kankanhalli, Robust watermarking of compressed and encrypted JPEG-2000 Images. IEEE Trans. Multimedia 14(4):703–716 (2012)
18.
go back to reference M.R. Mohd Isa, S. Aljareh, Biometric image protection based on discrete cosine transform watermarking technique, in IEEE Proceedings of International Conference on Engineering and Technology (ICET) (2012), pp. 1–5 M.R. Mohd Isa, S. Aljareh, Biometric image protection based on discrete cosine transform watermarking technique, in IEEE Proceedings of International Conference on Engineering and Technology (ICET) (2012), pp. 1–5
19.
go back to reference P. Mahajan, A. Sachdeva, A study of encryption algorithms AES, DES and RSA for security. Global J. Comput. Sci. Technol. Network Web Secur. 13(15), 14–22 (2013). Online ISSN: 0975-4172, Print ISSN: 0975-4350 P. Mahajan, A. Sachdeva, A study of encryption algorithms AES, DES and RSA for security. Global J. Comput. Sci. Technol. Network Web Secur. 13(15), 14–22 (2013). Online ISSN: 0975-4172, Print ISSN: 0975-4350
20.
go back to reference S.P. Metkar, M.V. Lichade, Digital image improvement by integrating watermarking and encryption technique, in Proceedings of IEEE International Conference on Signal Processing, Computing and Control (ISPCC), 26–28 Sept 2013 S.P. Metkar, M.V. Lichade, Digital image improvement by integrating watermarking and encryption technique, in Proceedings of IEEE International Conference on Signal Processing, Computing and Control (ISPCC), 26–28 Sept 2013
21.
go back to reference S. Sirmour, A. Tiwari, A hybrid DWT-SVD based digital image watermarking algorithm for copyright protection. Int. J. P2P Network Trends Technol. (IJPTT) 6, 7–10 (2014). ISSN: 2249-2615 S. Sirmour, A. Tiwari, A hybrid DWT-SVD based digital image watermarking algorithm for copyright protection. Int. J. P2P Network Trends Technol. (IJPTT) 6, 7–10 (2014). ISSN: 2249-2615
22.
go back to reference K.-H. Lee, P.-L. Chiu, Digital image sharing by diverse image media. IEEE Trans. Inf. Forensics Secur. 9(1), 88–98 (2014)CrossRef K.-H. Lee, P.-L. Chiu, Digital image sharing by diverse image media. IEEE Trans. Inf. Forensics Secur. 9(1), 88–98 (2014)CrossRef
Metadata
Title
Digital Image Transmission Using Combination of DWT-DCT Watermarking and AES Technique
Author
Sudhanshu S. Gonge
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-33-6977-1_49