Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A Robust Algorithm for Digital Image Copyright Protection and Tampering Detection: Employing DWT, DCT, and Blowfish Techniques

Full metadata record
DC Field Value Language
dc.contributor.authorSalama, Ahmed S.-
dc.contributor.authorShoitan, Rasha-
dc.contributor.authorAbdallah, Mohamed S.-
dc.contributor.authorCho, Young Im-
dc.contributor.authorNagm, Ahmad M.-
dc.date.accessioned2023-12-15T15:09:36Z-
dc.date.available2023-12-15T15:09:36Z-
dc.date.issued2023-10-
dc.identifier.issn0765-0019-
dc.identifier.issn1958-5608-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/89560-
dc.description.abstractWith the rapid proliferation of digital images on the internet, the task of preserving image ownership and ensuring the detection of unauthorized alterations has become increasingly challenging. This study introduces a robust algorithm, leveraging Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and Blowfish encryption techniques, designed to maintain copyright integrity and detect image tampering. The proposed algorithm operates on a given RGB host image, first isolating it into its constituent red, green, and blue components. For the purpose of copyright protection, the algorithm applies DWT and DCT to the green component, embedding a watermark logo within it. The blue component is subjected to Blowfish encryption, generating a ciphered blue component that aids in tampering detection. Subsequently, the least significant bits of this ciphered blue component are interchanged with those of the host image's red component, producing a novel red component. This process results in the creation of a watermarked green component, an original blue component, and a newly formed red component. These are then amalgamated to produce the final watermarked image. The proposed method is evaluated using five standard images, with simulation results demonstrating its resilience to various attacks. Importantly, the algorithm exhibits a capacity to detect any unauthorized modifications up to a granularity of 2x2 pixels.-
dc.format.extent9-
dc.language영어-
dc.language.isoENG-
dc.publisherINT INFORMATION & ENGINEERING TECHNOLOGY ASSOC-
dc.titleA Robust Algorithm for Digital Image Copyright Protection and Tampering Detection: Employing DWT, DCT, and Blowfish Techniques-
dc.typeArticle-
dc.identifier.wosid001094288100020-
dc.identifier.doi10.18280/ts.400520-
dc.identifier.bibliographicCitationTRAITEMENT DU SIGNAL, v.40, no.5, pp 2019 - 2027-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-85177619644-
dc.citation.endPage2027-
dc.citation.startPage2019-
dc.citation.titleTRAITEMENT DU SIGNAL-
dc.citation.volume40-
dc.citation.number5-
dc.type.docTypeArticle-
dc.publisher.location캐나다-
dc.subject.keywordAuthorblowfish algorithm-
dc.subject.keywordAuthordata integrity-
dc.subject.keywordAuthorencryption-
dc.subject.keywordAuthorcopyright-
dc.subject.keywordAuthorDCT-
dc.subject.keywordAuthordigital images-
dc.subject.keywordAuthorDWT-
dc.subject.keywordAuthorwatermarking-
dc.subject.keywordPlusWATERMARKING ALGORITHM-
dc.subject.keywordPlusSVD-
dc.subject.keywordPlusTRANSFORM-
dc.subject.keywordPlusSECURITY-
dc.subject.keywordPlusSCHEME-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Cho, Young Im photo

Cho, Young Im
College of IT Convergence (컴퓨터공학부(컴퓨터공학전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE