Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A Robust Algorithm for Digital Image Copyright Protection and Tampering Detection: Employing DWT, DCT, and Blowfish Techniques

Authors
Salama, Ahmed S.Shoitan, RashaAbdallah, Mohamed S.Cho, Young ImNagm, Ahmad M.
Issue Date
Oct-2023
Publisher
INT INFORMATION & ENGINEERING TECHNOLOGY ASSOC
Keywords
blowfish algorithm; data integrity; encryption; copyright; DCT; digital images; DWT; watermarking
Citation
TRAITEMENT DU SIGNAL, v.40, no.5, pp 2019 - 2027
Pages
9
Journal Title
TRAITEMENT DU SIGNAL
Volume
40
Number
5
Start Page
2019
End Page
2027
URI
https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/89560
DOI
10.18280/ts.400520
ISSN
0765-0019
1958-5608
Abstract
With the rapid proliferation of digital images on the internet, the task of preserving image ownership and ensuring the detection of unauthorized alterations has become increasingly challenging. This study introduces a robust algorithm, leveraging Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and Blowfish encryption techniques, designed to maintain copyright integrity and detect image tampering. The proposed algorithm operates on a given RGB host image, first isolating it into its constituent red, green, and blue components. For the purpose of copyright protection, the algorithm applies DWT and DCT to the green component, embedding a watermark logo within it. The blue component is subjected to Blowfish encryption, generating a ciphered blue component that aids in tampering detection. Subsequently, the least significant bits of this ciphered blue component are interchanged with those of the host image's red component, producing a novel red component. This process results in the creation of a watermarked green component, an original blue component, and a newly formed red component. These are then amalgamated to produce the final watermarked image. The proposed method is evaluated using five standard images, with simulation results demonstrating its resilience to various attacks. Importantly, the algorithm exhibits a capacity to detect any unauthorized modifications up to a granularity of 2x2 pixels.
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Cho, Young Im photo

Cho, Young Im
College of IT Convergence (컴퓨터공학부(컴퓨터공학전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE