Fragile watermarking for image authentication using dyadic walsh ordering

A digital image is subjected to the most manipulation. This is driven by the easy manipulating process through image editing software which is growing rapidly. These problems can be solved through the watermarking model as an active authentication system for the image. One of the most popular method...

Full description

Bibliographic Details
Main Authors: Adi, Prajanto Wahyu, Wibowo, Adi A., Aryotejo, Guruh, Ernawan, Ferda
Format: Article
Language:English
Published: Universitas Ahmad Dahlan 2023
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/42874/1/Fragile%20watermarking%20for%20image%20authentication%20using%20dyadic%20walsh%20ordering.pdf
_version_ 1824451649583710208
author Adi, Prajanto Wahyu
Wibowo, Adi A.
Aryotejo, Guruh
Ernawan, Ferda
author_facet Adi, Prajanto Wahyu
Wibowo, Adi A.
Aryotejo, Guruh
Ernawan, Ferda
author_sort Adi, Prajanto Wahyu
collection UMP
description A digital image is subjected to the most manipulation. This is driven by the easy manipulating process through image editing software which is growing rapidly. These problems can be solved through the watermarking model as an active authentication system for the image. One of the most popular methods is Singular Value Decomposition (SVD) which has good imperceptibility and detection capabilities. Nevertheless, SVD has high complexity and can only utilize one singular matrix S, and ignore two orthogonal matrices. This paper proposes the use of the Walsh matrix with dyadic ordering to generate a new S matrix without the orthogonal matrices. The experimental results showed that the proposed method was able to reduce computational time by 22% and 13% compared to the SVD-based method and similar methods based on the Hadamard matrix respectively. This research can be used as a reference to speed up the computing time of the watermarking methods without compromising the level of imperceptibility and authentication.
first_indexed 2025-02-19T02:37:59Z
format Article
id UMPir42874
institution Universiti Malaysia Pahang
language English
last_indexed 2025-02-19T02:37:59Z
publishDate 2023
publisher Universitas Ahmad Dahlan
record_format dspace
spelling UMPir428742025-01-07T05:00:00Z http://umpir.ump.edu.my/id/eprint/42874/ Fragile watermarking for image authentication using dyadic walsh ordering Adi, Prajanto Wahyu Wibowo, Adi A. Aryotejo, Guruh Ernawan, Ferda QA75 Electronic computers. Computer science QA76 Computer software T Technology (General) TA Engineering (General). Civil engineering (General) A digital image is subjected to the most manipulation. This is driven by the easy manipulating process through image editing software which is growing rapidly. These problems can be solved through the watermarking model as an active authentication system for the image. One of the most popular methods is Singular Value Decomposition (SVD) which has good imperceptibility and detection capabilities. Nevertheless, SVD has high complexity and can only utilize one singular matrix S, and ignore two orthogonal matrices. This paper proposes the use of the Walsh matrix with dyadic ordering to generate a new S matrix without the orthogonal matrices. The experimental results showed that the proposed method was able to reduce computational time by 22% and 13% compared to the SVD-based method and similar methods based on the Hadamard matrix respectively. This research can be used as a reference to speed up the computing time of the watermarking methods without compromising the level of imperceptibility and authentication. Universitas Ahmad Dahlan 2023-11 Article PeerReviewed pdf en cc_by_sa_4 http://umpir.ump.edu.my/id/eprint/42874/1/Fragile%20watermarking%20for%20image%20authentication%20using%20dyadic%20walsh%20ordering.pdf Adi, Prajanto Wahyu and Wibowo, Adi A. and Aryotejo, Guruh and Ernawan, Ferda (2023) Fragile watermarking for image authentication using dyadic walsh ordering. International Journal of Advances in Intelligent Informatics, 9 (3). pp. 490-501. ISSN 2442-6571. (Published) https://doi.org/10.26555/ijain.v9i3.1017 https://doi.org/10.26555/ijain.v9i3.1017
spellingShingle QA75 Electronic computers. Computer science
QA76 Computer software
T Technology (General)
TA Engineering (General). Civil engineering (General)
Adi, Prajanto Wahyu
Wibowo, Adi A.
Aryotejo, Guruh
Ernawan, Ferda
Fragile watermarking for image authentication using dyadic walsh ordering
title Fragile watermarking for image authentication using dyadic walsh ordering
title_full Fragile watermarking for image authentication using dyadic walsh ordering
title_fullStr Fragile watermarking for image authentication using dyadic walsh ordering
title_full_unstemmed Fragile watermarking for image authentication using dyadic walsh ordering
title_short Fragile watermarking for image authentication using dyadic walsh ordering
title_sort fragile watermarking for image authentication using dyadic walsh ordering
topic QA75 Electronic computers. Computer science
QA76 Computer software
T Technology (General)
TA Engineering (General). Civil engineering (General)
url http://umpir.ump.edu.my/id/eprint/42874/1/Fragile%20watermarking%20for%20image%20authentication%20using%20dyadic%20walsh%20ordering.pdf
work_keys_str_mv AT adiprajantowahyu fragilewatermarkingforimageauthenticationusingdyadicwalshordering
AT wibowoadia fragilewatermarkingforimageauthenticationusingdyadicwalshordering
AT aryotejoguruh fragilewatermarkingforimageauthenticationusingdyadicwalshordering
AT ernawanferda fragilewatermarkingforimageauthenticationusingdyadicwalshordering