Fragile watermarking for image authentication using dyadic walsh ordering
A digital image is subjected to the most manipulation. This is driven by the easy manipulating process through image editing software which is growing rapidly. These problems can be solved through the watermarking model as an active authentication system for the image. One of the most popular method...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Universitas Ahmad Dahlan
2023
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/42874/1/Fragile%20watermarking%20for%20image%20authentication%20using%20dyadic%20walsh%20ordering.pdf |
_version_ | 1824451649583710208 |
---|---|
author | Adi, Prajanto Wahyu Wibowo, Adi A. Aryotejo, Guruh Ernawan, Ferda |
author_facet | Adi, Prajanto Wahyu Wibowo, Adi A. Aryotejo, Guruh Ernawan, Ferda |
author_sort | Adi, Prajanto Wahyu |
collection | UMP |
description | A digital image is subjected to the most manipulation. This is driven by the easy manipulating process through image editing software which is growing rapidly. These problems can be solved through the watermarking model as an active authentication system for the image. One of the most popular methods is Singular Value Decomposition (SVD) which has good imperceptibility and detection capabilities. Nevertheless, SVD has high complexity and can only utilize one singular matrix S, and ignore two orthogonal matrices. This paper proposes the use of the Walsh matrix with dyadic ordering to generate a new S matrix without the orthogonal matrices. The experimental results showed that the proposed method was able to reduce computational time by 22% and 13% compared to the SVD-based method and similar methods based on the Hadamard matrix respectively. This research can be used as a reference to speed up the computing time of the watermarking methods without compromising the level of imperceptibility and authentication. |
first_indexed | 2025-02-19T02:37:59Z |
format | Article |
id | UMPir42874 |
institution | Universiti Malaysia Pahang |
language | English |
last_indexed | 2025-02-19T02:37:59Z |
publishDate | 2023 |
publisher | Universitas Ahmad Dahlan |
record_format | dspace |
spelling | UMPir428742025-01-07T05:00:00Z http://umpir.ump.edu.my/id/eprint/42874/ Fragile watermarking for image authentication using dyadic walsh ordering Adi, Prajanto Wahyu Wibowo, Adi A. Aryotejo, Guruh Ernawan, Ferda QA75 Electronic computers. Computer science QA76 Computer software T Technology (General) TA Engineering (General). Civil engineering (General) A digital image is subjected to the most manipulation. This is driven by the easy manipulating process through image editing software which is growing rapidly. These problems can be solved through the watermarking model as an active authentication system for the image. One of the most popular methods is Singular Value Decomposition (SVD) which has good imperceptibility and detection capabilities. Nevertheless, SVD has high complexity and can only utilize one singular matrix S, and ignore two orthogonal matrices. This paper proposes the use of the Walsh matrix with dyadic ordering to generate a new S matrix without the orthogonal matrices. The experimental results showed that the proposed method was able to reduce computational time by 22% and 13% compared to the SVD-based method and similar methods based on the Hadamard matrix respectively. This research can be used as a reference to speed up the computing time of the watermarking methods without compromising the level of imperceptibility and authentication. Universitas Ahmad Dahlan 2023-11 Article PeerReviewed pdf en cc_by_sa_4 http://umpir.ump.edu.my/id/eprint/42874/1/Fragile%20watermarking%20for%20image%20authentication%20using%20dyadic%20walsh%20ordering.pdf Adi, Prajanto Wahyu and Wibowo, Adi A. and Aryotejo, Guruh and Ernawan, Ferda (2023) Fragile watermarking for image authentication using dyadic walsh ordering. International Journal of Advances in Intelligent Informatics, 9 (3). pp. 490-501. ISSN 2442-6571. (Published) https://doi.org/10.26555/ijain.v9i3.1017 https://doi.org/10.26555/ijain.v9i3.1017 |
spellingShingle | QA75 Electronic computers. Computer science QA76 Computer software T Technology (General) TA Engineering (General). Civil engineering (General) Adi, Prajanto Wahyu Wibowo, Adi A. Aryotejo, Guruh Ernawan, Ferda Fragile watermarking for image authentication using dyadic walsh ordering |
title | Fragile watermarking for image authentication using dyadic walsh ordering |
title_full | Fragile watermarking for image authentication using dyadic walsh ordering |
title_fullStr | Fragile watermarking for image authentication using dyadic walsh ordering |
title_full_unstemmed | Fragile watermarking for image authentication using dyadic walsh ordering |
title_short | Fragile watermarking for image authentication using dyadic walsh ordering |
title_sort | fragile watermarking for image authentication using dyadic walsh ordering |
topic | QA75 Electronic computers. Computer science QA76 Computer software T Technology (General) TA Engineering (General). Civil engineering (General) |
url | http://umpir.ump.edu.my/id/eprint/42874/1/Fragile%20watermarking%20for%20image%20authentication%20using%20dyadic%20walsh%20ordering.pdf |
work_keys_str_mv | AT adiprajantowahyu fragilewatermarkingforimageauthenticationusingdyadicwalshordering AT wibowoadia fragilewatermarkingforimageauthenticationusingdyadicwalshordering AT aryotejoguruh fragilewatermarkingforimageauthenticationusingdyadicwalshordering AT ernawanferda fragilewatermarkingforimageauthenticationusingdyadicwalshordering |