Fragile watermarking for image authentication using dyadic walsh ordering

A digital image is subjected to the most manipulation. This is driven by the easy manipulating process through image editing software which is growing rapidly. These problems can be solved through the watermarking model as an active authentication system for the image. One of the most popular method...

Full description

Saved in:
Bibliographic Details
Main Authors: Adi, Prajanto Wahyu, Wibowo, Adi A., Aryotejo, Guruh, Ernawan, Ferda
Format: Article
Language:English
Published: Universitas Ahmad Dahlan 2023
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/42874/1/Fragile%20watermarking%20for%20image%20authentication%20using%20dyadic%20walsh%20ordering.pdf
http://umpir.ump.edu.my/id/eprint/42874/
https://doi.org/10.26555/ijain.v9i3.1017
https://doi.org/10.26555/ijain.v9i3.1017
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.ump.umpir.42874
record_format eprints
spelling my.ump.umpir.428742025-01-07T05:00:00Z http://umpir.ump.edu.my/id/eprint/42874/ Fragile watermarking for image authentication using dyadic walsh ordering Adi, Prajanto Wahyu Wibowo, Adi A. Aryotejo, Guruh Ernawan, Ferda QA75 Electronic computers. Computer science QA76 Computer software T Technology (General) TA Engineering (General). Civil engineering (General) A digital image is subjected to the most manipulation. This is driven by the easy manipulating process through image editing software which is growing rapidly. These problems can be solved through the watermarking model as an active authentication system for the image. One of the most popular methods is Singular Value Decomposition (SVD) which has good imperceptibility and detection capabilities. Nevertheless, SVD has high complexity and can only utilize one singular matrix S, and ignore two orthogonal matrices. This paper proposes the use of the Walsh matrix with dyadic ordering to generate a new S matrix without the orthogonal matrices. The experimental results showed that the proposed method was able to reduce computational time by 22% and 13% compared to the SVD-based method and similar methods based on the Hadamard matrix respectively. This research can be used as a reference to speed up the computing time of the watermarking methods without compromising the level of imperceptibility and authentication. Universitas Ahmad Dahlan 2023-11 Article PeerReviewed pdf en cc_by_sa_4 http://umpir.ump.edu.my/id/eprint/42874/1/Fragile%20watermarking%20for%20image%20authentication%20using%20dyadic%20walsh%20ordering.pdf Adi, Prajanto Wahyu and Wibowo, Adi A. and Aryotejo, Guruh and Ernawan, Ferda (2023) Fragile watermarking for image authentication using dyadic walsh ordering. International Journal of Advances in Intelligent Informatics, 9 (3). pp. 490-501. ISSN 2442-6571. (Published) https://doi.org/10.26555/ijain.v9i3.1017 https://doi.org/10.26555/ijain.v9i3.1017
institution Universiti Malaysia Pahang Al-Sultan Abdullah
building UMPSA Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang Al-Sultan Abdullah
content_source UMPSA Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
topic QA75 Electronic computers. Computer science
QA76 Computer software
T Technology (General)
TA Engineering (General). Civil engineering (General)
spellingShingle QA75 Electronic computers. Computer science
QA76 Computer software
T Technology (General)
TA Engineering (General). Civil engineering (General)
Adi, Prajanto Wahyu
Wibowo, Adi A.
Aryotejo, Guruh
Ernawan, Ferda
Fragile watermarking for image authentication using dyadic walsh ordering
description A digital image is subjected to the most manipulation. This is driven by the easy manipulating process through image editing software which is growing rapidly. These problems can be solved through the watermarking model as an active authentication system for the image. One of the most popular methods is Singular Value Decomposition (SVD) which has good imperceptibility and detection capabilities. Nevertheless, SVD has high complexity and can only utilize one singular matrix S, and ignore two orthogonal matrices. This paper proposes the use of the Walsh matrix with dyadic ordering to generate a new S matrix without the orthogonal matrices. The experimental results showed that the proposed method was able to reduce computational time by 22% and 13% compared to the SVD-based method and similar methods based on the Hadamard matrix respectively. This research can be used as a reference to speed up the computing time of the watermarking methods without compromising the level of imperceptibility and authentication.
format Article
author Adi, Prajanto Wahyu
Wibowo, Adi A.
Aryotejo, Guruh
Ernawan, Ferda
author_facet Adi, Prajanto Wahyu
Wibowo, Adi A.
Aryotejo, Guruh
Ernawan, Ferda
author_sort Adi, Prajanto Wahyu
title Fragile watermarking for image authentication using dyadic walsh ordering
title_short Fragile watermarking for image authentication using dyadic walsh ordering
title_full Fragile watermarking for image authentication using dyadic walsh ordering
title_fullStr Fragile watermarking for image authentication using dyadic walsh ordering
title_full_unstemmed Fragile watermarking for image authentication using dyadic walsh ordering
title_sort fragile watermarking for image authentication using dyadic walsh ordering
publisher Universitas Ahmad Dahlan
publishDate 2023
url http://umpir.ump.edu.my/id/eprint/42874/1/Fragile%20watermarking%20for%20image%20authentication%20using%20dyadic%20walsh%20ordering.pdf
http://umpir.ump.edu.my/id/eprint/42874/
https://doi.org/10.26555/ijain.v9i3.1017
https://doi.org/10.26555/ijain.v9i3.1017
_version_ 1822924893294952448
score 13.23243