Fragile watermarking for image authentication using dyadic walsh ordering
A digital image is subjected to the most manipulation. This is driven by the easy manipulating process through image editing software which is growing rapidly. These problems can be solved through the watermarking model as an active authentication system for the image. One of the most popular method...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Universitas Ahmad Dahlan
2023
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/42874/1/Fragile%20watermarking%20for%20image%20authentication%20using%20dyadic%20walsh%20ordering.pdf http://umpir.ump.edu.my/id/eprint/42874/ https://doi.org/10.26555/ijain.v9i3.1017 https://doi.org/10.26555/ijain.v9i3.1017 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.ump.umpir.42874 |
---|---|
record_format |
eprints |
spelling |
my.ump.umpir.428742025-01-07T05:00:00Z http://umpir.ump.edu.my/id/eprint/42874/ Fragile watermarking for image authentication using dyadic walsh ordering Adi, Prajanto Wahyu Wibowo, Adi A. Aryotejo, Guruh Ernawan, Ferda QA75 Electronic computers. Computer science QA76 Computer software T Technology (General) TA Engineering (General). Civil engineering (General) A digital image is subjected to the most manipulation. This is driven by the easy manipulating process through image editing software which is growing rapidly. These problems can be solved through the watermarking model as an active authentication system for the image. One of the most popular methods is Singular Value Decomposition (SVD) which has good imperceptibility and detection capabilities. Nevertheless, SVD has high complexity and can only utilize one singular matrix S, and ignore two orthogonal matrices. This paper proposes the use of the Walsh matrix with dyadic ordering to generate a new S matrix without the orthogonal matrices. The experimental results showed that the proposed method was able to reduce computational time by 22% and 13% compared to the SVD-based method and similar methods based on the Hadamard matrix respectively. This research can be used as a reference to speed up the computing time of the watermarking methods without compromising the level of imperceptibility and authentication. Universitas Ahmad Dahlan 2023-11 Article PeerReviewed pdf en cc_by_sa_4 http://umpir.ump.edu.my/id/eprint/42874/1/Fragile%20watermarking%20for%20image%20authentication%20using%20dyadic%20walsh%20ordering.pdf Adi, Prajanto Wahyu and Wibowo, Adi A. and Aryotejo, Guruh and Ernawan, Ferda (2023) Fragile watermarking for image authentication using dyadic walsh ordering. International Journal of Advances in Intelligent Informatics, 9 (3). pp. 490-501. ISSN 2442-6571. (Published) https://doi.org/10.26555/ijain.v9i3.1017 https://doi.org/10.26555/ijain.v9i3.1017 |
institution |
Universiti Malaysia Pahang Al-Sultan Abdullah |
building |
UMPSA Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Pahang Al-Sultan Abdullah |
content_source |
UMPSA Institutional Repository |
url_provider |
http://umpir.ump.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science QA76 Computer software T Technology (General) TA Engineering (General). Civil engineering (General) |
spellingShingle |
QA75 Electronic computers. Computer science QA76 Computer software T Technology (General) TA Engineering (General). Civil engineering (General) Adi, Prajanto Wahyu Wibowo, Adi A. Aryotejo, Guruh Ernawan, Ferda Fragile watermarking for image authentication using dyadic walsh ordering |
description |
A digital image is subjected to the most manipulation. This is driven by the easy manipulating process through image editing software which is growing rapidly. These problems can be solved through the watermarking model as an active authentication system for the image. One of the most popular methods is Singular Value Decomposition (SVD) which has good imperceptibility and detection capabilities. Nevertheless, SVD has high complexity and can only utilize one singular matrix S, and ignore two orthogonal matrices. This paper proposes the use of the Walsh matrix with dyadic ordering to generate a new S matrix without the orthogonal matrices. The experimental results showed that the proposed method was able to reduce computational time by 22% and 13% compared to the SVD-based method and similar methods based on the Hadamard matrix respectively. This research can be used as a reference to speed up the computing time of the watermarking methods without compromising the level of imperceptibility and authentication. |
format |
Article |
author |
Adi, Prajanto Wahyu Wibowo, Adi A. Aryotejo, Guruh Ernawan, Ferda |
author_facet |
Adi, Prajanto Wahyu Wibowo, Adi A. Aryotejo, Guruh Ernawan, Ferda |
author_sort |
Adi, Prajanto Wahyu |
title |
Fragile watermarking for image authentication using dyadic walsh ordering |
title_short |
Fragile watermarking for image authentication using dyadic walsh ordering |
title_full |
Fragile watermarking for image authentication using dyadic walsh ordering |
title_fullStr |
Fragile watermarking for image authentication using dyadic walsh ordering |
title_full_unstemmed |
Fragile watermarking for image authentication using dyadic walsh ordering |
title_sort |
fragile watermarking for image authentication using dyadic walsh ordering |
publisher |
Universitas Ahmad Dahlan |
publishDate |
2023 |
url |
http://umpir.ump.edu.my/id/eprint/42874/1/Fragile%20watermarking%20for%20image%20authentication%20using%20dyadic%20walsh%20ordering.pdf http://umpir.ump.edu.my/id/eprint/42874/ https://doi.org/10.26555/ijain.v9i3.1017 https://doi.org/10.26555/ijain.v9i3.1017 |
_version_ |
1822924893294952448 |
score |
13.23243 |