Analysis of Time Optimization for Watermark Image Quality Using Run Length Encoding Compression

Adiyah Mahiruna(1*), Eko Hari Rachmawanto(2), Deden Istiawan(3)


(1) Institut Teknologi Statistika dan Bisnis Muhammadiyah Semarang
(2) Universitas Dian Nuswantoro Semarang
(3) Institut Teknologi Statistika dan Bisnis Muhammadiyah Semarang
(*) Corresponding Author

Abstract


Internet technology continues to have a significant impact on digital media such as text, images, audio and video. One effect is the ease of exchange, distribution, and duplication of digital data; on the other hand, this ease also raises the problem of digital data being protected by copyright or digital data is confidential. Watermarking is a solution to the problem of digital data copyright protection. Extensive research on watermarking was conducted before one of them was a hybrid DWT-DCT-SVD. Several studies have found weaknesses in the process of message insertion; for example, the time to insertion of a watermark image is relatively long, particularly for large images. The problem of long message insertion time is that it is necessary to continue research on watermarking to apply the compression process to the original image before the watermark image insertion process is performed. The original image to be inserted into the watermark image is compressed using the run-length encoding algorithm. The result of the RLE compression shows that the image file size becomes large because the image dataset used has various intensity values. The results from watermarking obtained by watermarked images with RLE compression preprocessing have better imperceptibility than watermarked images without preprocessing RLE compression

Keywords


Watermarking; Discrete wavelet transform; Discrete cosine transform; Singular Value Decomposition; Compression; Run Length Encoding

Full Text:

PDF

References


Abu, N. A., Adi, P. W., & Mohd, O. (2014). Robust Digital Image Steganography within Coefficient Difference on Integer Haar Wavelet Transform. International Journal of Video & Image Processing and Network Security (IJVIPNS), 14(02), 1–8.

Al-Haj, A. (2007). Combined DWT-DCT Digital Image Watermarking. Journal of Computer Science, 3(9), 740–746. https://thescipub.com/abstract/jcssp.2007.740.746

Divecha, N., & Jani, N. N. (2013). Implementation and performance analysis of DCT-DWT-SVD based watermarking algorithms for color images. 2013 International Conference on Intelligent Systems and Signal Processing, ISSP 2013, 204–208. https://doi.org/10.1109/ISSP.2013.6526903

Divya R. Jariwala, J. R. P. (2017). Effect of Physical Treatment on the Physicochemical, Rheological and Functional Properties of Yam Meal of the Cultivar “Ngumvu” From Dioscorea Alata L. of Congo. International Journal of Recent Scientific Research, 8, 20862–20867. https://doi.org/10.24327/IJRSR

Faizal, M. A., Rahmalan, H. B., Rachmawanto, E. H., & Sari, C. A. (2012). Impact Analysis for Securing Image Data using Hybrid SLT and DCT. International Journal of Future Computer and Communication, 1(3), 309–311. https://doi.org/10.7763/ijfcc.2012.v1.83

Hartung, F., & Kutter, M. (1999). Multimedia watermarking techniques. Proceedings of the IEEE, 87(7), 1079–1107. https://doi.org/10.1109/5.771066

Khan, M. I., & Jeoti, V. (2010). A blind watermarking scheme using bitplane of DC component for JPEG compressed images. Proceedings - 2010 6th International Conference on Emerging Technologies, ICET 2010, 150–154. https://doi.org/10.1109/ICET.2010.5638498

Mallat, S. G. (2009). A theory for multiresolution signal decomposition: The wavelet representation. Fundamental Papers in Wavelet Theory, II(7), 494–513. https://doi.org/10.1515/9781400827268.494

Mathur, S., Dhingra, A., Prabukumar, M., Agilandeeswari, L., & Muralibabu, K. (2016). An efficient spatial domain based image watermarking using shell based pixel selection. 2016 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2016, July 2018, 2696–2702. https://doi.org/10.1109/ICACCI.2016.7732468

Munir, R. (2015). A chaos-based fragile watermarking method in spatial domain for image authentication. 2015 International Seminar on Intelligent Technology and Its Applications, ISITIA 2015 - Proceeding, 227–231. https://doi.org/10.1109/ISITIA.2015.7219983

Nagarajan, A. (2011). An Enhanced Approach in Run Length Encoding Scheme ( EARLE ) Abstract : Image Compression : 43–47.

Rachmawanto, E. H., Sari, C. A., Astuti, Y. P., & Umaroh, L. (2017). A robust image watermarking using hybrid DCT and SLT. Proceedings - 2016 International Seminar on Application of Technology for Information and Communication, ISEMANTIC 2016, 312–316. https://doi.org/10.1109/ISEMANTIC.2016.7873857

Rahman, M. M. (2013). A DWT, DCT and SVD Based Watermarking Technique to Protect the Image Piracy. International Journal of Managing Public Sector Information and Communication Technologies, 4(2), 21–32. https://doi.org/10.5121/ijmpict.2013.4203

Reddy, A. A., & Chatterji, B. N. (2005). A new wavelet based logo-watermarking scheme. Pattern Recognition Letters, 26(7), 1019–1027. https://doi.org/10.1016/j.patrec.2004.09.047

Santhanam. MS, R. A. (2008). Digital Watermarking in The Singular Vector Domain. International Journal of Image and Graphics, 8(3), 351–368.

Santhi, V., & Thangavelu, A. (2011). DC Coefficients Based Watermarking Techniquefor color Images Using Singular ValueDecomposition. International Journal of Computer and Electrical Engineering, 3(1), 8–16. https://doi.org/10.7763/ijcee.2011.v3.285

Setiadi, D. R. I. M., Sutojo, T., Rachmawanto, E. H., & Sari, C. A. (2017). Fast and efficient image watermarking algorithm using discrete tchebichef transform. 2017 5th International Conference on Cyber and IT Service Management, CITSM 2017, 2(1), 0–4. https://doi.org/10.1109/CITSM.2017.8089229

Singh, A. K., Dave, M., & Mohan, A. (2014a). Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine. International Journal of Electronic Security and Digital Forensics, 6(4), 285–305. https://doi.org/10.1504/IJESDF.2014.065739

Singh, A. K., Dave, M., & Mohan, A. (2014b). Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD domain. National Academy Science Letters, 37(4), 351–358. https://doi.org/10.1007/s40009-014-0241-8

Singh, A. K., Kumar, B., Dave, M., & Mohan, A. (2015). Robust and Imperceptible Dual Watermarking for Telemedicine Applications. Wireless Personal Communications, 80(4), 1415–1433. https://doi.org/10.1007/s11277-014-2091-6

Singh, P., Shivani, S., & Agarwal, S. (2014). A chaotic map based DCT-SVD watermarking scheme for rightful ownership verification. SCES 2014: Inspiring Engineering and Systems for Global Sustainability, 1–4. https://doi.org/10.1109/SCES.2014.6880048

Srivastava, A. (2013). DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band. IOSR Journal of Computer Engineering, 12(2), 63–66. https://doi.org/10.9790/0661-1226366

Susanto, A., Setiadi, D. R. I. M., Sari, C. A., & Rachmawanto, E. H. (2017). Hybrid method using HWT-DCT for image watermarking. 2017 5th International Conference on Cyber and IT Service Management, CITSM 2017. https://doi.org/10.1109/CITSM.2017.8089252

Xia, Q., Ni, J., Bosco, A. J., Kanpogninge, A., & Gee, J. C. (2015). Searchable public-key encryption with data sharing in dynamic groups for mobile cloud storage. Journal of Universal Computer Science, 21(3), 440–453.


Article Metrics

Abstract view : 135 times
PDF - 15 times

DOI: https://doi.org/10.26714/jichi.v4i2.12058

Refbacks

  • There are currently no refbacks.


____________________________________________________________________________
Journal of Intelligent Computing and Health Informatics (JICHI)
ISSN 2715-6923 (print) | 2721-9186 (online)
Organized by
Department of Informatics
Faculty of Engineering
Universitas Muhammadiyah Semarang

W : https://jurnal.unimus.ac.id/index.php/ICHI
E : [email protected], [email protected]

View My Stats