Optimasi Keamanan Watermarking pada Daubechies Transform Berbasis Arnold Cat Map
Abstract
References
B. Wang, J. Ding, Q. Wen, X. Liao, and C. Liu, “An image watermarking algorithm based on DWT DCT and SVD,” in 2009 IEEE International Conference on Network Infrastructure and Digital Content, 2009, pp. 1034–1038.
W. S. Sari, E. H. Rachmawanto, D. R. I. M. Setiadi, and C. A. Sari, “A Good Performance OTP Encryption Image based on DCT-DWT Steganography,” TELKOMNIKA, vol. 15, no. 4, pp. 1987–1995, 2017.
A. Susanto, S. D.R.I.M., C. A. Sari, and E. H. Rachmawanto, “Hybrid Method using HWT-DCT for Image Watermarking,” in 5th International Conference on Information Technology for Cyber and IT Service Management (CITSM 2017), 2017.
G. Ardiansyah, C. A. Sari, D. Setiadi, and E. H. Rachmawanto, “Hybrid Method using 3-DES , DWT and LSB for Secure Image Steganography Algorithm,” in 2017 2nd International Conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), 2017, pp. 248–253.
T. Pan and D. Li, “A Novel Image Encryption Using Arnold Cat,” Int. J. Secur. Its Appl., vol. 7, no. 5, pp. 377–386, 2013.
N. Nagaraj and P. G. Vaidya, “One-Time Pad , Arithmetic Coding and Logic Gates : An Unifying Theme Using Dynamical Systems,” pp. 1–9, 2008.
R. D. Ardy, O. R. Indriani, C. A. Sari, D. R. Ignatius, and M. Setiadi, “Digital Image Signature using Triple Protection Cryptosystem (RSA, Vigenere, and MD5),” in International Conference on Smart Cities, Automation & Intelligent Computing Systems, 2017, pp. 1–6.
H. S. Meharwade, S. Veena, and A. R. Shankar, “Joint encryption / watermarking based on Arnold cat map and DCT,” Int. J. Softw. Hardw. Res. Eng., vol. 3, no. 3, pp. 1–5, 2015.
Z. T. Al-mokhtar, High Security Video Watermarking Scheme Based on 3-D DCT and 2-D DWT with Arnold Map Algorithm. .
D. V. N. K. Rao, Y. Madhuri, S. V. R. Kumar, and Y. V. S. Babu, “Robust Image Watermarking using DCT & Wavelet Packet Denoising,” Int. J. Sci. Eng. Res., vol. 3, no. 5, pp. 1–7, 2012.
D. Singh and S. K. Singh, “DWT-SVD and DCT based Robust and Blind Watermarking Scheme for Copyright Protection,” Multimed. Tools Appl., vol. 76, no. 11, pp. 13001–13024, 2017.
Rafael C. Gonzales, R. E. Woods, and Steven L. Eddins, Digital image proccesing using MATLAB, no. 2. 2014.
E. J. Kusuma, O. R. Indriani, C. A. Sari, D. R. I. M. Setiadi, and E. H. Rachmawanto, “An Imperceptible LSB Image Hiding on Edge Region Using DES Encryption,” in International Conference on Innovative and Creative Information Technology (ICITech), 2017, pp. 1–5.
N. Sharma, Prabhjot, and H. Kaur, “A Review of Information Security using Cryptography Technique.,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 4, pp. 323–326, 2017.
Y. Wu, S. Agaian, and J. P. Noonan, “A New Family of Generalized 3D Cat Maps,” arXiv:1205.3208, pp. 1–10, 2012.
A. Waghmare, A. Bhagat, A. Surve, and S. Kalgutkar, “Chaos Based Image Encryption and Decryption,” Int. J. Adv. Res. Comput. Commun. Eng., vol. 5, no. 4, pp. 64–68, 2016.
C. Pradhan, V. Saxena, and A. K. Bisoi, “Imperceptible Watermarking Technique using Arnold’s Transform and Cross Chaos Map in DCT Domain,” Int. J. …, vol. 55, no. October 2012, pp. 50–53, 2012.
J. Chandra and R. S. Wahono, “Integrasi Discrete Wavelet Transform dan Singular Value Decomposition pada Watermark ing Citra untuk Perlindungan Hak Cipta,” J. Intell. Syst., vol. 1, no. 2, pp. 127–135, 2015.
P. Singh, S. Shivani, and S. Agarwal, “A chaotic map based DCT-SVD watermarking scheme for rightful ownership verification,” in 2014 Students Conference on Engineering and Systems, 2014, pp. 1–4.
DOI: https://doi.org/10.30591/jpit.v4i1.911
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 4.0 International License.
JPIT INDEXED BY
This work is licensed under a Creative Commons Attribution 4.0 International License.