Watermarking Citra Menggunakan Hessenberg Decompotion, Singular Value Decompotion dan Integer Wavelet Transform untuk Meningkatkan Ketahanan Watermark

  • AGUNG SUDRAJAT
  • 14210201

ABSTRAK

ABSTRAK

Nama              : Agung Sudrajat

NIM                 : 14210201

Program Studi : Ilmu Komputer

Fakultas           : Teknologi Informasi

Jenjang            : Strata Dua (S2)

Konsentrasi      : Software Engineering

Judul        : “Watermarking Citra Menggunakan Hessenberg Decompotion, Singular Value Decompotion dan Integer Wavelet Transform untuk Meningkatkan Ketahanan Watermark”

Dalam era perkembangan teknologi internet yang pesat, penggunaan metode watermarking untuk melindungi hak cipta gambar digital telah menjadi populer. Oleh karena itu, kami mengusulkan metode watermarking citra yang menggabungkan Hessenberg Decomposition, Singular Value Decomposition (SVD), dan Integer Wavelet Transform (IWT) untuk meningkatkan ketahanan watermark. Dengan menggunakan Hessenberg decomposition, matriks citra asli diubah menjadi matriks Hessenberg untuk memudahkan proses perhitungan dan analisis matriks citra asli. SVD digunakan untuk memecah matriks citra menjadi komponen singular value, kolom vektor, dan baris vektor, sehingga blok-blok citra dengan singular value tinggi dapat dipilih untuk menanamkan watermark. Selanjutnya, IWT digunakan untuk memisahkan citra menjadi komponen frekuensi tinggi dan rendah, dan watermark ditanamkan pada komponen frekuensi rendah untuk menjaga ketidaknampakan citra. Metode yang kami usulkan diuji dalam berbagai serangan pemrosesan gambar, kompresi, filter dan noise. Hasil uji coba menunjukkan bahwa metode ini mampu memberikan tingkat ketahanan yang tinggi terhadap berbagai serangan pada citra digital, sambil mempertahankan kualitas visual citra.

KATA KUNCI

Watermarking,Hessenberg Decompotion,Singular Value Decompotion,Integer Wavelet Transform


DAFTAR PUSTAKA

DAFTAR PUSTAKA

[1] R. Wang, C. Lin, Q. Zhao, and F. Zhu, “WATERMARK FAKER: TOWARDS FORGERY OF DIGITAL IMAGE WATERMARKING,” in Proceedings - IEEE International Conference on Multimedia and Expo, IEEE Computer Society, 2021. doi: 10.1109/ICME51207.2021.9428410.

[2] S. Gupta, K. Saluja, V. Solanki, K. Kaur, P. Singla, and M. Shahid, “Efficient methods for digital image watermarking and information embedding,” Measurement: Sensors, vol. 24, Dec. 2022, doi: 10.1016/j.measen.2022.100520.

[3] G. Dhevanandhini and G. Yamuna, “An effective and secure video watermarking using hybrid technique,” Multimed Syst, vol. 27, no. 5, pp. 953–967, Oct. 2021, doi: 10.1007/s00530-021-00765-x.

[4] H. Rhayma, A. Makhloufi, H. Hamam, and A. Ben Hamida, “Semi-fragile watermarking scheme based on perceptual hash function (PHF) for image tampering detection,” Multimed Tools Appl, vol. 80, no. 17, pp. 26813– 26832, Jul. 2021, doi: 10.1007/s11042-021-10886-0.

[5] P. Kadian, S. M. Arora, and N. Arora, “Robust Digital Watermarking Techniques for Copyright Protection of Digital Data: A Survey,” Wireless Personal Communications, vol. 118, no. 4. Springer, pp. 3225–3249, Jun. 01, 2021. doi: 10.1007/s11277-021-08177-w.

[6] R. Hu and S. Xiang, “Cover-lossless robust image watermarking against geometric deformations,” IEEE Transactions on Image Processing, vol. 30, pp. 318–331, 2021, doi: 10.1109/TIP.2020.3036727.

[7] W. Sun, J. Zhou, Y. Li, M. Cheung, and J. She, “Robust High-Capacity Watermarking over Online Social Network Shared Images,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 3, pp. 1208–1221, Mar. 2021, doi: 10.1109/TCSVT.2020.2998476.

[8] T. Zhu, W. Qu, and W. Cao, “An optimized image watermarking algorithm based on SVD and IWT,” Journal of Supercomputing, vol. 78, no. 1, pp. 222–237, Jan. 2022, doi: 10.1007/s11227-021-03886-2.

[9] J. Liu et al., “An Optimized Image Watermarking Method Based on HD and SVD in DWT Domain,” IEEE Access, vol. 7, pp. 80849–80860, 2019, doi: 10.1109/ACCESS.2019.2915596.

[10] S. Sharma, J. J. Zou, and G. Fang, “A Novel Multipurpose Watermarking Scheme Capable of Protecting and Authenticating Images with Tamper Detection and Localisation Abilities,” IEEE Access, vol. 10, pp. 85677– 85700, 2022, doi: 10.1109/ACCESS.2022.3198963.

[11] W. Lu, L. Li, Y. He, J. Wei, and N. N. Xiong, “RFPS: A Robust Feature Points Detection of Audio Watermarking for against Desynchronization Attacks in Cyber Security,” IEEE Access, vol. 8, pp. 63643–63653, 2020, doi: 10.1109/ACCESS.2020.2984283.

[12] F. Ernawan and D. Ariatmanto, “Image watermarking based on integer wavelet transform-singular value decomposition with variance pixels,” International Journal of Electrical and Computer Engineering, vol. 9, no. 3, pp. 2185–2195, Jun. 2019, doi: 10.11591/ijece.v9i3.pp2185-2195. Program Studi Ilmu Komputer (S2) Universitas Nusa Mandiri 55

[13] O. P. Singh and A. K. Singh, “A robust information hiding algorithm based on lossless encryption and NSCT-HD-SVD,” Mach Vis Appl, vol. 32, no. 4, Jul. 2021, doi: 10.1007/s00138-021-01227-0.

[14] Y. Luo et al., “A multi-scale image watermarking based on integer wavelet transform and singular value decomposition,” Expert Syst Appl, vol. 168, Apr. 2021, doi: 10.1016/j.eswa.2020.114272.

[15] M. Begum, J. Ferdush, and M. S. Uddin, “A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 8, pp. 5856–5867, Sep. 2022, doi: 10.1016/j.jksuci.2021.07.012.

[16] F. Ernawan and M. N. Kabir, “A block-based RDWT-SVD image watermarking method using human visual system characteristics,” Visual Computer, vol. 36, no. 1, pp. 19–37, Jan. 2020, doi: 10.1007/s00371-018- 1567-x.

[17] D. G. Savakar and A. Ghuli, “Robust Invisible Digital Image Watermarking Using Hybrid Scheme,” Arab J Sci Eng, vol. 44, no. 4, pp. 3995–4008, Apr. 2019, doi: 10.1007/s13369-019-03751-8.

[18] O. Evsutin, A. Melman, and R. Meshcheryakov, “Digital steganography and watermarking for digital images: A review of current research directions,” IEEE Access, vol. 8, pp. 166589–166611, 2020, doi: 10.1109/ACCESS.2020.3022779.

[19] N. Agarwal, A. K. Singh, and P. K. Singh, “Survey of robust and imperceptible watermarking,” Multimed Tools Appl, vol. 78, no. 7, pp. 8603–8633, Apr. 2019, doi: 10.1007/s11042-018-7128-5.

[20] F. Ernawan, M. Ramalingam, A. S. Sadiq, and Z. Mustaffa, “An Improved Imperceptibility and Robustness of 4x4 DCT-SVD Image Watermarking Using Modified Entropy,” Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 , vol. 9, no. 1, pp. 2–7, 2017.

[21] R. Sinhal, I. A. Ansari, and C. W. Ahn, “Blind Image Watermarking for Localization and Restoration of Color Images,” IEEE Access, vol. 8, pp. 200157–200169, 2020, doi: 10.1109/ACCESS.2020.3035428.

[22] F. Ernawan and D. Ariatmanto, “Image watermarking based on integer wavelet transform-singular value decomposition with variance pixels,” International Journal of Electrical and Computer Engineering, vol. 9, no. 3, pp. 2185–2195, Jun. 2019, doi: 10.11591/ijece.v9i3.pp2185-2195.

[23] Q. Liu, S. Yang, J. Liu, P. Xiong, and M. Zhou, “A discrete wavelet transform and singular value decomposition-based digital video watermark method,” Appl Math Model, vol. 85, pp. 273–293, Sep. 2020, doi: 10.1016/j.apm.2020.04.015.

[24] J. Liu et al., “An Optimized Image Watermarking Method Based on HD and SVD in DWT Domain,” IEEE Access, vol. 7, pp. 80849–80860, 2019, doi: 10.1109/ACCESS.2019.2915596.

[25] Z. Li, H. Zhang, X. Liu, C. Wang, and X. Wang, “Blind and safetyenhanced dual watermarking algorithm with chaotic system encryption based on RHFM and DWT-DCT,” Digital Signal Processing: A Review Journal, vol. 115, Aug. 2021, doi: 10.1016/j.dsp.2021.103062. Program Studi Ilmu Komputer (S2) Universitas Nusa Mandiri 56

[26] R. A. Alotaibi and L. A. Elrefaei, “Text-image watermarking based on integer wavelet transform (IWT) and discrete cosine transform (DCT),” Applied Computing and Informatics, vol. 15, no. 2, pp. 191–202, Jul. 2019, doi: 10.1016/j.aci.2018.06.003.

[27] A. Durafe and V. Patidar, “Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 7, pp. 4483– 4498, Jul. 2022, doi: 10.1016/j.jksuci.2020.10.008.

[28] H. T. Hu, L. Y. Hsu, and H. H. Chou, “An improved SVD-based blind color image watermarking algorithm with mixed modulation incorporated,” Inf Sci (N Y), vol. 519, pp. 161–182, May 2020, doi: 10.1016/j.ins.2020.01.019.

[29] W. H. Alshoura, Z. Zainol, J. Sen Teh, and M. Alawida, “A New Chaotic Image Watermarking Scheme Based on SVD and IWT,” IEEE Access, vol. 8, pp. 43391–43406, 2020, doi: 10.1109/ACCESS.2020.2978186.

[30] N. Zermi, A. Khaldi, R. Kafi, F. Kahlessenane, and S. Euschi, “A DWTSVD based robust digital watermarking for medical image security,” Forensic Sci Int, vol. 320, Mar. 2021, doi: 10.1016/j.forsciint.2021.110691.

[31] T. K. Araghi and A. A. Manaf, “An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD,” Future Generation Computer Systems, vol. 101, pp. 1223– 1246, Dec. 2019, doi: 10.1016/j.future.2019.07.064.

[32] S. Sharma, H. Sharma, and J. B. Sharma, “An adaptive color image watermarking using RDWT-SVD and artificial bee colony based quality metric strength factor optimization,” Applied Soft Computing Journal, vol. 84, Nov. 2019, doi: 10.1016/j.asoc.2019.105696.

[33] L. Meng, L. Liu, G. Tian, and X. Wang, “An adaptive reversible watermarking in IWT domain,” Multimed Tools Appl, vol. 80, no. 1, pp. 711–735, Jan. 2021, doi: 10.1007/s11042-020-09686-9.

[34] E. Najafi and K. Loukhaoukha, “Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform,” Journal of Information Security and Applications, vol. 44, pp. 144–156, Feb. 2019, doi: 10.1016/j.jisa.2018.12.002.

[35] S. Arunkumar, V. Subramaniyaswamy, V. Vijayakumar, N. Chilamkurti, and R. Logesh, “SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images,” Measurement (Lond), vol. 139, pp. 426–437, Jun. 2019, doi: 10.1016/j.measurement.2019.02.069.

[36] H. T. Hu and T. T. Lee, “Frame-synchronized blind speech watermarking via improved adaptive mean modulation and perceptual-based additive modulation in DWT domain,” Digital Signal Processing: A Review Journal, vol. 87, pp. 75–85, Apr. 2019, doi: 10.1016/j.dsp.2019.01.006.

[37] L. Zhu et al., “A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding,” Signal Processing, vol. 175, Oct. 2020, doi: 10.1016/j.sigpro.2020.107629.

[38] N. Zermi, A. Khaldi, M. R. Kafi, F. Kahlessenane, and S. Euschi, “Robust SVD-based schemes for medical image watermarking,” Microprocess Microsyst, vol. 84, Jul. 2021, doi: 10.1016/j.micpro.2021.104134. Program Studi Ilmu Komputer (S2) Universitas Nusa Mandiri 57

[39] J. Liu et al., “An Optimized Image Watermarking Method Based on HD and SVD in DWT Domain,” IEEE Access, vol. 7, no. c, pp. 80849–80860, 2019, doi: 10.1109/ACCESS.2019.2915596.

Detail Informasi

Tesis ini ditulis oleh :

  • Nama : AGUNG SUDRAJAT
  • NIM : 14210201
  • Prodi : Ilmu Komputer
  • Kampus : Margonda
  • Tahun : 2023
  • Periode : I
  • Pembimbing : Ferda Ernawan, M.Sc, Ph.D
  • Asisten :
  • Kode : 0026.S2.IK.TESIS.I.2023
  • Diinput oleh : NZH
  • Terakhir update : 11 Juni 2024
  • Dilihat : 77 kali

TENTANG PERPUSTAKAAN


PERPUSTAKAAN UNIVERSITAS NUSA MANDIRI


E-Library Perpustakaan Universitas Nusa Mandiri merupakan platform digital yang menyedikan akses informasi di lingkungan kampus Universitas Nusa Mandiri seperti akses koleksi buku, jurnal, e-book dan sebagainya.


INFORMASI


Alamat : Jln. Jatiwaringin Raya No.02 RT08 RW 013 Kelurahan Cipinang Melayu Kecamatan Makassar Jakarta Timur

Email : perpustakaan@nusamandiri.ac.id

Jam Operasional
Senin - Jumat : 08.00 s/d 20.00 WIB
Isitirahat Siang : 12.00 s/d 13.00 WIB
Istirahat Sore : 18.00 s/d 19.00 WIB

Perpustakaan Universitas Nusa Mandiri @ 2020