Document Type : Review Paper

Authors

University of Mosul - College of Computer Sciences and Mathematics

10.37652/juaps.2012.63238

Abstract

Authentication is a raised as one of the important subject in field of security. So many techniques for improving authentication were appeared during the last three decades.This paper presents authentication by using Karhunen-Loeve transformation for copyright authentication in digital image, where four various size of watermarking image used to embed them inside the least significant bits of the cover image. The application proved that using Karhunen-Loeve transformation is very useful to improve the authentication, where the watermarking image will appear clearly only when using all eigenvalues to retrieve the watermarking from the resulted image. The number of eigenvalues were studied to give their effect on the robustness of the authentication, the direct proportional relationship appeared between the number of used eigenvalues and the authentication.

Keywords

Main Subjects

[1] W. Shuo-zhong,(mar,2000).“Watermarking Based on Principal Component Analysis”. Journal Of Shanghai University (English Edition), ISSN 1007-6417, vol. 4, No.1, pp. 22-26.
[2] J. Anitha ; S. Pandian,  I. Alex,( September 2010). “A Color Image Digital Watermarking Scheme Based on SOFM”, International Journal of Computer Science Issues online at http://www.ijcsi.org; IJCSI, vol. 7, Issue 5.
[3]     P. Dafas and T. Stathaki, “Invisible texture  image watermarking using the Karhunen-Loeve transform”, to appear in the Proceedings of the 4th European Workshop on Image Analysis for Multimedia Interactive Services.  http://www.soi.city.ac.uk/~panos/papers/wiamis03.pdf   
[4] Karhunen And Loeve (KL) Transform and Hothelling Transform.          http://neuron.tuke.sk/~hudecm/science/9/9.html
[5]L. Qian, C. Li, Y. Zhang,(2010). “Fast Optimization Of PNN Based On Center Neighbor And  KLT”, Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao, pp. 1447-1452.
 [6]T. Acharya and A. K. Ray,(2005). Image Processing Principles and Applications,  A JOHN WILEY & SONS, MC., PUBLICATION.
[7]    P. Dafas, T. Stathaki,(2003). “Digital Image Watermarking Using Block-Based Karhunen -Loeve Transform”, to appear in: Image and Signal Processing and Analysis, 2003. ISPA 2003. Proceedings of the 3rd International Symposium on Issue, pp. 1072 - 1075 vol.2. ieeexplore.ieee.org› ... ›ConferencesImage and Signal Processing an
[8] G.A. GIRALDI, “KL Transform”
[9] W. Chuan-xu and L. Zuo-yong,(2008). “Face Detection Based on Skin Gaussian Model and KL Transform”, Journal: 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp.  522-525 Provider: IEEE Publisher.
[10] R. Wang,(2009). “Karhunen-Loeve Transform (KLT)".   http://fourier.eng.hmc.edu/e161/lectures/klt/node3.html
[11] J. Lindblad, “Computerized Image Analysis MN2”, Lecture 14,
www.it.uu.se/edu/course/homepage/bild2/ht05/Lectures/L14.pdf
[12] A. Levy and M. Lindenbaum, (2000). ”Sequential Karhunen–Loeve Basis Extraction and its Application to Images”, IEEE Transactions on Image Processing, Vol. 9, NO. 8, pp. 1371-1374 .
[13]F. JIN and S. DING, China P. R.,(2003). “Analysis and Application of K-L Transform Information Features”.
[14]H. Zhihua, W. Minghui,(2007). ”The Application of KL Transform to Remove Direct Wave in Ground Penetrating Radar Records”, Fourth International Conference on Image and Graphics; IEEE, pp. 133-138.
[15] M. Candik, D. Brechlerova,(2008). ” Digital Watermarking In Digital Images”, IEEE Xplore, pp.43-46.
[16] X.  Li, T.Nam, S. Lee, S. Kim,(2011). ”Digital watermarking in transform-domain based on Cellular Automata Transform”, IEEE Xplore, pp. 132-136 .