Implementasi Algoritma Blind Watermarking Menggunakan Metode Fractional Fourier Transform Dan Visual Cryptography

Mahmudah, Mir’atul (2014) Implementasi Algoritma Blind Watermarking Menggunakan Metode Fractional Fourier Transform Dan Visual Cryptography. Other thesis, Insititut Teknologi Sepuluh Nopember.

[thumbnail of 5110100131_Undergraduate_Thesis.pdf] Text
5110100131_Undergraduate_Thesis.pdf

Download (6MB)

Abstract

Digital image watermarking merupakan sebuah teknik yang digunakan untuk menyembunyikan informasi ke dalam citra digital. Algoritma watermarking yang dapat mengekstraksi citra watermark tanpa menggunakan informasi citra host disebut blind watermarking. Skema ini dinilai lebih efektif dan efisien, karena dapat menjaga keberadaan citra host asli. Pada tugas akhir ini penulis mengusulkan implementasi algoritma blind watermarking menggunakan metode fractional Fourier transform dan visual cryptography untuk memperbaiki kelemahan algoritma blind watermarking konvensional. Tidak seperti watermarking konvensional, algoritma yang diusulkan dapat melakukan watermarking tanpa harus memodifikasi citra host, sehingga kualitas citra host tetap tinggi. Visual cryptography degan konsep visual secret sharing digunakan untuk membangun dua bagian dari citra watermark, yaitu master share dan ownership share. Master share dibangun dari fitur citra host yang didapatkan dengan melakukan transformasi citra dan singular value decomposition. Sedangkan ownership share dibangun dari master share dan citra watermark menggunakan teknik visual cryptography. Ownership share harus didaftarkan kepemilikannnya untuk keamanan lebih lanjut. Proses identifikasi citra watermark pada skema ini dapat dilakukan dengan cara menumpuk master share dari citra yang diklaim dan ownership share yang sudah disimpan. Hasil uji coba menunjukkan bahwa ownership share yang dihasilkan hanya dapat digunakan untuk mengektraksi citra yang bersangkutan. Citra watermark yang disisipkan juga memiliki ketahanan yang baik terhadap berbagai kemungkinan gangguan, seperti blurring, sharpening, kompresi JPEG, resizing, penambahan derau, rotasi dan cropping.
=============================================================================================================================
Digital image watermarking is technique wich can used to hide information. Watermarking scheme wich can extract the watermark image without using the host image is called blind watermarking. This scheme is more effective and efficient, because it can maintain the existence of the original host image. In this final project the author proposes implementation of blind watermarking algorithm using fractional Fourier transform and the visual cryptography to rectify the shortcomings of conventional blind watermarking. Unlike the conventional watermarking, the proposed algorithm can perform watermarking without the host image, so the quality of host image is high. Visual cryptography with visual secret sharing scheme is used to generate two different shares, namely the master share and the ownership share. Features of the original image are extracted by performing image transformation and singular value decomposition, and are used to generate the master share.The ownership share is generated with help of master share and watermark images using visual cryptography technique. Ownership share is registered at some certification authority which can be used for checking authenticity of image or digitized data in case of any attack.The process of identification of the watermark image on this scheme can be reveal by stacking the master share of the watermarked image and the ownership share. The experimental results show that the ownership share only can be used to extract watermark from the right host image. The watermark image has also good robustness from various attacks, such as blurring, sharpening, JPEG compression, noise addition, rotation and cropping.

Item Type: Thesis (Other)
Additional Information: RSIf 005.82 Mah i
Uncontrolled Keywords: Blind watermarking, fractional Fourier transform, singular value decomposition, visual secret sharing
Subjects: Q Science > QA Mathematics > QA76.9.A25 Computer security. Digital forensic. Data encryption (Computer science)
Divisions: Faculty of Intelligent Electrical and Informatics Technology (ELECTICS) > Informatics Engineering > 55201-(S1) Undergraduate Thesis
Depositing User: Mr. Marsudiyana -
Date Deposited: 25 Oct 2023 06:38
Last Modified: 27 Oct 2023 08:23
URI: http://repository.its.ac.id/id/eprint/104994

Actions (login required)

View Item View Item