Robust Digital Watermarking on Vital Archives using Hybrid SVD and DWT Methods
Abstract
The development of Internet technology affects the dissemination of data, especially in vital government archives. This research uses a hybrid singular value decomposition (SVD) and discrete wavelet transform (DWT) method, which aims to protect the copyright of vital archives. The stages of the insertion and extraction process are carried out to test the effect of the alpha value on the quality (imperceptibility) and robustness of the inserted image by measuring the Peak Signal-to-Noise Ratio (PSNR), verifying similarity by measuring the Normalized Cross-Correlation (NC) and Structural Similarity Index (SSIM). The results of research with ten vital archives and a watermark protection logo in JPEG format with a size of 512x512 pixels obtained a maximum PSNR with a value of α = 0.01 of 41.0567 dB, NC of 0.98904, and SSIM of 0.98023 in the Cibereum Land Certificate. So, it can be proven that this method produces vital archive watermarks that can be extracted and are robust to JPEG compression attacks of 75%, median filtering 3x3, Gaussian noise 0.01, speckle noise 0.01, and salt and pepper noise 0.01 but not resistant to rotation 80 and cropping attacks 2%.
Downloads
References
A. G. Gani, “Pengenalan Teknologi Internet Serta Dampaknya,” Jurnal Sistem Informasi Universitas Suryadarma, vol. 2, Feb. 2014, doi: https://doi.org/10.35968/jsi.v2i2.49.
R. A. A. B. and P. A. M. I. Ukkas, “ “Teknik Pengamanan Data Dengan Steganografi Metode End Of File (EOF) Dan Kriptografi Vernam Cipher,’’,” Sebatik, vol. 17, pp. 20–26, Jan. 2017, Accessed: Jul. 22, 2022. [Online]. Available: https://jurnal.wicida.ac.id/index.php/sebatik/article/view/82.pdf
R. Munir, “Image Watermarking untuk Citra Berwarna dengan Metode Berbasis Korelasi dalam Ranah DCT,” Program Studi Teknik Informatika. Institut Teknologi Bandung. Bandung., 2010, Accessed: Jul. 30, 2022. [Online]. Available: https://Informatika.Stei.Itb.Ac.Id/~rinaldi.Munir/Penelitian/MakalahdiJurnalPETIR.Pdf.
J. K. F. T. L. and T. S. I. J. Cox, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transaction on Image Processing, vol. 6, no. 12, pp. 1673–1987, Dec. 1997, doi: doi:10.1109/83.650120.
Arsip Nasional Republik Indonesia, “Undang-Undang No. 43 Tahun 2009 Tentang Kearsipan,” Sekretariat Negara, no. 152. Jakarta, 2009. Accessed: Oct. 05, 2023. [Online]. Available: https://jdihn.go.id/files/4/2009uu043.pdf
Arsip Nasional Republik Indonesia, “Peraturan Pemerintah Republik Indonesia Nomor 28 Tahun 2012 Pelaksanaan Undang-Undang No. 43 Tahun 2009 Tentang Kearsipan.,” no. 41. Sekretariat Negara, Jakarta, 2005. Accessed: Oct. 05, 2023. [Online]. Available: https://jdih.kemenkeu.go.id/fullText/2012/28TAHUN2012PP.pdf
Kementerian Hukum dan Hak Asasi Manusia, “Peraturan Menteri Hukum dan Hak Asasi Mnausia Republik Indonesia Nomor 23 Tahun 2017 Tata Kelola Arsip Vital dan Arsip Terjaga di Lingkungan Kementerian Hukum dan Hak Asasi Manusia,” Sekretariat Negara, no. 1668. Jakarta, 2017.
K. Naoe and Y. Takefuji, “Damageless Information Hiding using Neural Network on YCbCr Domain,” 2008. [Online]. Available: https://www.researchgate.net/publication/252319078
Y. J. Chang, R. Z. Wang, and J. C. Lin, “A sharing-based fragile watermarking method for authentication and self-recovery of image tampering,” EURASIP J Adv Signal Process, vol. 2008, 2008, doi: 10.1155/2008/846967.
C. S. Shieh, H. C. Huang, F. H. Wang, and J. S. Pan, “Genetic watermarking based on transform-domain techniques,” Pattern Recognit, vol. 37, no. 3, pp. 555–565, 2004, doi: 10.1016/j.patcog.2003.07.003.
B. Isac and V. Santhi, “A Study on Digital Image and Video Watermarking Schemes using Neural Networks,” 2011.
R. Azhar, D. Tuwohingide, D. Kamudi, Sarimuddin, and N. Suciati, “Batik Image Classification Using SIFT Feature Extraction, Bag of Features and Support Vector Machine,” in Procedia Computer Science, Elsevier, 2015, pp. 24–30. doi: 10.1016/j.procs.2015.12.101.
L. R.-Y. and W. Lei. Z. Zhi-Ming, “Adaptive Watermark Scheme with RBF Neural Networks,” International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003, 2003, pp. 1517-1520.”.
A. , & B. H. (2017) Al-Haj, “Copyright protection of e-government document images using digital watermarking. 2017 3rd International Conference on Information Management (ICIM).”.
Y. Gangadhar, V. S. Giridhar Akula, and P. C. Reddy, “An evolutionary programming approach for securing medical images using a watermarking scheme in invariant discrete wavelet transformation,” Biomed Signal Process Control, vol. 43, pp. 31–40, May 2018, doi: 10.1016/j.bspc.2018.02.007.
H. Barouqa and A. Al-Haj, “Watermarking E-Government Document Images Using the Discrete Wavelets Transform and Schur Decomposition,” in 2021 7th International Conference on Information Management, ICIM 2021, Institute of Electrical and Electronics Engineers Inc., Mar. 2021, pp. 102–106. doi: 10.1109/ICIM52229.2021.9417146.
A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3. pp. 727–752, Mar. 2010. doi: 10.1016/j.sigpro.2009.08.010.
Madenda S. 2015., Pengolahan Citra Dan Video Digital : Teori, Aplikasi, Dan Pemrograman Menggunakan MATLAB. Jakarta: Erlangga. .
S. G. Mallat, “A Theory for Multiresolution Signal Decomposition: The Wavelet Representation,” 1989.
A. and M. A. (2010). Al-Haj, “Digital Audio Watermarking Based on the Discrete Wavelets Transform and Singular Value Decomposition. European Journal of Scientific Research, 39, 6-21.”.
A. G. Akritas and G. I. Malaschonok, “Applications of singular-value decomposition (SVD),” in Mathematics and Computers in Simulation, Sep. 2004, pp. 15–31. doi: 10.1016/j.matcom.2004.05.005.
J. Kardamis, “Audio watermarking techniques using singular value Audio watermarking techniques using singular value decomposition decomposition.” [Online]. Available: https://scholarworks.rit.edu/theses
W. C. Chen and M. S. Wang, “A fuzzy c-means clustering-based fragile watermarking scheme for image authentication,” Expert Syst Appl, vol. 36, no. 2 PART 1, pp. 1300–1307, 2009, doi: 10.1016/j.eswa.2007.11.018.
L. Qiao and K. Nahrstedt, “Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer’s Rights,” 1998. Accessed: Oct. 05, 2023. [Online]. Available: https://www.sciencedirect.com/science/article/abs/pii/S104732039890391
Copyright (c) 2023 Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright in each article belongs to the author
- The author acknowledges that the RESTI Journal (System Engineering and Information Technology) is the first publisher to publish with a license Creative Commons Attribution 4.0 International License.
- Authors can enter writing separately, arrange the non-exclusive distribution of manuscripts that have been published in this journal into other versions (eg sent to the author's institutional repository, publication in a book, etc.), by acknowledging that the manuscript has been published for the first time in the RESTI (Rekayasa Sistem dan Teknologi Informasi) journal ;