Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32759
Cellular Automata Based Robust Watermarking Architecture towards the VLSI Realization

Authors: V. H. Mankar, T. S. Das, S. K. Sarkar

Abstract:

In this paper, we have proposed a novel blind watermarking architecture towards its hardware implementation in VLSI. In order to facilitate this hardware realization, cellular automata (CA) concept is introduced. The CA has been already accepted as an attractive structure for VLSI implementation because of its modularity, parallelism, high performance and reliability. The hardware realizable multiresolution spread spectrum watermarking techniques are very few in numbers in spite of their best ever resiliency against signal impairments. This is because of the computational cost and complexity associated with their different filter banks and lifting techniques. The concept of cellular automata theory in order to form a new transform domain technique i.e. Cellular Automata Transform (CAT) have been incorporated. Since CA provides spreading sequences having very low cross-correlation properties, the CA based pseudorandom sequence generator is considered in the present work. Considering the watermarking technique as a digital communication process, an error control coding (ECC) must be incorporated in the data hiding schemes. Besides the hardware implementation of entire CA based data hiding technique, the individual blocks of the algorithm using CA provide the best result than that of some other methods irrespective of the hardware and software technique. The Cellular Automata Transform, CA based PN sequence generator, and CA ECC are the requisite blocks that are developed not only to meet the reliable hardware requirements but also for the basic spread spectrum watermarking features. The proposed algorithm shows statistical invisibility and resiliency against various common signal-processing operations. This algorithmic design utilizes the existing allocated bandwidth in the data transmission channel in a more efficient manner.

Keywords: Cellular automata, watermarking, error control coding, PN sequence, VLSI.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1085068

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2015

References:


[1] I. J. Cox, J. Killian, F. T. Leighton, T. Shamoon, "Secured Spread Spectrum Watermarking for Multimedia", IEEE Trans on ImageProcessing, vol. 6, pp 601-610, June 2000.
[2] C. T. Hsu, J. L. Wu, "Hidden signatures in images", Int. Conf. On Image Processing, vol. 3, Switzerland, Sept. 1996.
[3] P. Meerwald, A. Uhl, "A survey of wavelet-domain watermarking algorithms", Proc. of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, CA, USA4314, Jan. 2001.
[4] H. S. Malvar and D. A. F Florencio, "Improved Spread Spectrum: A new Modulation Technique for Robust Watermarking," IEEE Trans on signal processing, pp 898-905, April 2003.
[5] J. Mayer, A. V. Silverio, J. C. M. Bermudez, "On the Design of Pattern Sequences for Spread Spectrum Image Watermarking," InternationalTelecommunications Symposium, Brazil.
[6] Saraju P. Mohanty, N. Ranganathan and K. Balakrishnan, "Design of a Low Power ImageWatermarking Encoder using Dual Voltage and Frequency," VLSID2005.
[7] T. S. Das, A. K. Sau, and S. K. Sarkar, "Spread Spectrum Image Watermarking for Secured Multimedia Data Communication", on International Journal of Signal Processing, Vol.3, No.3, ISSN 1304- 4478, pp.148-157, (May, 2006).
[8] Niloy Ganguly, Biplab K Sikdar, Andreas Deutsch, Geoffrey Canright, and P Pal Chaudhuri, "A Survey on Cellular Automata".
[9] S. Nandi, B. K. Kar, and P. Pal Chaudhuri, "Theory and Applications of Cellular Automata in Cryptography," IEEE Transactions on Computers, Vol. 43, No. 12, December 1994.
[10] Dipanwita Roy Chowdhury, Saugata Basu, Indranil Sen Gupta, and Parimal Pal Chaudhuri, "Design of CAECC-Cellular Automata Based Error Correcting Code," IEEE Transactions On Computers, Vol. 43. No. 6, June 1994.
[11] Peter D. Hortensius, Robert D. Mcleod, Werner Pries, D. Michael Miller, And Howard C. Card, "Cellular Automata-Based Pseudorandom Number Generators for Built-In Self-Test," IEEE Transactions On Computer-Aided Design, Vol. 8. No. 8, August 1989.
[12] T. S. Das, V. H. Mankar, S. K. Sarkar, "Cellular Automata Based Robust Spread Spectrum Image Watermarking," Indian Conference on Intelligent Systems ICIS- 07, January 19-20, 2007.
[13] T. S. Das, V. H. Mankar, S. K. Sarkar, "Spread Spectrum based Robust Image Watermark Authentication," International Conference on Advanced Computing & Communications ICACC2007, February 9-10, 2007.
[14] S. K. Sarkar, et al., "A One Dimensional Cellular Automata Based Security Scheme Providing Both Authentication and Confidentiality", Journal of IEE, Vol. 87, pp. 1-7, May 2006.
[15] Marco Tomassini, Moshe Sipper, and Mathieu Perrenoud, "On the Generation of High-Quality Random Numbers by Two-Dimensional Cellular Automata," IEEE Transactions on Computers, Vol. 49, No. 10, October 2000.
[16] P. Dasgupta, S. Chattopadyay, I. Sengupta, "An ASIC for Cellular Automata based Message Authentication," In Proc. Intl. Conf. on VLSI Design, India, pages 538-541, January 1999.
[17] Reiko Shiba, Seok Kang and Yoshinao Aoki, "An Image Watermarking Technique using Cellular Automata Transform," IEEE conference proceedings, 2004.
[18] Kolin Paul, D. Roy Choudhury and P. Pal Chaudhuri, "Cellular Automata based Transform Coding for Image Compression".
[19] M. Mukherjee, N. Ganguly, and P. Pal Chaudhuri. Cellular Automata based Authentication. In Proc. of Fifth International Conference on Cellular Automata for Research and Industry, ACRI 2002, Switzerland, pages 259-269, October 2002.