{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T19:53:14Z","timestamp":1767901994242,"version":"3.49.0"},"reference-count":49,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10,1]]},"abstract":"<p>The proliferation of information and communication technology has made exchange of information easier than ever. Security, Duplication and manipulation of information in such a scenario has become a major challenge to the research community round the globe. Digital watermarking has been found to be a potent tool to deal with such issues. A secure and robust image watermarking scheme based on DC coefficient modification in pixel domain and chaotic encryption has been presented in this paper. The cover image has been divided into 8\u00d78 sub-blocks and instead of computing DC coefficient using Discrete Cosine Transform (DCTI, the authors compute DC coefficient of each block in spatial domain. Watermark bits are embedded by modifying DC coefficients of various blocks in spatial domain. The quantum of change to be brought in various pixels of a block for embedding watermark bit depends upon DC coefficient of respective blocks, nature of watermark bit (0 or 1) to be embedded and the adjustment factor. The security of embedded watermark has been taken care of by using chaotic encryption. Experimental investigations show that besides being highly secure the proposed technique is robust to both signal processing and geometric attacks. Further, the proposed scheme is computationally efficient as DC coefficient which holds the watermark information has been computed in pixel domain instead of using DCT on an image block.<\/p>","DOI":"10.4018\/jgim.2017100106","type":"journal-article","created":{"date-parts":[[2017,7,14]],"date-time":"2017-07-14T17:56:38Z","timestamp":1500054998000},"page":"80-102","source":"Crossref","is-referenced-by-count":30,"title":["Realization of a New Robust and Secure Watermarking Technique Using DC Coefficient Modification in Pixel Domain and Chaotic Encryption"],"prefix":"10.4018","volume":"25","author":[{"given":"Shabir A.","family":"Parah","sequence":"first","affiliation":[{"name":"Post Graduate Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, India"}]},{"given":"Javaid A.","family":"Sheikh","sequence":"additional","affiliation":[{"name":"Post Graduate Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8437-498X","authenticated-orcid":true,"given":"Nilanjan","family":"Dey","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Techno India College of Technology, Kolkata, India"}]},{"given":"G.M.","family":"Bhat","sequence":"additional","affiliation":[{"name":"Post Graduate Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, India"}]}],"member":"2432","reference":[{"key":"JGIM.2017100106-0","unstructured":"Bhat, G., Mustafa, M., Shabir, A., & Javaid, A. (2010). FPGA Implementation of Novel Complex PN Code Generator based data Scrambler and Descrambler. International journal of Science and Technology, 4(1), 125-135."},{"issue":"10","key":"JGIM.2017100106-1","doi-asserted-by":"crossref","first-page":"41","DOI":"10.17485\/ijst\/2009\/v2i10.14","article-title":"VHDL Modelling and Simulation of Data Scrambler and Descrambler for secure data communication.","volume":"2","author":"G.Bhat","year":"2009","journal-title":"Indian Journal of Science and Technology"},{"key":"JGIM.2017100106-2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-009-0433-2"},{"key":"JGIM.2017100106-3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1681-8"},{"key":"JGIM.2017100106-4","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1109\/CIMCA.2014.7057798","article-title":"Multi-thread video watermarking: A biomedical application.","author":"S.Bose","year":"2014","journal-title":"Proceedings of International Conference on Circuits, Communication, Control and Computing"},{"issue":"5","key":"JGIM.2017100106-5","first-page":"530","article-title":"A new robust digital image watermarking algorithm based on singular value decomposition and independent component analysis.","volume":"8","author":"R.Chen","year":"2013","journal-title":"J. Com. Inf. Tech."},{"key":"JGIM.2017100106-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2009.04.003"},{"key":"JGIM.2017100106-7","author":"I.Cox","year":"2008","journal-title":"Digital watermarking and steganography"},{"key":"JGIM.2017100106-8","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2013.08.018"},{"key":"JGIM.2017100106-9","doi-asserted-by":"publisher","DOI":"10.1145\/2388576.2388588"},{"key":"JGIM.2017100106-10","first-page":"224","article-title":"DWT-DCT-SVD based intravascular ultrasound video watermarking","author":"N.Dey","year":"2012","journal-title":"Proceedings of Information and Communication Technologies"},{"key":"JGIM.2017100106-11","doi-asserted-by":"publisher","DOI":"10.5815\/ijigsp.2012.07.04"},{"key":"JGIM.2017100106-12","doi-asserted-by":"publisher","DOI":"10.1201\/b16247-10"},{"key":"JGIM.2017100106-13","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIC.2013.057193"},{"key":"JGIM.2017100106-14","doi-asserted-by":"publisher","DOI":"10.1006\/jnca.2000.0128"},{"key":"JGIM.2017100106-15","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3200-6"},{"key":"JGIM.2017100106-16","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.870624"},{"key":"JGIM.2017100106-17","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.870624"},{"key":"JGIM.2017100106-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.03.009"},{"key":"JGIM.2017100106-19","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1932-3"},{"key":"JGIM.2017100106-20","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2010.2066770"},{"key":"JGIM.2017100106-21","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2013.08.021"},{"key":"JGIM.2017100106-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2009.06.004"},{"key":"JGIM.2017100106-23","doi-asserted-by":"publisher","DOI":"10.1109\/6046.985560"},{"key":"JGIM.2017100106-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.001"},{"key":"JGIM.2017100106-25","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-011-0794-1"},{"key":"JGIM.2017100106-26","first-page":"398","article-title":"A blind watermarking technology based on DCT do-main","author":"F.Ma","year":"2012","journal-title":"Proc. of the IEEE Int. Conf. on Computer Science and Service System"},{"key":"JGIM.2017100106-27","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-1946-z"},{"key":"JGIM.2017100106-28","unstructured":"Parah, S., Javaid, A., Farhana, A., & Bhat, G. (2015d). On the Realization of Robust Watermarking System for Medical Images. Proc. of 12th IEEE India International Conference (INDICON) on Electronics, Energy, Environment, Communication, Computers, Control (E3-C3), New Delhi, India (pp. 172-178)."},{"key":"JGIM.2017100106-29","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON.2015.7443595"},{"key":"JGIM.2017100106-30","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3127-y"},{"key":"JGIM.2017100106-31","doi-asserted-by":"publisher","DOI":"10.1109\/iNIS.2015.41"},{"key":"JGIM.2017100106-32","doi-asserted-by":"publisher","DOI":"10.1080\/00207217.2014.954635"},{"key":"JGIM.2017100106-33","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2016.02.005"},{"key":"JGIM.2017100106-34","first-page":"255","article-title":"A blind color image watermarking based on DC component in the spatial domain.","volume":"124","author":"S.Qingtang","year":"2013","journal-title":"Optik (Stuttgart)"},{"key":"JGIM.2017100106-35","first-page":"192","article-title":"Data hiding in ISB planes: A high capacity blind stenographic technique","author":"A.Shabir","year":"2012","journal-title":"Proc. of IEEE sponsored Intl. Conference INCOSET \u201812, Tamilnadu, India"},{"key":"JGIM.2017100106-36","first-page":"10141","article-title":"On the realization of a secure, high capacity data embedding technique using joint top-down and down- top embedding approach.","volume":"49","author":"A.Shabir","year":"2012","journal-title":"Elixir Comp. Sci. & Engg."},{"key":"JGIM.2017100106-37","doi-asserted-by":"crossref","unstructured":"Shabir, A., Javaid, A., & Bhat, G. (2013a). On the Realization of a spatial Domain Data Hiding Technique based on Intermediate Significant Bit Plane Embedding (ISBPE) and Post Embedding Pixel Adjustment (PEPA). Proceedings of IEEE International Conference on Multimedia Signal Processing and Communication Technologies IMPACT \u201813, AMU, Aligargh, India (pp. 51-55)","DOI":"10.1109\/MSPCT.2013.6782086"},{"key":"JGIM.2017100106-38","first-page":"113","article-title":"Data hiding in color images: A high capacity data hiding technique for covert communication","volume":"4","author":"A.Shabir","year":"2013","journal-title":"Computer Engineering and Intelligent Systems"},{"key":"JGIM.2017100106-39","first-page":"1","article-title":"High capacity data embedding using joint intermediate significant bit and least significant technique","volume":"2","author":"A.Shabir","year":"2013","journal-title":"International Journal of Information Engineering and Applications"},{"issue":"2","key":"JGIM.2017100106-40","first-page":"38","article-title":"A secure and efficient spatial domain data hiding technique based on pixel adjustment.","volume":"14","author":"A.Shabir","year":"2014","journal-title":"American Journal of Engineering and Technology Research"},{"key":"JGIM.2017100106-41","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.11.006"},{"key":"JGIM.2017100106-42","first-page":"198","article-title":"Fragility Evaluation Of Intermediate Significant Bit Embedding (ISBE) Based Digital Image Watermarking Scheme For Content Authentication","author":"A.Shabir","year":"2014","journal-title":"Proc. of International Conference on Electronics, Computers and Communication"},{"key":"JGIM.2017100106-43","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-015-0358-z"},{"key":"JGIM.2017100106-44","unstructured":"Shabir, A., Javaid, A., & Bhat G. (2012c). On The Realization Of Secure And Efficient Data Hiding System using ISB & LSB Technique. Engineering e-Transaction, 7(2), 48-53."},{"key":"JGIM.2017100106-45","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00122-X"},{"key":"JGIM.2017100106-46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92238-4"},{"key":"JGIM.2017100106-47","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0475-5"},{"key":"JGIM.2017100106-48","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.887086"}],"container-title":["Journal of Global Information Management"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=186814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T21:51:58Z","timestamp":1750629118000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/JGIM.2017100106"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2017,10,1]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,10]]}},"URL":"https:\/\/doi.org\/10.4018\/jgim.2017100106","relation":{},"ISSN":["1062-7375","1533-7995"],"issn-type":[{"value":"1062-7375","type":"print"},{"value":"1533-7995","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,1]]}}}