UPSI Digital Repository (UDRep)
Start | FAQ | About

QR Code Link :

Type :article
Subject :Q Science (General)
ISSN :1097-024X
Main Author :Zaidan, B. B.
Additional Authors :Zaidan, A. A.
Abdul Karim, H.
Ahmad, N. N.
Title :A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi-criteria analysis based on 'large-scale data' (IR)
Place of Production :Wiley
Year of Publication :2017
PDF Full Text :The author has requested the full text of this item to be restricted.

Abstract :
Digital watermarking evaluation and benchmarking are challenging tasks because of multiple evaluation and conflicting criteria. A few approaches have been presented to implement digital watermarking evaluation and benchmarking frameworks. However, these approaches still possess a number of limitations, such as fixing several attributes on the account of other attributes. Well‐known benchmarking approaches are limited to robust watermarking. Therefore, this paper presents a new methodology for digital watermarking evaluation and benchmarking based on large‐scale data by using external evaluators and a group decision making context. Two experiments are performed. In the first experiment, a noise gate‐based digital watermarking approach is developed, and the scheme for the noise gate digital watermarking approach is enhanced. Sixty audio samples from different audio styles are tested with two algorithms. A total of 120 samples were evaluated according to three different metrics, namely, quality, payload, and complexity, to generate a set of digital watermarking samples. In the second experiment, the situation in which digital watermarking evaluators have different preferences is discussed. Weight measurement with a decision making solution is required to solve this issue. The analytic hierarchy process is used to measure evaluator preference. In the decision making solution, the technique for order of preference by similarity to the ideal solution with different contexts (e.g., individual and group) is utilized. Therefore, selecting the proper context with different aggregation operators to benchmark the results of experiment 1 (i.e., digital watermarking approaches) is recommended. The findings of this research are as follows: (1) group and individual decision making provide the same result in this case study. However, in the case of selection where the priority weights are generated from the evaluators, group decision making is the recommended solution to solve the trade‐off reflected in the benchmarking process for digital watermarking approaches. (2) Internal and external aggregations show that the enhanced watermarking approach demonstrates better performance than the original watermarking approach. © 2016 The Authors.

References

1 Petitcolas, FAP. Watermarking schemes evaluation. IEEE Signal Processing Magazine 2000; 17( 5): 58– 64. 2 Zaidan, AA, Zaidan, BB, Abdulrazzaq, MM, Raji, RZ, Mohammed, SM. Implementation stage for high securing cover‐file of hidden data using computation between cryptography and steganography. International Conference on Computer Engineering and Applications (ICCEA09), Telecom Technology and Applications (TTA) 2009; 19( 6): 482– 489. 3 Zaidan, AA, Othman, F, Zaidan, BB, Raji, RZ, Hasan, AK, Naji, AW. Securing cover‐file without limitation of hidden data size using computation between cryptography and steganography. Proceedings of the World Congress on Engineering 2009; I: 1– 7. 4 Eltahir, ME, Kiah, LM, Zaidan, BB, Zaidan, AA. High rate video streaming steganography. Future Computer and Communication. ICFCC 2009. International Conference on, 2009; 672‐ 675 5 Khalifa, OO, Naji, AW, Zaidan, AA, Zaidan, BB, Hameed, SA. Novel approach of hidden data in the (unused area 2 within EXE file) using computation between cryptography and steganography. International Journal of Computer Science and Network Security (IJCSNS) 2010; 9( 5): 294– 300 6 Majeed, A, Mat Kiah, ML, Madhloom, HT, Zaidan, BB, Zaidan, AA. Novel approach for high secure and high rate data hidden in the image using image texture analysis. International Journal of Engineering & Technology 2009; 1( 1): 63– 69 7 Alam, GM, Mat Kiah, ML, Zaidan, BB, Zaidan, AA, Alanazi, HO. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: analytical study. Scientific Research and Essays 2010; 5( 21): 3254– 3260 8 Zaidan, AA, Zaidan, BB, Alaa Taqa, Y, Kanar Sami, M, Alam, GM, Hamid Jalab, A. Novel multi‐cover steganography using remote sensing image and general recursion neural cryptosystem. International Journal of the Physical Sciences 2010; 5( 11): 1776– 1786 9 Cvejic, N, Seppänen, T. Fusing digital audio watermarking and authentication in diverse signal domains. Proceedings of the European Signal Processing Conference. University Of Oulu, Finland, 2005; 84‐ 87 10 Cvejic, N, Seppiinen, T. Channel capacity of high Bit rate audio data hiding algorithms in diverse transform domains. International Symposium on Communications and Informatian Technologies (ISCIT 2004). Ssppom, Japan, 2004 11 Zaidan, AA, Zaidan, BB, Majeed, A. High securing cover‐file of hidden data using statistical technique and AES encryption algorithm. World Academy of Science Engineering and Technology (WASET) 2009; 54: 468– 479 12 Zaidan, AA, Zaidan, BB, Othman, F. New technique of hidden data in PE‐file with in unused area one. International Journal of Computer and Electrical Engineering 2009; 1( 5): 642– 650 13 Taqa, A, Zaidan, AA, Zaidan, BB. New framework for high secure data hidden in the MPEG using AES encryption algorithm. International Journal of Computer and Electrical Engineering (IJCEE) 2009; 1( 5): 589– 595 14 Naji, AW, Hameed, SA, Zaidan, BB, Al‐Khateeb, WF, Khalifa, OO, Zaidan, AA, Gunawan, TS. Novel framework for hidden data in the image page within executable file using computation between advanced encryption standard and distortion. International Journal of Computer Science and Information Security (IJCSIS) 2010; 3( 1): 73– 78 15 Naji, AW, Zaidan, AA, Zaidan, BB, Muhamadi, IAS. Novel approach for cover file of hidden data in the unused area two within EXE file using distortion techniques and advance encryption standard. Proceeding of World Academy of Science Engineering and Technology (WASET) 2010; 56: 498– 502 16 Augustine, RJ, Devassia, V. A robust audio watermarking in frequency domain. International Conference on Artificial Intelligence, Knowledge Engineering and Data Bases, Madrid, Spain, World Scientific and Engineering Academy and Society (WSEAS), 2006 17 Takahashi, T, Lee, W. An assessment of VoIP covert channel threats. Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on, 2007 18 Zhang, HJ, Tang, HJ. A novel image steganography algorithm against statistical analysis. Proceedings of the Sixth International Conference on Machine Learning and Cybernetics. Hong Kong, 2007; 3884‐ 3888 19 Shahreza, SS, Shalmani, MTM. High capacity error free wavelet domain speech steganography. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on, 2008


This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials.
You may use the digitized material for private study, scholarship, or research.

Back to previous page

Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries with this repository, kindly contact us at pustakasys@upsi.edu.my or Whatsapp +60163630263 (Office hours only)