Soumik Das

Work place: Computer Science & Engineering, Jadavpur University, Kolkata, West Bengal - India



Research Interests: Computational Science and Engineering, Computational Engineering, Engineering


Soumik Das experienced in research for last 7 years in cryptographic and watermarking frameworks for digital content’s authentication and have published a number of research papers with ACM, Springer, IEEE, MacMillan, Academy Publisher and many more. For demonstrating the works and presenting papers Soumik has been invited to eminent Universities like— Jawaharlal Nehru University, NIT Rourkela, Thapar University, Calcutta University etc. Some of his papers are being archived by IEEE Xplore, IEEE CS Digital Library, ACM, DBLP, and Springer Link. He got registered in Computer Sc. & Engg. Dept, Jadavpur University as Ph.D. Scholar in early 2013 and completed his M.Tech. in IT from Bengal Engg. & Sc. University, Shibpur in the year 2009. He is also providing professional consultancy in web application development for several clients across the globe.

Author Articles
An Improved DCT based Image Watermarking Robust Against JPEG Compression and Other Attacks

By Soumik Das Monalisa Banerjee Atal Chaudhuri

DOI:, Pub. Date: 8 Sep. 2017

Rapid growth of internet service attains better security of multimedia contents now a days. Heading this problem a DCT-based color image watermarking framework is proposed in this article. Many earlier works have suggested embedding watermark information in the low frequencies of the image to enhance the robustness against JPEG compression because low frequencies hold the most significant information of the image and not affected significantly by the quantization method of JPEG algorithm. Replacement of low-frequency components with watermark directly may incur undesirable degradation to the image quality. To preserve the visual quality of watermarked images, we are proposing a watermarking framework that adjusts the DCT low-frequency coefficients by scaled averaging. The security issue is well-taken care with double secret keys. Experimental result set demonstrates that the embedded watermark can be extracted efficiently from the JPEG-compressed images even after very high compression, re-watermarking, other image processing attacks. The extraction algorithm is blind i.e., neither host image nor the watermark is needed at the time of extraction.

[...] Read more.
Other Articles