CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Enhanced Watermarking for Copyright Protection using DWT-SVD Approach

by Vijay Kumar Patil, Rashmi Nigoti
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 1
Year of Publication: 2015
Authors: Vijay Kumar Patil, Rashmi Nigoti
10.5120/ijca2015907241

Vijay Kumar Patil, Rashmi Nigoti . An Enhanced Watermarking for Copyright Protection using DWT-SVD Approach. International Journal of Computer Applications. 132, 1 ( December 2015), 1-5. DOI=10.5120/ijca2015907241

@article{ 10.5120/ijca2015907241,
author = { Vijay Kumar Patil, Rashmi Nigoti },
title = { An Enhanced Watermarking for Copyright Protection using DWT-SVD Approach },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 1 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number1/23555-2015907241/ },
doi = { 10.5120/ijca2015907241 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:27:55.853472+05:30
%A Vijay Kumar Patil
%A Rashmi Nigoti
%T An Enhanced Watermarking for Copyright Protection using DWT-SVD Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 1
%P 1-5
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the fast improvement in information technology and multimedia, the need of digital data is enlarging every day while the speed of data over networks has passed over the crossbars. So it becomes important to protect our data from piracy and also it’s very challenging today. There is crucial need to secure the copyright of individual's creation, to overcome from these types of problem. Digital Watermarking is treated as a solution to secure the multimedia data. Digital watermarking is hiding information in any form- audio, video, text, and image in original data without humiliating its perceptual quality. Watermarking is done for data authentication, security, and copyright protection of the original data. Copyright protection concerns the positive identification of content ownership as to protect the rights of the owner. In copyright protection robust watermark can be used because they are persistently combined with an image. Attempts to remove the watermark should result in serious degradation of image’s visual quality. The detection of watermark in an image perhaps used to find the copyright holder. This paper discusses the latest method of watermarking for copyright protection. The performance parameters used to evaluate results are Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). High values of PSNR are considered as it shows the good imperceptibility of the techniques used.

References
  1. Preeti Parashar and Rajeev Kumar Singh, “A Survey: Digital Image Watermarking Techniques”, International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 7, No. 6 (2014), pp. 111-124
  2. L. Robert, T. Shanmugapriya, ”A Study on Digital Watermarking Techniques”, International Journal of Recent Trends in Engineering, vol. 1, no. 2, May (2010).
  3. N. Chandrakar, J. Baggaa, ”Performance Comparison of Digital Image Watermarking Techniques: A Survey”, International Journal of computer Application Technology and Research, vol. 2, no. 2, (2013), pp. 126-130.
  4. Md. Maklachur Rahman, “A DWT, DCT AND SVD based watermarking technique to protect the image piracy”, International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT), Vol. 4, No. 2, June 2013.
  5. F.Daraee, S.Mozaffari, “Watermarking in binary document images using fractal codes”, Pattern Recognition Letter, (2013).
  6. N.Tiwari, M. k. Ramaiya, Monika Sharma, “Digital watermarking using DWT and DES”, IEEE (2013).
  7. S.S.Gonge, J. W. Bakal, “Robust Digital Watermarking Techniques by Using DCT and Spread Spectrum”, International Journal of Electrical, Electronics and Data Communication, ISSN: 2320-2084, vol. 1, no. 2, (2013).
  8. Prabhishek Singh, R S Chadha “A Survey of Digital Watermarking Techniques, Applications and Attacks”, International Journal of Engineering and Innovative Technology (IJEIT), Volume 2, Issue 9, March (2013) ISSN: 2277-3754
  9. G.Rafael, C. Gonzalez and R. E. Woods, “Digital Image Processing”, Third Edition, (2008).
  10. Amit Kumar Singh, Nomit Sharma, et al. “A Novel Technique for Digital Image Watermarking in Spatial Domain”, 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, (2012).
  11. Sunanda Dutt, Dr. Asoke Nath “ Data Authentication using Digital Watermarking”, International Journal of Advance Research in Computer Science and Management Studies, Volume 2, Issue 12, December (2014),
  12. L. Li and X. Li,” Watermarking Protocol for Broadcast Monitoring”, International Conference on E business and E-Government (ICEE) (2010).
  13. D. Zhang, S. Xu, Y. Wang, J. Zhang and Y. Li, ”A Digital Fingerprinting Scheme of Digital Image”. International Conference on Computational Intelligence and Software Engineerin (CISE) (2010).
  14. S. Emmanuel, A. P. Vinod, D. Rajan and C.K. Heng, “An Authentication Watermarking Scheme with Transaction Tracking Enabled”, Digital Ecosystem and Technologies Conference, 2007.DEST’07 Inaugural IEEE-IES.
  15. Y.-C. Wang and J.-f. Niu, “Research on Digital Content Copyright Protection System”, IEEE International Conference on Network Infrastructure and Digital Content, 2009. IC-NIDC (2009).
  16. S.-L. Hsieh, C.-P. Yeh and I-J. Tsai, “An Image Copyright Protection Scheme with Tamper Detection Capability”, Symposia and Workshops on Ubiquitous, Autonomic and trusted Computing, 2009.UIC-ATC’09
  17. Z. Ni, Y.Q. Shi, N. Ansari, W. Su, Q. Sun and X. Lin, “Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication”, IEEE Transactions on Circuits and Systems for Video Technology, vol. 18.
  18. J. Zhu, Q. Wei, J. Xiao and Y. Wang,” A Fragile Software Watermarking Algorithm for Content Authentication”, IEEE Youth Conference on Information, Computing and Telecommunication, 2009.YC-ICT’09.
  19. Aparna JR, Sonal Ayyappan “Comparison of Digital Watermarking Techniques” International Conference on Computation of Power Energy, Information and Communication (ICCPEIC), 2014
  20. Prasanna Shah, Toshanlal Meenpal, Ankit Sharma, Vivek Gupta, Amit Kotecha,” A DWT-SVD Based Digital Watermarking Technique for Copyright Protection”, International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO) – 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Watermark Singular Value Decomposition (SVD) Discrete Wavelet Transformation (DWT).