Call for Paper - January 2022 Edition
IJCA solicits original research papers for the January 2022 Edition. Last date of manuscript submission is December 20, 2021. Read More

Multi-parameter Watermarking for Digital Images

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Madhusudhan R. V., H. N. Suma

Madhusudhan R V. and H N Suma. Multi-parameter Watermarking for Digital Images. International Journal of Computer Applications 146(11):1-4, July 2016. BibTeX

	author = {Madhusudhan R. V. and H. N. Suma},
	title = {Multi-parameter Watermarking for Digital Images},
	journal = {International Journal of Computer Applications},
	issue_date = {July 2016},
	volume = {146},
	number = {11},
	month = {Jul},
	year = {2016},
	issn = {0975-8887},
	pages = {1-4},
	numpages = {4},
	url = {},
	doi = {10.5120/ijca2016910892},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The primary focus in today’s world is to secure digital images. The digital images are an integral entity in the entire health care management process, from scans to diagnosis to treatment and beyond. While the patient and the doctor(s) are engaged in the process, the digital images of the patient are available and accessible to many. The multi-parameter watermarking enables secure and robust method to enhance the complexity of the system to avert malicious attack. The ‘Privacy’ of the patient data is enhanced by means of an algorithm with multi-parameter watermarking; the Watermark designed will provide the ‘hard-wall’ against any unscrupulous attack on the images/system. Implementation outcome will be discussed; algorithm designed and developed to demonstrate a novel watermarking method by defining various parameters for watermarking. Deploying such watermarking methods into tools and procedures will help enhance the ‘Privacy’ and ‘Fiduciary’ relationships with which the patient’s data is shared between patient and a doctor. It is good to include a combination of methods, visible and invisible watermarks, open and blind watermarks to deceive the unauthorized user or an attacker. Designing the approach which embodies different parameters by using random sequences while the image is sliced with a key unknown to other than the owner (the provider) and actual consumer(s) is critical in providing security to the digital images.


  1. Nilchi, Ahmad R. Naghsh, and Ayoub Taheri. "A new robust digital image watermarking technique based on the Discrete Cosine Transform and Neural Network." Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium on. IEEE, 2008.
  2. RV, MADHUSUDHAN, and H. N. Suma. "A NOVEL MULTI-PARAMETER WATERMARKING SCHEME FOR DIGITAL IMAGES.", Journal of Machine Learning Technologies, ISSN: 2229-3981 & ISSN: 2229-399X Volume 3, Issue 1, 2013, pp.-090-096.
  4. Suhail, M. A., and M. S. Obaidat. "A robust digital watermarking technique."Electronics, Circuits and Systems, 2000. ICECS 2000. The 7th IEEE International Conference on. Vol. 2. IEEE, 2000.
  5. Song, Wei, et al. "Digital watermarking technique for digital medical images." Information Technology in Medicine and Education (ITME), 2012 International Symposium on. Vol. 2. IEEE, 2012.
  6. Chih-Wei Tang, Hsueh-Ming Hang; "A Feature-Based Robust Digital Image Watermarking Scheme". IEEE Transactions on Signal Processing, VOL 51, NO 4, April 2003: pg 950-959
  7. Pik Wah Chan, Michael R. Lyun and Roland T. Chin; "A Novel Scheme for Hybrid Digital Video Watermarking: Approach, Evaluation and Experimentation". IEEE Transactions on Circuits and Systems for Video Technology, VOL- 15, NO 12, December 2005: pg 1638-1649
  8. Beth, Thomas, and Dieter Gollmann. "Algorithm engineering for public key algorithms." IEEE Journal on selected areas in communications 7.4 (1989): 458-466


Digital Images, Privacy, Watermarking, Spatial Transform, Frequency Transform, Visible watermarking, Invisible Watermarking, Hard-wall, Fiduciary relationship, Provider, Consumer, Random number.