CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Wavelet Based Digital Watermarking method using Thresholds on Intermediate Bit Values

by S.MaruthuPerumal, Dr.V.VijayaKumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 15 - Number 3
Year of Publication: 2011
Authors: S.MaruthuPerumal, Dr.V.VijayaKumar
10.5120/1926-2571

S.MaruthuPerumal, Dr.V.VijayaKumar . A Wavelet Based Digital Watermarking method using Thresholds on Intermediate Bit Values. International Journal of Computer Applications. 15, 3 ( February 2011), 29-36. DOI=10.5120/1926-2571

@article{ 10.5120/1926-2571,
author = { S.MaruthuPerumal, Dr.V.VijayaKumar },
title = { A Wavelet Based Digital Watermarking method using Thresholds on Intermediate Bit Values },
journal = { International Journal of Computer Applications },
issue_date = { February 2011 },
volume = { 15 },
number = { 3 },
month = { February },
year = { 2011 },
issn = { 0975-8887 },
pages = { 29-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume15/number3/1926-2571/ },
doi = { 10.5120/1926-2571 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:03:14.236491+05:30
%A S.MaruthuPerumal
%A Dr.V.VijayaKumar
%T A Wavelet Based Digital Watermarking method using Thresholds on Intermediate Bit Values
%J International Journal of Computer Applications
%@ 0975-8887
%V 15
%N 3
%P 29-36
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Many researchers are concentrating to provide a high confidentiality and data integrity to protect against unauthorized access. The network security is becoming a very important and crucial aspect as the number of data being exchanged and number of users being communicated on the internet increases rapidly day by day. Therefore confidentiality of users and data integrity are required to protect against unauthorized access. To address the issues of authentication, the present paper proposes a novel wavelet based Digital Watermarking (DW) approach with two steps. In the first step a Threshold, based on Intermediate Bit Values (TIBV) of image pixels is proposed by selecting the image pixel for inserting the watermark. In the second step Alattar’s method is used for inserting the Digital Watermark (DW) bits in the selected pixels of the first step. These two steps make the proposed TIBV-DW method as more effective and difficult to break. To test the efficacy of the proposed TIBV-DW method, various statistical measures by considering combinations of various attacks are evaluated on various experimental images, which indicate high robustness, imperceptibility, un-ambiguity, confidentiality and integrity of the present method.

References
  1. Ju-YuanHsiao, Ke-FanChan, J.MorrisChang, “Block Based Reversible Data Embedding”, Signal Processing ‘89 (2009) 556–569
  2. S.MaruthuPerumal, B.VijayaKumar, L.Sumalatha and Dr V Vijayakumar, “Wavelet Based Watermarking Technique using Simple Preprocessing Method”, IJCNS Vol1,No 2 Nov 2009 ISSN Online: 2076-9199
  3. Peter Meerwald and Andreas Uhl, , “A Survey of Wavelet-Domain Watermarking Algorithms,” in Proceedings of Society of Photographic Instrumentation Engineers (SPIE), Vol. 4314, pp. 505-516.
  4. G.RoslineNesaKumari, B.VijayaKumar, L.Sumalatha and Dr V V Krishna, “Secure and Robust Digital Wateramrking on Grey level Images”., IJAST Vol 11 Oct 2009 ISSN: 2005-4238
  5. Dr V Vijayakumar, S.MaruthuPerumal and G.Rosline Nesa Kumari, “A novel Method of Digital Watermarking for High Authentication”., Proceedings of the National Conference on Informatics(NCI)-Nellore – A.P.-India- 2008.
  6. Ravi K Sharma and Steve Decker, “Practical Challenges for Digital Watermarking Applications”, EURASIP Journal on Applied Signal Processing 2002. 133–139
  7. S.MaruthuPerumal, L.Sumalatha, Dr V VenkataKrishna, “Digital Image Authentication Based on Threshold Values”, Proceedings of the 1st International Conference on Emerging Trends in Signal Processing & VLSI Design.,Hyderabad-A.P.India- 2010.
  8. Akram M Zeki and Azizah A Manaf, “A Novel Digital Watermarking Technique based on ISB”, Proceedings of World Academy of Science, Engineering and Technology, Vol 38, Feb 2009 ISSN 2070-3740.
  9. Zhe-Ming Lu, Chun-He Liu and He Wang, “Image Retrieval and content Integrity Verification Based on Multipurpose Image Watermarking Scheme” – International journal of Innovative Computing, Information and Control Vol – 3,Number 3, June 2007.
  10. WANG Pengfei, QIN Feng, WANG Xiaolin, FENG Gui, CAI Canhui, “A Novel Blind Watermarking Scheme Based on Watermark Hopping Technique”. ICSP2006 Proceedings.
  11. Soumik Das, Pradosh Bandyopadhyay, Shauvik Paul, Arindam Sinha Ray and Dr. Monalisa Banerjee, “A New Introduction towards Invisible Image Watermarking on Color Images”. IEEE International Advance Computing Conference (IACC 2009)
  12. Santi P. Maity , Malay K. Kundu , Seba Maity, “Dual purpose FWT domain spread spectrum image watermarking in real time” Computers and Electrical Engineering 35 (2009) 415–433
  13. Hong-Jie He , Jia-ShuZhang , FanChen “Adjacent-lock based statistical detection method for self-embedding watermarking techniques”, Signal Processing 89 (2009) 1557–1566.
  14. Shumei Wang, Weidong Zhao, Zhicheng Wang, Junwei D, Xialin Han, “A Blind and Self-Adaptive Digital Watermarking Based on Wavelet-packet Decomposition” IEEE 2008 Congress on Image and Signal Processing 244-248
  15. Alessandro Basso, Francesco Bergadano, Davide Cavagnino, Victor Pomponiu and Annamaria Vernone, “A Novel Block-based Watermarking Scheme Using the SVD Transform” Algorithms 2009 ISSN 1999-4893.
  16. G.Rosline Nesa Kumari, B.VijayaKumar, Dr D. Rajya Lakshmi, “A Novel Approach of Digital Watermarking on Grey Level Images”, Proceedings of the 1st International Conference on Emerging Trends in Signal Processing & VLSI Design.,Hyderabad-A.P.India- 2010.
  17. B.V. Ramana Reddy, M. Radhika Mani, K.V. Subbaiah, “Texture Classification Method using Wavelet Transforms Based on Gaussian Markov Random Field” International Journal of Signal and Image Processing (Vol.1-2010/Iss.1)
  18. Daubechies Ingrid “Ten Lectures on Wavelets,” Society for Industrial and Applied Mathematics, 1992.
  19. Jaideva C. Goswami and Andrew K. Chan “Fundamentals of Wavelets Theory, Algorithms, and Applications,” A wiley- Interscience Publications.
  20. Michael W. Frazier “An Introduction to Wavelets through Linear Algebra,” Replika Press Pvt Ltd, Delhi, India, 1999.
  21. Nievergelt Yves “Wavelets Made Easy,” R.R. Honnelley and Sons, Harrisonburg, USA, 1999.
  22. Pankaj N. Topiwala “Wavelet Image and Video Compression”, Kluwer Academic Publishers, 1998.
  23. Prasad L. and Iyengar S.S. “Wavelet analysis with applications to image processing,” CRC press LLC, Florida, USA, 1997.
  24. Rafael C. Gonzalez and Richard E. Woods “Digital Image Processing,” 2nd ed., Pearson Education (Singapore) Pte. Ltd, Indian Branch, 2003.
  25. Raghuveer M. Rao and Ajit S. Bopardikar “Wavelet Transforms-Introduction to Theory and Applications,” Pearson Education, Published by Dorling Kindersley (India) Pvt. Ltd, 2006.
  26. Soman K.P. and Ramachandran K.I. “Insight into wavelets from theory to practice,” Prentice-Hall of India Pvt. Limited, 2004.
  27. Soman K.P. and Ramachandran K.I. “Insight into wavelets from theory to practice,” Second Edition, Prentice-Hall of India Pvt. Limited, 2006.
  28. C.C.Chang. T.C. Lu, A difference Expansion oriented data hiding scheme for restoring the original host images,J.Systems Software 79 (May 2006) 1754-1766
  29. J.Tian, Reversible data embedding using a difference expansion, IEEE Trans, circuits systems video Technol. 13(8) (August 2003) 890-896
  30. J.M Barton. Method and Apparatus for embedding authentication information within digital data, U.S patent 5 646 997 1997.
  31. M.U.Celik, G.Sharma, A.M.Tekalp, E.Saber, Lossless generalized LSB Data embedding , IEEE Trans Process. 14 (2) February 2005)253-266.
  32. C.De Vleeschouwer, J.F.Delaigle, B.Macq, Circular interpretation of bijective transformation in lossless watermarking for media asset management, IEEE Trans Multimedia 5(1) (March 2003) 97-105.
  33. B.Macq, Lossless multiresolution transform for image authenticating watermarking, in :Proceeding of EUSIPCO, Vol. 2000, Tempere Finland, September 2000, pp 533-536.
  34. D.M.Thodi, J.J.Rodriguez, Prediction error based reversible watermarking in proceedings of the international conference on image processing (ICIP’04) vol 3, Singapore, 24-27 October 2004 pp 1549-1552.
Index Terms

Computer Science
Information Sciences

Keywords

Wavelet Transformation Threshold based Intermediate Bit Values (TIBV) Alattar’s Method