Call for Paper - September 2020 Edition
IJCA solicits original research papers for the September 2020 Edition. Last date of manuscript submission is August 20, 2020. Read More

A Secure and Robust DWT based Digital Image Watermarking Technique

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Swati Saxena, Pankaj Soni, Manish Gurjar
10.5120/ijca2017914535

Swati Saxena, Pankaj Soni and Manish Gurjar. A Secure and Robust DWT based Digital Image Watermarking Technique. International Journal of Computer Applications 168(11):21-24, June 2017. BibTeX

@article{10.5120/ijca2017914535,
	author = {Swati Saxena and Pankaj Soni and Manish Gurjar},
	title = {A Secure and Robust DWT based Digital Image Watermarking Technique},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2017},
	volume = {168},
	number = {11},
	month = {Jun},
	year = {2017},
	issn = {0975-8887},
	pages = {21-24},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume168/number11/27919-2017914535},
	doi = {10.5120/ijca2017914535},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Due to the tremendous growth of internet, the web may produce huge information in digital form. The information may be in the form of numbers, strings, images, and video. If the data to be transmitted are confidential, it is suitable as well for some mischievous users to illegitimately destroy, copy, or change them on the Internet. As a consequence, information security becomes an essential issue. Security and robustness are two important requirements for digital image processing algorithms in applications involving authentication.

In this method, we proposed digital image watermarking technique to improve the PSNR value. Our experimental result showed that method is well suited for unauthorized tempering detection. We used watermarking for secure data transmission and to prevent unauthenticated image access. We applied Discrete Wavelet Transform technique to compress the image with better compression ratio and low processing power. Our method detected the image tempering and data can be transmitted securely over the channel.

References

  1. Tianrui Zong1, Yong Xiang1, Song Guo2 and Yue Rong “Rank- Based image watermarking method with high embedding capacity and robustness” IEEE Trans. Image process, vol.4, pp.2169-3536, May 2016.
  2. A.Swaminathan, M. Wu ana, K.J.R Liu, “Digital image forensics via intrinsic Fingerprint” IEEE Trans.inf. Forensics Security, vol.3, no.1, pp.101-117, March 2008.
  3. X. B. Kang and S. M. Wei, “Identifying tampered regions using singular value decomposition in digital image forensics,” in Proc. Int. Conf. Comput. Sci. Softw. Eng., vol. 3. Dec. 2008, pp. 926–930.
  4. A. Swaminathan, Y. Mao, and M. Wu, “Robust and secure image hashing,” IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 215–230, Jun. 2006.
  5. P. W. Wong and N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Trans. Image Process., vol. 10, no. 10, pp. 1593–1601.
  6. J. Lee and C. S. Won, “Authentication and correction of digital watermarking images,” Electron. Lett., vol. 35, no. 11, pp. 886–887, 1999.
  7. D. Kumar and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proc. IEEE, vol. 87, no. 7, pp. 1167–1180, Jul. 1999.
  8. J. Fridrich, “Image watermarking for tamper detection,” in Proc. Int. Conf. Image Process. (ICIP), vol. 2. Oct. 1998, pp. 404–408.
  9. P. W. Wong, “A public key watermark for image verification and authentication,” presented at the IEEE Int. Conf. Image Processing, Chicago, IL, 1998.
  10. S. D. Servetto, C. I. Podilchuk, and K. Ramchandran, “Capacity issues in digital image watermarking,” presented at the 5th IEEE Conf. Image Processing, 1998.
  11. D.Kunder and D. Hatzinakos, “Digital watermarking using multi resolution wavelet decomposition” Proc. IEEE int conf, Acostics, Speech, and signal processing, vol.5 pp.2969-2975, 1998.
  12. A.B Watson, G.Y Yang, J.A.Solomon and J.Villasenor “Visibility of wavelet quantization noise,” IEEE Tran image processing, vol.6, pp.1164-1175, 1997.

Keywords

Digital image, Security, Watermarking, Discrete Wavelet Transform, PSNR, MSE.