SVD-DWT Amalgamated Cryptography Scheme Antagonistic to Noise Attacks

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2018
Swati Dwivedi, Amit Saxena

Swati Dwivedi and Amit Saxena. SVD-DWT Amalgamated Cryptography Scheme Antagonistic to Noise Attacks. International Journal of Computer Applications 179(38):15-19, April 2018. BibTeX

	author = {Swati Dwivedi and Amit Saxena},
	title = {SVD-DWT Amalgamated Cryptography Scheme Antagonistic to Noise Attacks},
	journal = {International Journal of Computer Applications},
	issue_date = {April 2018},
	volume = {179},
	number = {38},
	month = {Apr},
	year = {2018},
	issn = {0975-8887},
	pages = {15-19},
	numpages = {5},
	url = {},
	doi = {10.5120/ijca2018916855},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


In order to improve the robustness and imperceptibleness of the algorithm, a new embedding and extracting method with DWT-SVD is proposed. The approximation matrix of the third level of image in DWT domain is modified with SVD to embed the singular value of watermark to the singular value of DWT coefficient. The proposed embedding and extracting method was employed to accelerate the hybrid DWT-SVD cryptography and to avoid the leak of watermark. This hybrid technique leads to optimize both the fundamentally conflicting requirements. The experimental results show both the good robustness under numerous attacks and the high fidelity. The time needed to perform the program is greatly decreased.


  1. N. Senthil Kumaran, and S. Abinaya, “Comparison Analysis of Digital Image Cryptography using DWT and LSB Technique”, International Conference on Communication and Signal Processing, April 6-8, 2016, India.
  2. Aase, S.O., Husoy, J.H. and Waldemar, P. (2014) A Critique of SVD-Based Image Coding Systems, IEEE International Symposium on Circuits and Systems VLSI, Orlando, FL, Vol. 4, Pp. 13-16.
  3. Ahmed, F. and Moskowitz, I.S. (2014) Composite Signature Based Cryptography for Fingerprint Authentication, ACM Multimedia and Security Workshop, New York, Pp.1-8.
  4. Akhaee, M.A., Sahraeian, S.M.E. and Jin, C. (2013) Blind Image Cryptography Using a Sample Projection Approach, IEEE Transactions on Information Forensics and Security, Vol. 6, Issue 3, Pp.883-893.
  5. Ali, J.M.H. and Hassanien, A.E. (2012) An Iris Recognition System to Enhance E-security Environment Based on Wavelet Theory, Advanced Modeling and Optimization, Vol. 5, No. 2, Pp. 93-104.
  6. Al-Otum, H.M. and Samara, N.A. (2009) A robust blind color image cryptography based on wavelet-tree bit host difference selection, Signal Processing, Vol. 90, Issue 8, Pp. 2498-2512.
  7. Ateniese, G., Blundo, C., De Santis, A. and Stinson, D.R. (1996) Visual cryptography for general access structures, Information Computation, Vol. 129, Pp. 86-106.
  8. Baaziz, N., Zheng, D. and Wang, D. (2011) Image quality assessment based on multiple cryptography approach, IEEE 13th International Workshop on Multimedia Signal Processing (MMSP), Hangzhou, Pp.1-5.
  9. Bao, F., Deng, R., Deing, X. and Yang, Y. (2008) Private Query on Encrypted Data in Multi-User Settings, Proceedings of 4th International Conference on Information Security Practice and Experience (ISPEC 2008), Pp. 71-85, 2008.
  10. Barni, M. and Bartolini, F. (2004) Cryptography systems engineering: Enabling digital assets security and other application, Signal processing and communications series, Marcel Dekker Inc., New York.
  11. Barni, M., Bartolini, F. and Piva, A. (2001) Improved Wavelet based Cryptography Through Pixel-Wise Masking, IEEE Transactions on Image Processing, Vol. 10, Pp. 783-791.


Discrete Wavelet Transform, SVD, PSNR, MSE