Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Efficient Integer DCT based Image Watermarking Schemes in Smart Phones

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2021
Chetan K.R.

Chetan K.R.. Efficient Integer DCT based Image Watermarking Schemes in Smart Phones. International Journal of Computer Applications 183(31):1-8, October 2021. BibTeX

	author = {Chetan K.R.},
	title = {Efficient Integer DCT based Image Watermarking Schemes in Smart Phones},
	journal = {International Journal of Computer Applications},
	issue_date = {October 2021},
	volume = {183},
	number = {31},
	month = {Oct},
	year = {2021},
	issn = {0975-8887},
	pages = {1-8},
	numpages = {8},
	url = {},
	doi = {10.5120/ijca2021921696},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Recent trends have dramatically changed the way one uses their mobile phones. What was once simply a cell phone has become a multi-purpose mobile computing device. Increased power and computing capabilities coupled with decreased size have made it possible to add functionality and combine previously separate operations into a single unit. Many mobile phones are equipped with high resolution digital cameras. Their users are capturing images and sharing them with others by sending them as email attachments, multimedia messages or via Bluetooth. Digital watermarking is adding an ownership information in multimedia contents to prove the authenticity.

This paper proposes an image watermarking scheme for ensuring authenticity of captured images. IMEI number is used as watermark. This work also aims at studying the robustness of the system under various kinds of attacks such additive noise, cropping, scaling attack. The proposed system has been tested on Android based Smart Phones. The results confirm the effectiveness of the scheme in providing efficient attack identification.


  1. S.Katzenbeisser and F.Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking. London: Artech House,2000.
  2. A.Al-Gindy a, H.Al-Ahmad b, R.Qahwaji a and A.Tawfik c ,”A New Watermarking Scheme For Colour Images Captured By Mobile Phone Cameras”, IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.7, July 2009
  3. B.Verrma, S.Jain, D.P.Agarwal and A.Phadikar, “A new colour image watermarking scheme,” Infocomp, Journal of Computer Science, vol.5,pp. 37-42,2006.
  4. Jie Liang, Trac Tran and Pankaj Topiwala, “A 16-bit architecture for H.26L, treating DCT transforms and quantization”, in Test Model Long Term Number 5 (TML-5).Sterrett Pl., #322 Columbia, MD 21044 USA
  5. K.Yogalakshmi and 2R.Kanchana “Blind Watermarking Scheme for Digital Images”, in Journal of Technology And Engineering System(IJTES),Jan –March 2011- Vol.2.No.3.
  6. Jie Liang,“A 16-bit architecture for H.26L, treating DCT transforms and quantization”, in ITU - Telecommunications Standardization Sector, Thirteenth Meeting: Austin, Texas, USA, 2-4 April, 2011
  7. W. Lu, H. Lu, and F. L. Chung, “Robust digital image watermarking based on sub-sampling” in applied mathematics and computation, 2006, pp. 886-893.
  8. How to retrieve the Device Unique ID from android device
  9. Getting IMEI Number and other Details.”


Integer DCT, Watermark Generation, Bit shuffling, PSNR