CFP last date
20 May 2024
Reseach Article

Image Watermarking Scheme based on Visual Cryptography in Discrete Wavelet Transform

by Th. Rupachandra Singh, Kh. Manglem Singh, Sudipta Roy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 39 - Number 1
Year of Publication: 2012
Authors: Th. Rupachandra Singh, Kh. Manglem Singh, Sudipta Roy
10.5120/4784-6996

Th. Rupachandra Singh, Kh. Manglem Singh, Sudipta Roy . Image Watermarking Scheme based on Visual Cryptography in Discrete Wavelet Transform. International Journal of Computer Applications. 39, 1 ( February 2012), 18-24. DOI=10.5120/4784-6996

@article{ 10.5120/4784-6996,
author = { Th. Rupachandra Singh, Kh. Manglem Singh, Sudipta Roy },
title = { Image Watermarking Scheme based on Visual Cryptography in Discrete Wavelet Transform },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 39 },
number = { 1 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 18-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume39/number1/4784-6996/ },
doi = { 10.5120/4784-6996 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:25:18.758408+05:30
%A Th. Rupachandra Singh
%A Kh. Manglem Singh
%A Sudipta Roy
%T Image Watermarking Scheme based on Visual Cryptography in Discrete Wavelet Transform
%J International Journal of Computer Applications
%@ 0975-8887
%V 39
%N 1
%P 18-24
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Multimedia security and copyright protection have become wide interest due the explosion of data exchange in the Internet and the extensive use of digital media. We propose an image watermarking scheme based on visual cryptography in discrete wavelet transform. A complete survey of the current image watermarking technologies was done and has been noticed that majority of the existing schemes are not capable of resisting all attacks. We propose the idea to use different parts of a single watermark into different regions of the image for generation of the owner’s share from the low frequency subband of the original image based on the binary watermark, and comparing the global mean value of pixels in the same subband and the local mean of the same subband, and generation of the identification share based on comparing the global mean and the local mean of the low frequency subband of the controversial image. These two shares after stacking can reveal the copyright ownership. Experiments are conducted to verify the robustness through a series of experiments.

References
  1. F. Petticolas, Information hiding techniques for steganography and digital watermarking, StefenKatzenbeisser, Artech house books, ISBN 158053-035-4, Dec. 1999.
  2. F. Hartung and M. Kutter, Multimedia watermarking techniques, Proceedings of the IEEE, vol. 87, no. 7, July 1999.
  3. S. Voloshynovkiy, S. Pereira, T. Pun, J. Eggers and J. Su, Attacks on digital watermarks: classification, estimation-based attacks and benchmarks, IEEE communications Magazine 39, 9 (August) 2001, pp. 118-126.
  4. A. Sequeira and D. Kundur, Communications and information theory in watermarking: A survey, In proc. of SPIE Multimedia systems and application IV, vol. 4518, pp. 216-227.
  5. J.O. Ruanaidh, H. Peterson, A. Herrigel, S. Pereira and T. Pun, Cryptographic copyright protection for digital images based on watermarking techniques, Elsevier Theoretical Computer Science, vol 226, no. 1, pp. 117-142, 1999.
  6. S.P. Mohanty and B.K. Bhargava, Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks, ACM Journal, vol. 5, no. 2, Article 12, pp. 1-24, February 2008.
  7. I.J. Cox and M. Miller, Electronic watermarking: The first 50 years, EURASIP Journal of Applied Signal Processing, vol. 2002, Issue 2, pp. 126-132, 2002.
  8. R. Barnett, Digital watermarking: Application techniques and challenges, IEE Electronics and Communication Engineering Journal, pp. 173-183, 1999.
  9. W. Bender, W Butera, D. Gruhl, R Hwang, F.J. Paiz and S. Pogers, Applications for data hiding, IBM Systems Journal, vol. 39, Issue 3 and 4, pp. 547-568, 2000.
  10. J. Hussein and A. Mohammed, Robust video watermarking using multi-band wavelet transform, IJCSI, vol. 6, no. 1, 2009.
  11. Kh. Manglem Singh, Dual Watermarking Scheme for Copyright Protection, International Journal of Computer Science and Engineering System, ISSN 0973 4406, Vol. 3, No. 2, April-July 2009.
  12. M. Kutter and F. Hartung, “Introduction to watermarking techniques”, Proc. Information Techniques for steganography and Digital Watermarking, S.C. Katzenbeisser et al. Eds, North Wood, MA: Artec House, pp. 97-119, Dec. 1999.
  13. G. Langelaar, I. Setyawan and R. Lagendijk, “Watermarking digital image and video data”, IEEE Signal Processing Magazine, vol. 17, pp. 20-43, Sep. 2000.
  14. N. Memon, “Analysis of LSB based image steganography technique”, IEEE Proc. ICIP, vol. 3, pp. 1019-1022, Oct. 2001.
  15. A. Tefas, A. Nikolaidis, N. Nikolaidis, V. Solachidis, S. Tsekeridou, and I. Pitas, “Performance analysis of correlationbased watermarking schemes employing markov chaotic sequences,” IEEE Trans. on Signal Processing, vol. 51, pp. 1979 – 1974, 2003.
  16. F. Duan, I. King, L. Xu and L. Chan, “Intra-block algorithm for digital watermarking”, IEEE Proc. ICPR, vol. 2, pp. 1589-1591, Aug. 17-20, 1998.
  17. S. Pereira and T. Pun, “Robust template matching for affine resistant to image watermarks”, IEEE Trans. On Image Processing, vol. 9, issue 6., pp. 1123-1129, Jun. 2000.
  18. I. Hong, I. Kim and S. Hem, “A blind watermarking technique using wavelet transform”, IEEE Proc. ISIE, vol. 3, pp. 1946-1950, 2001.
  19. C.C. Chang, J.Y. Hsiao and J.C. Yeh, “A color image copyright protection scheme based on visual cryptography and discrete Fourier transform”, Imaging Science Journal, 50, pp. 133-140, 2002.
  20. C. –S Hsu an Y.C. Hou, “Copyright protection scheme for digital image using visual cryptography and sampling methods”, Optical Engineering, 44(7), 077003-1-77003-10, Jul. 2005.
  21. C. –S Hsu an Y.C. Hou, A visual cryptography and statistics based method for ownership identification of digital images, World Academy of Science and Technology, vol. 2, pp. 172-175, 2005.
  22. Kh. Manglem Singh, Dual Watermarking Scheme for Copyright Protection, International Journal of Computer Science and Engineering System, ISSN 0973 4406, Vol. 3, No. 2, April-July 2009.
  23. R-J. Hwang, A digital image copyright protection scheme based on visual cryptography, Tamkang journal of Science and Engineering, vol. 3, no. 2, pp. 97-106, 2000.
  24. A Sleit and A. Abusitta, A visual cryptography based watermark technology for individual and group images, Systems, Cybernetics and Informatics, vol. 5, no. 2, pp.24-32, 2008.
  25. B. Surekha and G.N. Swamy, A spatial domain public image watermarking, International Journal of Security and Applications, vol. 5, no. 1, pp. 1-11, 2011
Index Terms

Computer Science
Information Sciences

Keywords

Digital watermarking visual cryptography global mean local mean.