CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Lifting Wavelet Transform with Singular Value Decomposition for Robust Digital Image Watermarking

by Sushma G. Kejgir, Manesh Kokare
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 39 - Number 18
Year of Publication: 2012
Authors: Sushma G. Kejgir, Manesh Kokare
10.5120/5078-7193

Sushma G. Kejgir, Manesh Kokare . Lifting Wavelet Transform with Singular Value Decomposition for Robust Digital Image Watermarking. International Journal of Computer Applications. 39, 18 ( February 2012), 10-18. DOI=10.5120/5078-7193

@article{ 10.5120/5078-7193,
author = { Sushma G. Kejgir, Manesh Kokare },
title = { Lifting Wavelet Transform with Singular Value Decomposition for Robust Digital Image Watermarking },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 39 },
number = { 18 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 10-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume39/number18/5078-7193/ },
doi = { 10.5120/5078-7193 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:26:44.112190+05:30
%A Sushma G. Kejgir
%A Manesh Kokare
%T Lifting Wavelet Transform with Singular Value Decomposition for Robust Digital Image Watermarking
%J International Journal of Computer Applications
%@ 0975-8887
%V 39
%N 18
%P 10-18
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital image watermarking is proposed using lifting wavelet transform and singular value decomposition for copyright protection and authentication. In this paper, lifting wavelet transform (LWT) transforms the image into subbands. The subband having energy greater than computed ‘Q’ value is selected for watermark embedding. Singular value decomposition (SVD) matrix is derived for this subband and used to embed the gray level digital signature as a watermark. This watermarking is useful for real time application since split and merge process in LWT reduces computational complexity by 50%. Loss in information is less as compared to discrete wavelet transform (DWT) algorithm, because in LWT based algorithm down and up sampling is not using. Also, use of SVD lends noninvertible property to the watermarking so that fake watermarked image cannot be generated. This algorithm is spread spectrum thus robust and semi blind needs singular values of original image for retrieval of watermark. The proposed algorithm is tested for robustness against eighteen attacks on each of the five different images. Experimental results and analysis show that proposed algorithm is trustworthy in establishing the ownership and, is robust against different attacks. Correlation coefficient (CRC) values obtained from proposed LWT-SVD algorithm are compared with DWT-SVD method.

References
  1. R.Z.Liu and T.N.Tan, “An SVD-based watermarking scheme for protecting rightful ownership”, IEEE Trans. on Multimedia, vol. 4, no.1, 2002, pp. 121-128.
  2. Liu Quan, Ai Qingsong, “A combination of DCT-based and SVD-based watermarking scheme”, in Proc. of 7th Int. Conf. on Signal Processing (ICSP04). Vol. 1, 2004, pp. 873-876.
  3. Ming Tong ,Wei Feng, Hongbing Ji , “A robust geometrical attack resistant digital image watermarking based on fast ICA algorithm”, Congress on Image and Signal Processing, 2008, pp.655-659.
  4. Veysel Aslantas, “An SVD based digital image watermarking using genetic algorithm”, IEEE, 2007.
  5. Xiaojun Qi, Stephen Bialkowski, and Gary Brimley, “An adaptive QIM and SVD-based digital image watermarking scheme in the wavelet domain”, IEEE, 2008, pp.421-424.
  6. Gaurav Bhatnagar and Balasubramanian Raman, “A new robust reference watermarking scheme based on DWT-SVD”, J. of Computer Standards & Interfaces , 2009, pp.1-11.
  7. Ali Al-Haj and Tuqa Manasrah , “Non-invertible copyright protection of digital images using DWT and SVD”, 2nd Int. Conf. on Digital Information Management, Vol. 1, 2007, pp.448 – 453.
  8. V. Senthil and R. Bhaskaran, “Wavelet based digital image watermarking with robustness against geometric attacks”, Int. Conf. on Computational Intelligence and Multimedia Applications, 2007, pp 89-93.
  9. S. G. Kejgir, Manesh Kokare, “Optimization of bit plane combination for efficient digital image watermarking”, IEEE Int. Journal of computer science and Information Security, Aug.2009, vol.2, pp.9-18.
  10. S. G. Kejgir, Manesh Kokare, “A wavelet-based good fidelity digital image watermarking using subband threshold computing”, IEEE Int. Conference on Signal & Image Processing, 7-9 Dec. 2006, pp-8-12.
  11. A.W.Calder Bank, I.Daubechies, and W.Sweldons, “Wavelet transforms that map integers to integers”, journal of applied and computational harmonic analysis, Vol. 5, no. 3, 1998, pp.332-369.
  12. W.H. Chang, Y.S. Lee, W.S. Peng, and C.Y. Lee, "A line-based, memory efficient and programmable architecture for 2D DWT using lifting scheme," IEEE Int. Symposium on Circuits and Systems, Sydney, Australia, 2001, pp. 330-333.
  13. I. Daubechies and W. Sweldens, "Factoring wavelet transforms into lifting schemes," The Journal of Fourier Analysis and Applications , Vol. 4, 1998, pp. 247-269.
  14. D. S. Taubman and M. W. Marcellin, JPEG2000: “Image compression fundamentals, standards and practice”, Norwell, MA: Kluwer, 2002.
  15. W. Sweldens, “The lifting scheme: a custom-design construction of biorthogonal wavelets”, Applied and Computational Harmonic Analysis, Vol. 3, no. 15, 1996, pp. 186 - 200.
  16. S. Mallat, “A theory for multiresolution signal decomposition: the wavelet representation,” IEEE trans. on Pattern Analysis and Machine Intelligence, vol. 11, no. 7, 1989, pp. 674–693.
  17. Ingemar J. Cox, Matt L. Miller and Jeffrey A, “Bloom watermarking applications and their properties”, NEC Research Institute.
  18. I. J. Cox and J.-P. Linnartz, “Some general methods for tampering with watermarks”, IEEE trans. on Selected Areas of Communications, 16(4), 1998, pp.587–593.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Image Watermarking Lifting Wavelet Transform Singular Value Decomposition