Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Dual Image Watermarking Scheme based on Singular Value Decomposition and Visual Cryptography in Discrete Wavelet Transform

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 50 - Number 12
Year of Publication: 2012
Authors:
B. Pushpa Devi
Kh. Manglem Singh
Sudipta Roy
10.5120/7821-0998

Pushpa B Devi, Kh.manglem Singh and Sudipta Roy. Article: Dual Image Watermarking Scheme based on Singular Value Decomposition and Visual Cryptography in Discrete Wavelet Transform. International Journal of Computer Applications 50(12):6-13, July 2012. Full text available. BibTeX

@article{key:article,
	author = {B. Pushpa Devi and Kh.manglem Singh and Sudipta Roy},
	title = {Article: Dual Image Watermarking Scheme based on Singular Value Decomposition and Visual Cryptography in Discrete Wavelet Transform},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {50},
	number = {12},
	pages = {6-13},
	month = {July},
	note = {Full text available}
}

Abstract

There is wide interest in multimedia security and copyright protection due to the explosion of data exchange in the Internet and the extensive use of digital media. An image watermarking scheme based on singular value decomposition and visual cryptography in discrete wavelet transform is proposed. We start with a survey of the current image watermarking technologies, and have noticed that majority of the existing schemes are not capable of resisting all attacks. We propose the idea to use of singular value decomposition and visual cryptography in discrete wavelet transform such that the primary watermarking scheme based on singular value decomposition in the discrete wavelet transform is empowered by the secondary watermarking scheme based on visual cryptography in discrete wavelet transform. Experiments are conducted to verify the robustness through a series of experiments.

References

  • F. Petticolas, Information hiding techniques for steganography and digital watermarking, StefenKatzenbeisser, Artech house books, ISBN 158053-035-4, Dec. 1999.
  • F. Hartung and M. Kutter, Multimedia water- marking techniques, Proceedings of the IEEE, vol. 87, no. 7, July 1999.
  • S. Voloshynovkiy, S. Pereira, T. Pun, J. Eggers and J. Su, Attacks on digital watermarks: classification, estimation-based attacks and benchmarks, IEEE communications Magazine, vol. 39, no. 9 (August) 2001, pp. 118-126.
  • A. Sequeira and D. Kundur, Communications and information theory in watermarking: A survey, In proc. of SPIE Multimedia systems and application IV, vol. 4518, pp. 216-227.
  • J. O. Ruanaidh, H. Peterson, A. Herrigel, S. Pereira and T. Pun, Cryptographic copyright protection for digital images based on watermarking techniques, Elsevier Theoretical Computer Science, vol 226, no. 1, pp. 117-142, 1999.
  • S. P. Mohanty and B. K. Bhargava, Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks, ACM Journal, vol. 5, no. 2, Article 12, pp. 1-24, February 2008.
  • I. J. Cox and M. Miller, Electronic watermarking: The first 50 years, EURASIP Journal of Applied Signal Processing, vol. 2002, Issue 2, pp. 126-132, 2002.
  • R. Barnett, Digital watermarking: Application techniques and challenges, IEE Electronics and Communication Engineering Journal, pp. 173-183, 1999.
  • W. Bender, W Butera, D. Gruhl, R Hwang, F. J. Paiz and S. Pogers, Applications for data hiding, IBM Systems Journal, vol. 39, Issue 3 and 4, pp. 547-568, 2000.
  • J. Hussein and A. Mohammed, Robust video watermarking using multi-band wavelet transform, IJCSI, vol. 6, no. 1, 2009.
  • Kh. Manglem Singh, Dual Watermarking Scheme for Copyright Protection, International Journal of Computer Science and Engineering System, ISSN 0973 4406, Vol. 3, No. 2, April-July 2009.
  • M. Kutter and F. Hartung, "Introduction to watermarking techniques", Proc. Information Techniques for steganography and Digital Watermarking, S. C. Katzenbeisser et al. Eds, North Wood, MA: Artec House, pp. 97-119, Dec. 1999.
  • G. Langelaar, I. Setyawan and R. Lagendijk, "Watermarking digital image and video data", IEEE Signal Processing Magazine, vol. 17, pp. 20-43, Sep. 2000.
  • N. Memon, Analysis of LSB based image steganography technique, IEEE Proc. ICIP, vol. 3, pp. 1019-1022, Oct. 2001.
  • A. Tefas, A. Nikolaidis, N. Nikolaidis, V. Solachidis, S. Tsekeridou, and I. Pitas, Performance analysis of correlation based watermarking schemes employing markov chaotic sequences, IEEE Trans. on Signal Processing, vol. 51, pp. 1979 – 1974, 2003.
  • F. Duan, I. King, L. Xu and L. Chan, "Intra-block algorithm for digital watermarking", IEEE Proc. ICPR, vol. 2, pp. 1589-1591, Aug. 17-20, 1998.
  • S. Pereira and T. Pun, Robust template matching for affine resistant to image watermarks, IEEE Trans. On Image Processing, vol. 9, issue 6. , pp. 1123-1129, Jun. 2000.
  • I. Hong, I. Kim and S. Hem, A blind watermarking technique using wavelet transform, IEEE Proc. ISIE, vol. 3, pp. 1946-1950, 2001.
  • C. C. Chang, J. Y. Hsiao and J. C. Yeh, A color image copyright protection scheme based on visual cryptography and discrete Fourier transform, Imaging Science Journal, 50, pp. 133-140, 2002.
  • C. S Hsu and Y. C. Hou, Copyright protection scheme for digital image using visual cryptography and sampling methods, Optical Engineering, 44(7), 077003-1-77003-10, Jul. 2005.
  • C. S Hsu and Y. C. Hou, A visual cryptography and statistics based method for ownership identification of digital images, World Academy of Science and Technology, vol. 2, pp. 172-175, 2005.
  • R-J. Hwang, A digital image copyright protection scheme based on visual cryptography, Tamkang journal of Science and Engineering, vol. 3, no. 2, pp. 97-106, 2000.
  • A. Sleit and A. Abusitta, A visual cryptography based watermark technology for individual and group images, Systems, Cybernetics and Informatics, vol. 5, no. 2, pp. 24-32, 2008.
  • B. Surekha and G. N. Swamy, A spatial domain public image watermarking, International Journal of Security and Applications, vol. 5, no. 1, pp. 1-11, and 2011.
  • Th. Rupachandra Singh, Kh. Manglem Singh and Sudipta Roy, Image Watermarking Scheme Based on Visual Cryptography in Discrete Wavelet Transform, International Journal of Computer Applications, ISSN 0975 - 8887, Vol. 39, No. 1, pp. 18-24, February 2012.
  • R. Liu and T. Tan, An SVD-based Watermarking scheme for protecting rightful ownership, IEEE Transaction on Multimedia, vol. 4, no. 1, pp. 121-128, 2002.
  • C. C. Chang, P. Tsai and C. C. Lin, SVD-based digital image watermarking scheme, Pattern Recogn. Lett. Vol. 26, pp. 1577-1586, 2005.
  • K-L. Chung, W-N. Yang, Y-H. Huang, S-T. Wu and Y-C. Hsu, On SVD-based Watermarking Algorithm, Elsevier, Applied Mathematics and Computation, vol. 188, pp. 54-57, 2007.
  • G. H. Golub and C. Reinsch, Singular value decomposition and least squares solutions, NumerischeMathematik, vol. 14, pp. 403-420, 1970.
  • K. L. Chung, C. H. Shen and L. C. Chang, A novel SDV- and VQ-based image hiding scheme, Pattern Recognition Letters, vol. 22, no. 9, pp. 1051-1058, 2001.
  • K. Konstantinides, B. Nataranjan and G. S. Yovanof, Noise estimation and filtering using blocked-based singular value decomposition, IEEE Transaction on Image Processing, vol. 10, no. 3, pp. 479-483, 1997.
  • J. F. Yang and C. L. Lu, Combined techniques of singular value decomposition and vector quantization for image coding, IEEE Transaction on Image Processing, vol. 4, no. 8, pp. 1141-1146, 1995.
  • M. Prasad R. and S. Koliwad, A Comprehensive survey of contemporary researches in watermarking for copyright protection of digital images, IJCSNS, vol. 9, no. 4, pp. 91-107, April 2009.
  • J-C. Liu, C-H. Lin, L-C. Kuo and J-C. Chang, Robust multi-scale full-band image watermarking for copyright protection, Lecture Notes in Computer Science, Springer Berlin, Heidelberg, vol. 4570, pp. 176-184, 2007.
  • R. C. Gonzalez, R. E. Woods and S. L. Eddins, Digital Image Processing with MATLAB, Pearson, Fifth edition 2009.
  • T-H. Chen, C-C. Chang, C-S. Wu and D-C. Lou, On the security of a copyright protection scheme based on visual cryptography, Elsevier Computer Standard & Interfaces, vol. 31, pp. 1-5, 2009.
  • M. Naor and A. Shamir, Visual Cryptography, in "Advances in Cryptology – Eurocrypt '94", A. De Santis ed. , vol. 950 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp. 1–12, 1995.
  • http://www. peticolas. net/fabien/software/StirMarkB enchmark_4_0_129. zip (lasted accessed July 2008)