CFP last date
20 May 2024
Reseach Article

Robust Image Watermarking based on DCT-DWT-SVD Method

by Sneha Jose, Rajesh Cherian Roy, Sreenesh S Nambiar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 58 - Number 21
Year of Publication: 2012
Authors: Sneha Jose, Rajesh Cherian Roy, Sreenesh S Nambiar
10.5120/9406-3798

Sneha Jose, Rajesh Cherian Roy, Sreenesh S Nambiar . Robust Image Watermarking based on DCT-DWT-SVD Method. International Journal of Computer Applications. 58, 21 ( November 2012), 12-16. DOI=10.5120/9406-3798

@article{ 10.5120/9406-3798,
author = { Sneha Jose, Rajesh Cherian Roy, Sreenesh S Nambiar },
title = { Robust Image Watermarking based on DCT-DWT-SVD Method },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 58 },
number = { 21 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 12-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume58/number21/9406-3798/ },
doi = { 10.5120/9406-3798 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:03:06.967694+05:30
%A Sneha Jose
%A Rajesh Cherian Roy
%A Sreenesh S Nambiar
%T Robust Image Watermarking based on DCT-DWT-SVD Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 58
%N 21
%P 12-16
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete Wavelet Transform (DWT)-Singular Value Decomposition (SVD). The cover image is reordered before DCT is applied. The DCT coefficients of the reordered image are decomposed into sub bands using DWT. The singular values of the middle sub bands are found and watermark is embedded. Simulation results shows that this method can survive attacks like rotation, cropping, JPEG compression and noising attacks and also can be used for copyright protection of multimedia objects.

References
  1. Q. Li, C. Yuan, and Y. -Z. Zhong, "Adaptive DWT-SVD Domain Image Watermarking Using Human Visual Model". In proceedings of 9th International Conference on Advanced Communication Technology. Gangwon-Do,South Korea, pp. 1947-1951.
  2. R. Liu and T. Tan, "An SVD-based watermarking scheme for protecting rightful ownership". IEEE Trans. Multimedia, vol. 4, no. 1, pp. 121–128, March 2002.
  3. Chih-Chin Lai and Cheng-Chih Tsai. " Digital image watermarking using discrete wavelet transform and singular value decomposition". IEEE Transactions on instrumentation and measurement, Vol. 59. No. 11. 2010.
  4. F. Ahmed and I. S. Moskowitz. "Correlation-based watermarking method for Image Authentication Applications". Opt. Engineering. Vol 43, No. 8,pp. 1833-1835. Aug 2004.
  5. H. T. Wu and Y. M. Cheung,"Reversible watermarking by modulation and security enhancement," IEEE transactions on Instrumentation and measurement, Vol. 59, No. 1, pp. 221-228 , Jan 2010.
  6. V. Aslantas, L. A. Dog?an, and S. Ozturk. "DWT-SVD based Image watermarking using particle swarm optimizer". In proceedings of IEEE International Conference on Multimedia Expo. Hannover, Germany, 2008,pp. 241-244.
  7. S. G. Mallat,"A Theory for Multiresolution signal decomposition: The wavelet representation," IEEE transactions on Pattern Analysis Machine Intell. , Vol. 11, no. 7, pp. 654-693, Jul. 1989.
  8. A. Nikolaidis and I. Pitas, "Asymptotically optimal detection for additive watermarking in the DCT and DWT domains," IEEE transactions on Image Processing ,Vol. 12,no. 5,pp. 563-571,May 2003.
  9. J. O' Ruanaidh and T. Pun, "Rotation, scale and translation invariant digital image watermarking," In Proceedings of ICIP'97, Vol. 1, Santa Barbara, CA, Oct. 1997, pp. 536-539.
Index Terms

Computer Science
Information Sciences

Keywords

Discrete Wavelet transforms Singular Value Decomposition Discrete cosine transform