Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

Secured Data Hiding Technique: Dual Watermarking

Print
PDF
IJCA Proceedings on National Conference on Advances in Communication and Computing
© 2014 by IJCA Journal
NCACC 2014 - Number 3
Year of Publication: 2014
Authors:
Lekhashri H. Mahajan
Shailaja A. Patil

Lekhashri H Mahajan and Shailaja A Patil. Article: Secured Data Hiding Technique: Dual Watermarking. IJCA Proceedings on National Conference on Advances in Communication and Computing NCACC(3):23-27, December 2014. Full text available. BibTeX

@article{key:article,
	author = {Lekhashri H. Mahajan and Shailaja A. Patil},
	title = {Article: Secured Data Hiding Technique: Dual Watermarking},
	journal = {IJCA Proceedings on National Conference on Advances in Communication and Computing},
	year = {2014},
	volume = {NCACC},
	number = {3},
	pages = {23-27},
	month = {December},
	note = {Full text available}
}

Abstract

Watermarking is a major technology to achieve copyright protection. The combinations of different mathematical tools such as Discrete Wavelet Transform (DWT) and Singular Value Decomposition(SVD) are used to embed watermark in the host image. In this dual watermarking scheme, to improve the robustness and protection of an image, number of watermarks embedded in the host image are two. These watermarks are known as primary and secondary watermark. The host image contains primary and secondary watermarks, in which secondary is embedded into primary and the resultant image is used as watermark for the host image. In this scheme, the images which are used as a watermark are visible gray scale images.

References

  • R. Schyndel, A. Tirkel and C. Osborne, “A Digital Watermark”, Proceedings of International Conference on Image Processing, IEEE, Vol. 02, pp. 86-90, 1994.
  • B. M. Macq and J. J. Quisquater, “Cryptology for digital TV broadcasting, Proceedings IEEE, Vol. 83, pp. 944-957, 1995.
  • G. B. Rhoads, “Identification/authentication coding method and apparatus”, Word Intellectual Property Organization, WIPO, 1995.
  • Bender et. al, “Techniques for data hiding”, IBM systems Journal, Vol. 35, pp. 313-336, 1996.
  • J. Ruanaidh, W. J. Dowling and F. M. Bolad, “Watermarking digital Images for copyright protection”, Image Processing, Proceedings of International Conference on Digital Object Identifier, pp. 239-242. 1996.
  • M. Swanson, B. Zhu and A. Tewfik, “Transparent Robust Image Watermarking”, Proceedings of International Conference on Image Processing, IEEE, Vol. 03, pp. 211-214, 1996.
  • I. Pitas, “A Method for Signature Casting on Digital Images, International Conference on Image Processing, Vol. 3, pp. 215-218. September 1996.
  • I. Cox, J. Kilian, F. Leighton and T. Shamoon,“Secure Spread Spectrum Watermarking for Multimedia”, IEEE Transactions on Image Processing, Vol. 06, pp. 1673-1687, 1997.
  • X. Xia, C. Boncelet, and G. Arce, “A Multiresolution Watermark for Digital Images”, Proceedings of International Conference on Image Processing, IEEE, Vol. 01, pp. 548-551, 1997.
  • D. Kundur and D. Hatzinakos, “A Robust Digital Image Watermarking Method Using Wavelet based Fusion”, Proceedings of International Conference on Image Processing, IEEE, Vol. 01, pp. 544-547, 1997.
  • F. Bartolini, M. Barni, V. Cappellini and A. Piva, “Mask Building for Perceptually Hiding Frequency Embedded Watermarks”, Proceedings of International Conference on Image Processing, IEEE, Vol. 01, pp. 450-454, 1998.
  • L. Marvel, C. Retter, and C. Boncelet, “Hiding Information in Images”, Proceedings of International Conference on Image Processing, IEEE, Vol. 02, pp. 396-398, 1998.
  • V. S. Craver, N. Memon, B. Yeo, and M. Yeung, “Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications”, IEEE Journal on Selected Areas in Communications, Vol. 16, pp. 573-586, 1999.
  • M. Ramkumar and A. N. Akansu, “A robust data hiding scheme for image using DFT”, Proc. International Conference on Image Processing, Vol. 02, pp. 211-215, 1999.
  • M. Barni, F. Bartolini, A. De Rosa and A. Pivai, “Optimum Decoding and Detection of MultiplicativeWatermarks”, IEEE transactions, pp. 1118-1123, 2003.
  • G. Bhatnagar, B. Raman and K. Swaminathan, “DWT-SVD based Dual Watermarking Scheme”, Proc. IEEE, Vol. 01, 2008.
  • B. Jagadeesh, S. Srinivas Kumar and K. Raja Rajeswari, “A Genetic Algorithm Based Oblivious Image Watermarking Scheme using Singular Value Decomposition (SVD)”, 2009.
  • Lintao Lv, Liang Hao ad Hui Lv, “Resisting RSTWatermarking Algorithm for Image Content Authentication”, pp. 5-10, 2010.
  • B. Jagadeesh, S. Srinivas Kumar and K. Raja Rajeswari, “ImageWatermarking Scheme Using Singular Value Decomposition, Quantization and Genetic Algorithm”, Vol. 03, pp. 7-10, 2010.
  • N. V. Dharwadkar, B. B. Amberker and A.Gorai, “Non-blind Watermarking scheme for color images in RGB space using DWT-SVD”, Proceedings IEEE, Vol. 04, November 2011.
  • S. kumar, A. kumar saini and P. kumar, “SVD based Robust image digital watermarking using DWT”, IEEE, Vol. 45, 2012.
  • J. Delaigle, C. De Vleeschouwer and B. Macq, “Psychovisual Approach to Digital Picture Watermarking”, Journal of Electronic Imaging, Vol. 7, pp. 628-640, 1998.
  • P. Bas, J. Chassery and F. Davoine, “Using the Fractal Code to Watermark Images”, Proceedings of IEEE International Conference on Image Processing, Vol. 01, pp. 469-473, 1998.
  • www.mathworks.com