A Secure and Robust DWT based Digital Image Watermarking Technique

@article{Saxena2017ASA,
  title={A Secure and Robust DWT based Digital Image Watermarking Technique},
  author={Swati Saxena and Pankaj Soni and Manish Kumar Gurjar},
  journal={International Journal of Computer Applications},
  year={2017},
  volume={168},
  pages={21-24}
}
Due to the tremendous growth of internet, the web may produce huge information in digital form. The information may be in the form of numbers, strings, images, and video. If the data to be transmitted are confidential, it is suitable as well for some mischievous users to illegitimately destroy, copy, or change them on the Internet. As a consequence, information security becomes an essential issue. Security and robustness are two important requirements for digital image processing algorithms in… 
1 Citations

Figures from this paper

A New Video Watermarking Using Redundant Discrete Wavelet in Singular Value Decomposition Domain
  • K. Srinivas
  • Computer Science
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES
  • 2019
TLDR
This article presents a new video watermarking using redundant discrete wavelet transform (RDWT) in singular value decomposition (SVD) domain and computed several image quality metrics lie peak signal-to-noise ratio (PSNR), structural similarity (SSIM) index and root mean square error (RMSE) to disclose the imperceptibility and robustness of proposed water marking approach compared to conventional approaches.

References

SHOWING 1-10 OF 15 REFERENCES
Image watermarking for tamper detection
  • J. Fridrich
  • Computer Science
    Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269)
  • 1998
TLDR
An oblivious watermarking technique for tamper detection in digital images that enables us to distinguish malicious changes, such as replacing/adding features from nonmalicious changes resulting from common image processing operations.
Authentication and correction of digital watermarking images
TLDR
The basic idea of the proposed watermarking technique is to adopt conventional error control coding techniques for generating a watermark.
A public key watermark for image verification and authentication
  • P. Wong
  • Computer Science
    Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269)
  • 1998
TLDR
A public key watermarking algorithm for image integrity verification that uses a public key as in public key cryptography, and hence it can be performed by any person without the secure exchange of a secret key.
Digital watermarking for telltale tamper proofing and authentication
TLDR
A novel fragile watermarking approach which embeds a watermark in the discrete wavelet domain of the image by quantizing the corresponding coefficients, which allows the user to make application-dependent decisions concerning whether an image, which is JPEG compressed for instance, still has credibility.
Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics
  • Xiaobin Kang, ShengMin Wei
  • Computer Science
    2008 International Conference on Computer Science and Software Engineering
  • 2008
TLDR
Experimental results demonstrate the validity of the proposed approach to tampered images undergone some attacks like Gaussian blur filtering, Gaussian white noise contamination, lossy JPEG compression, etc.
Digital watermarking using multiresolution wavelet decomposition
  • D. Kundur, D. Hatzinakos
  • Computer Science
    Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181)
  • 1998
TLDR
A novel technique for the digital watermarking of still images based on the concept of multiresolution wavelet fusion that is robust to a variety of signal distortions and compared with another transform domain water marking method.
Secret and public key image watermarking schemes for image authentication and ownership verification
TLDR
A watermarking scheme for ownership verification and authentication that requires a user key during both the insertion and the extraction procedures, and which can detect any modification made to the image and indicate the specific locations that have been modified.
Rank-Based Image Watermarking Method With High Embedding Capacity and Robustness
TLDR
A novel rank-based method for image watermarking that only uses two DCT coefficients to hide one watermark bit, it can achieve very high embedding capacity and result in high robustness against attacks.
Capacity issues in digital image watermarking
TLDR
Numerical simulations reveal that although strongly suboptimal in the number of bits they can effectively store in an image, simple and very low complexity modulator designs are able to pack enough bits in animage to be useful in practice.
Robust and secure image hashing
TLDR
A novel algorithm for generating an image hash based on Fourier transform features and controlled randomization is developed and it is shown that the proposed hash function is resilient to content-preserving modifications, such as moderate geometric and filtering distortions.
...
...