List of Journals    /    Call For Papers    /    Subscriptions    /    Login
 
 
 
 
 SEARCH
By Author By Title
 
 
ABOUT CSC
 About CSC Journals
 CSC Journals Objectives
 List of Journals
 CALL FOR PAPERS
 Call For Papers CFP
 Special Issue CFP
AUTHOR GUIDELINES
 Submission Guidelines
 Peer Review Process
 Helpful Hints For Getting Published
 Plagiarism Policies
 Abstracting & Indexing
 Open Access Policy
 Submit Manuscript
 FOR REVIEWERS
 Reviewer Guidelines
 FOR EDITORIAL
 Editor Guidelines
 Join Us As Editor
 Launch Special Issue
 Suggest New Journal
 CSC LIBRARY
 Browse CSC Library
 Open Access Policy
  SERVICES
 Conference Partnership Program (CPP)
 Abstracting & Indexing
 SUBSCRIPTIONS
 Subscriptions
 Discounted Packages
 Archival Subscriptions
 How to Subscribe
 Librarians
 Subscriptions Agents
 Order Form
 DOWNLOADS
 
 
 
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Full text
 PDF(929.5KB)
Source 
International Journal of Computer Science and Security (IJCSS)
Table of Contents
Download Complete Issue    PDF(1.98MB)
Volume:  5    Issue:  4
Pages:  NULL
Publication Date:   September / October 2011
ISSN (Online): 1985-1553
Pages 
394 - 404
Author(s)  
 
Published Date   
05-10-2011 
Publisher 
CSC Journals, Kuala Lumpur, Malaysia
ADDITIONAL INFORMATION
Keywords   Abstract   References   Cited by   Related Articles   Collaborative Colleague
 
KEYWORDS:   Multi-bands Wavelet, Semi Blind Watermark Detection, Robustness 
 
 
This Manuscript is indexed in the following databases/websites:-
1. Academic Journals Database
2. iSEEK
3. Bielefeld Academic Search Engine (BASE)
4. Directory of Open Access Journals (DOAJ)
5. Google Scholar
6. Docstoc
 
 
In this paper, an image watermarking scheme based on multi bands wavelet transformation method is proposed. At first, the proposed scheme is tested on the spatial domain (for both a non and semi blind techniques) in order to compare its results with a frequency domain. In the frequency domain, an adaptive scheme is designed and implemented based on the bands selection criteria to embed the watermark. These criteria depend on the number of wavelet passes. In this work three methods are developed to embed the watermark (one band (LL|HH|HL|LH), two bands (LL&HH | LL&HL | LL&LH | HL&LH | HL&HH | LH&HH) and three bands (LL&HL&LH | LL&HH&HL | LL&HH&LH | LH&HH&HL) selection. The analysis results indicate that the performance of the proposed watermarking scheme for the non-blind scheme is much better than semi-blind scheme in terms of similarity of extracted watermark, while the security of semi-blind is relatively high. The results show that in frequency domain when the watermark is added to the two bands (HL and LH) for No. of pass =3 led to good correlation between original and extracted watermark around (similarity = 99%), and leads to reconstructed images of good objective quality (PSNR=24 dB) after JPEG compression attack (QF=25). The disadvantage of the scheme is the involvement of a large number of wavelet bands in the embedding process. 
 
 
 
1 F. Hartung and M. Kutter, “Multimedia Watermarking Techniques”, Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107,1999.
2 BARNETT, R. 1999. Digital watermarking: Application, techniques, and challengs. IEE Electron. Comm. Engin. J., 173–183. BENDER, W., BUTERA, W., GRUHL, D., HWANG, R., PAIZ, F. J., AND POGREB, S. 2000. Applications for data hiding. IBM Syst. J. 39, 3 and 4, 547–568.
3 VOLOSHYNOVSKIY, S., PEREIRA, S., PUN, T., EGGERS, J., AND SU, J. 2001. Attacks on digital watermarks: Classification, estimation based attacks and benchmarks. IEEE Comm. Mag. 39, 9, 118–126.
4 P. Dong, G. Jovan, “Digital Watermarking Robust to Geometric Distortions” IEEE Transaction on Image Processing, vol. 14, no. 12, pp. 2140-2150, 2005.
5 J.R. Hernandez, M.Amado, and F. Perez- Gonzalez, “DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis And a New Structure, ” IEEE Trans. Image Processing, vol. 9, pp 55-68, Jan. 2000.
6 Chuanmu Li Haiming Song, 2009, A novel watermarking scheme for image authentication in DWT domain. IEEE on Security and Identification in Communication. pp. 160-162.
7 P.Premaratne, “A novel watermark embedding and detection scheme for images in DFT domain”, Proceedings of IEE 7th International Conference on Image Processing & Applications, Vol.2, 1999,pp.780-783.
8 P. Meerwald, C. Koidl and A. Uhl , “Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization’’ ,IEEE Transaction on Multimedia, vol. 11, no. 5, pp. 1037-1041, 2009.
9 L. Peng and D. Zhizhong, “A blind image watermarking scheme based on wavelet tree quantization”, IEEE 2nd International Symposium n Electronic Commerce and Security, ISBN: 978-0-7695-3643-9, 2009.
10 A. Hanaa , M. hadhoud, and A. Shaalan, “A Blind Spread Spectrum Wavelet Based Image Watermarking Algorithm” International Conference on Computer Engineering & Systems, pp. 251-256, 2009.
11 I. Cox, M. Miller, J. Bloom, J. Fridrich and T. Kalker, “Digital Watermarking and Steganography’’, (Second Edition), Morgan Kaufmann Publisher, ISBN-10: 0123725852, 2007.
12 Y. Zhang, “Digital Watermarking “Digital Watermarking Technology: A Review”, International Conference on Future Computer and Communication, pp. 250-252, 2009.
 
 
 
 
 
 
 
 
Aree Ali Mohammed : Colleagues
Haval Mohammed Sidqi : Colleagues  
 
 
 
  Untitled Document
 
Copyrights (c) 2012 Computer Science Journals. All rights reserved.
Best viewed at 1152 x 864 resolution. Microsoft Internet Explorer.
 
  
 
Copyrights & Usage: Articles published by CSC Journals are Open Access. Permission to copy and distribute any other content, images, animation and other parts of this website is prohibited. CSC Journals has the rights to take action against individual/group if they are found victim of copying these parts of the website.