Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(929.51KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Robust Image Watermarking Scheme Based on Wavelet Technique
Aree Ali Mohammed, Haval Mohammed Sidqi
Pages - 394 - 404     |    Revised - 01-09-2011     |    Published - 05-10-2011
Volume - 5   Issue - 4    |    Publication Date - September / October 2011  Table of Contents
MORE INFORMATION
KEYWORDS
Multi-bands Wavelet, Semi Blind Watermark Detection, Robustness
ABSTRACT
In this paper, an image watermarking scheme based on multi bands wavelet transformation method is proposed. At first, the proposed scheme is tested on the spatial domain (for both a non and semi blind techniques) in order to compare its results with a frequency domain. In the frequency domain, an adaptive scheme is designed and implemented based on the bands selection criteria to embed the watermark. These criteria depend on the number of wavelet passes. In this work three methods are developed to embed the watermark (one band (LL|HH|HL|LH), two bands (LL&HH | LL&HL | LL&LH | HL&LH | HL&HH | LH&HH) and three bands (LL&HL&LH | LL&HH&HL | LL&HH&LH | LH&HH&HL) selection. The analysis results indicate that the performance of the proposed watermarking scheme for the non-blind scheme is much better than semi-blind scheme in terms of similarity of extracted watermark, while the security of semi-blind is relatively high. The results show that in frequency domain when the watermark is added to the two bands (HL and LH) for No. of pass =3 led to good correlation between original and extracted watermark around (similarity = 99%), and leads to reconstructed images of good objective quality (PSNR=24 dB) after JPEG compression attack (QF=25). The disadvantage of the scheme is the involvement of a large number of wavelet bands in the embedding process.
CITED BY (8)  
1 Hutagalung, B. T., & Syahputra, A. watermarking citra digital dengan information dispersal algorithm (ida) dan algoritma huffman.
2 Radouane, M., Messoussi, R., Touahni, R., & Boujiha, T. (2014, April). Robust method of digital image watermarking using SVD transform on DWT coefficients with optimal block. In Multimedia Computing and Systems (ICMCS), 2014 International Conference on (pp. 255-260). IEEE.
3 Hasan, H. R., Sulong, G. B., & Selamat, A. A Novel Blind Color Image Watermarking Technique in Hybrid Domain Using LSB Approach and Discrete Slantlet Transform.
4 Shrirao, D. W., & Honole, S. A Survey on Improving Robustness of Image Watermarking By Using Gradient.
5 Kaur, S., & Bansal, R. (2013). enhanced technique for secured and reliable watermarking using mfhwt. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2(5), pp-1674.
6 Mishra, S., Mahapatra, A., & Mishra, P. (2013). A survey on Digital watermarking techniques. International Journal of Computer Science and Information Technologies, 4(3), 451-456.
7 Chitla, A., & Mohan, M. C. (2012). Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of Elliptic Curve Cryptography (ECC). International Journal of Computer Applications, 57(6).
8 Radouane, m., boujiha, t., messoussi, r., & touahni, R. (2007). seerable pyramid transform and opimals blocks to ensure robustness of images watermarking.
1 Google Scholar 
2 Academic Journals Database 
3 CiteSeerX 
4 refSeek 
5 iSEEK 
6 Bielefeld Academic Search Engine (BASE) 
7 Scribd 
8 SlideShare 
9 PdfSR 
1 F. Hartung and M. Kutter, “Multimedia Watermarking Techniques”, Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107,1999.
2 BARNETT, R. 1999. Digital watermarking: Application, techniques, and challengs. IEE Electron. Comm. Engin. J., 173–183. BENDER, W., BUTERA, W., GRUHL, D., HWANG, R., PAIZ, F. J., AND POGREB, S. 2000. Applications for data hiding. IBM Syst. J. 39, 3 and 4, 547–568.
3 VOLOSHYNOVSKIY, S., PEREIRA, S., PUN, T., EGGERS, J., AND SU, J. 2001. Attacks on digital watermarks: Classification, estimation based attacks and benchmarks. IEEE Comm. Mag. 39, 9, 118–126.
4 P. Dong, G. Jovan, “Digital Watermarking Robust to Geometric Distortions” IEEE Transaction on Image Processing, vol. 14, no. 12, pp. 2140-2150, 2005.
5 J.R. Hernandez, M.Amado, and F. Perez- Gonzalez, “DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis And a New Structure, ” IEEE Trans. Image Processing, vol. 9, pp 55-68, Jan. 2000.
6 Chuanmu Li Haiming Song, 2009, A novel watermarking scheme for image authentication in DWT domain. IEEE on Security and Identification in Communication. pp. 160-162.
7 P.Premaratne, “A novel watermark embedding and detection scheme for images in DFT domain”, Proceedings of IEE 7th International Conference on Image Processing & Applications, Vol.2, 1999,pp.780-783.
8 P. Meerwald, C. Koidl and A. Uhl , “Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization’’ ,IEEE Transaction on Multimedia, vol. 11, no. 5, pp. 1037-1041, 2009.
9 L. Peng and D. Zhizhong, “A blind image watermarking scheme based on wavelet tree quantization”, IEEE 2nd International Symposium n Electronic Commerce and Security, ISBN: 978-0-7695-3643-9, 2009.
10 A. Hanaa , M. hadhoud, and A. Shaalan, “A Blind Spread Spectrum Wavelet Based Image Watermarking Algorithm” International Conference on Computer Engineering & Systems, pp. 251-256, 2009.
11 I. Cox, M. Miller, J. Bloom, J. Fridrich and T. Kalker, “Digital Watermarking and Steganography’’, (Second Edition), Morgan Kaufmann Publisher, ISBN-10: 0123725852, 2007.
12 Y. Zhang, “Digital Watermarking “Digital Watermarking Technology: A Review”, International Conference on Future Computer and Communication, pp. 250-252, 2009.
Mr. Aree Ali Mohammed
- Iraq
aree.ali@univsul.net
Mr. Haval Mohammed Sidqi
- Iraq