Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(566.34KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gray level Image Watermarking
Nagaraj V. Dharwadkar, B. B. Amberker
Pages - 89 - 105     |    Revised - 30-04-2010     |    Published - 10-06-2010
Volume - 4   Issue - 2    |    Publication Date - May 2010  Table of Contents
MORE INFORMATION
KEYWORDS
Watermarking, DWT, RMS, MSE, PSNR
ABSTRACT
In this paper, we propose an invisible blind watermarking scheme for the gray-level images. The cover image is decomposed using the Discrete Wavelet Transform with Biorthogonal wavelet filters and the watermark is embedded into significant coefficients of the transformation. The Biorthogonal wavelet is used because it has the property of perfect reconstruction and smoothness. The proposed scheme embeds a monochrome watermark into a gray-level image. In the embedding process, we use a localized decomposition, means that the second level decomposition is performed on the detail sub-band resulting from the first level decomposition. The image is decomposed into first level and for second level decomposition we consider Horizontal, vertical and diagonal subband separately. From this second level decomposition we take the respective Horizontal, vertical and diagonal coefficients for embedding the watermark. The robustness of the scheme is tested by considering the different types of image processing attacks like blurring, cropping, sharpening, Gaussian filtering and salt and pepper noise effect. The experimental result shows that the embedding watermark into diagonal subband coefficients is robust against different types of attacks.
CITED BY (6)  
1 Kekre, H. B., Sarode, T., & Natu, S. (2015). performance comparison of hybrid wavelet transforms formed using dct, walsh, haar and dkt in watermarking. International Journal of Computer Science & Information Technology, 7(1), 41.
2 Kekre, H. B., Sarode, T., & Natu, S. (2015). performance analysis of watermarking using svd and column/row hybrid wavelet transform of dct with walsh, haar and dkt. International Journal of Advances in Engineering & Technology, 8(1), 1985.
3 Kekre, H. B., Sarode, T., & Natu, S. (2014). Robust Watermarking Technique using Hybrid Wavelet Transform Generated from Kekre Transform and Discrete Cosine Transform. International Journal of Scientific and Research Publications, 4(2).
4 Kekre, H. B., Sarode, T., & Natu, S. Performance Analysis of Watermarking using Kronecker Product of Orthogonal Transforms and Wavelet Transforms.
5 Kekre, D. H., Sarode, D. T., & Natu, S. (2013). Robust watermarking using Walsh wavelets and SVD. International Journal of Advances in Science and Technology, 6(4), 8-23.
6 Namazi, F., Karami, M. R., & Ghaderi, R. Robust Image Watermarking by Finite Radon, Wavelet and SVD.
1 Google Scholar 
2 ScientificCommons 
3 Academic Index 
4 CiteSeerX 
5 refSeek 
6 iSEEK 
7 Socol@r  
8 ResearchGATE 
9 Bielefeld Academic Search Engine (BASE) 
10 Scribd 
11 WorldCat 
12 SlideShare 
13 PDFCAST 
14 PdfSR 
1 Ingemar J. Cox and Matt L. Miller, “The First 50 Years of Electronic Watermarking”, EURASIP Journal on Applied Signal Processing Vol. 2, pp. 126–132, 2002.
2 G. Voyatzis, I. Pitas, “ Protecting digital image copyrights: A framework”, IEEE Computer Graphics Application, Vol. 19, pp. 18-23, Jan. 1999.
3 Katzenbeisser S. and Petitcolas F. A. P., “Information Hiding Techniques for Steganography and Digital Watermarking”, Artech House, UK, 2000.
4 Peter H. W. Wong, Oscar C. Au, Y. M. Yeung, “A Novel Blind Multiple Watermarking Technique for Images”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, August 2003.
5 Celik, M.U., et al., “Lossless generalized-LSB data embedding”, IEEE Transactions on Image Processing,, 14(2), pp.253-26, .2005.
6 Cvejic, N. and T. Seppanen, “Increasing robustness of LSB audio steganography by reduced distortion LSB coding”. Journal of Universal Computer Science, 11(1), pp. 56-65, 2005.
7 Ingemar J. Cox, Matthew L Miller, Jeffrey A. Bloom, Jassica Fridrich, Tan Kalker, “ Digital Watermarking and Steganography”, Second edition, M.K. Publishers, 2008.
8 Wu, X., J., Hu, Z.Gu, and J., Huang, 2005. “A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters”, Technical Report. School of Information Science and Technology, Sun Yat-Sen University, China, 2005
9 Kundur, D., and D., Hatzinakos, 1998. “Digital watermarking using multiresolution wavelet decomposition”, Technical Report., Dept. of Electrical and Computer Engineering, University of Toronto
10 Burrus, C. S., R. A., Gopinath, and H., Guo,. “Introduction to Wavelets and Wavelet Transforms: A Primer”, Prentice-Hall, Inc. 1998.
11 Daubechies, I., 1994. “Ten lectures on wavelets”, CBMS, SIAM, pp 271-280.
12 Suhad Hajjara, Moussa Abdallah, Amjad Hudaib, “Digital Image Watermarking Using Localized Biorthogonal Wavelets”, European Journal of Scientific Research, ISSN 1450-216X Vol.26 No.4 (2009), pp.594-608 © EuroJournals Publishing, Inc. 2009.
Mr. Nagaraj V. Dharwadkar
National Institute of Technology (NIT), Warangal - India
nvd@nitw.ac.in
Mr. B. B. Amberker
National Institute of Technology (NIT), Warangal - India