A Robust Watermarking Scheme Using DWT and SVD

Authors

  • B. Gopi Research Scholar, Department of Computer Science, Vikrama Simhapuri University, Andhra Pradesh, India
  • T. Sudha Professor, Department of Computer Science, Sri Padmavati Mahila ViswaVidhyalayam, Andhra Pradesh, India

DOI:

https://doi.org/10.51983/ajcst-2019.8.S3.2079

Keywords:

SVD, Attacks, Watermarking, Authentication

Abstract

Singular value decomposition is in use quite recently in many applications. The SVD is being used for many applications along with other techniques. In this paper a robust watermarking scheme was proposed by using SVD along with wavelet transform. In addition to normal hiding scheme a random signature was used to improve its robustness against spurious intruders. The unitary matrices are used to generate a signature which is going to be embedded into the fourth level decomposition of cover image. After extracting the watermark at the other end, it will be checked with the signature embedded. If these signatures are matched the unitary matrices will be used to extract watermark from watermarked image. Different attacks are considered and the simulation results have shown that the extraction of watermark after attacks have shown minor effect only.

References

J. O Ruanaidh and T. Pun, “Rotation, scale and translation invariant spread spectrum digital image watermarking,” Signal Processing, Vol. 66, No. 3, pp. 303–317, May 1998.

C.Y. Lin, M. Wu, J.A. Bloom, I.J. Cox, M.L. Miller, and Y.M. Lui, “Rotation, scale and translation resilient watermarking for images,” IEEE Trans. Image Processing, Vol. 10, No. 5, pp. 767–782, May 2001.

Katzenbeisser Stefan and A. Petitcolas Fabien, “Information hiding techniques for steganography and digital watermarking”, Norwood, MA, USA, Artech House, Inc., 2000.

Lee Sin-Joo and Jung Sung-Hwan, “A survey of watermarking techniques applied to multimedia”, Industrial electronics. Proceedings. ISIE 2001. IEEE International Symposium, pp. 272–277, 2001.

C.I. Podilchuk and E.J. Delp, “Digital watermarking: Algorithms and applications”, Signal Process. Mag. IEEE. Vol. 18, No.4, pp.33–46, 2001.

M.S. Raval and P.P. Rege, “Discrete wavelet transform based multiple watermarking scheme”, TENCON, Conference on Convergent Technologies for Asia-Pacific Region, Vol. 3, No. 1, pp. 935–938, 2003.

S.A. Kasmani and A. Naghsh-Nilchi, “A new robust digital image watermarking technique based on joint DWT-DCT transformation”, in Proc. Convergence and Hybrid Information Technology ICCIT ‘08 Third International Conference, pp. 539–544, 2008.

H.C. Andrews and C.L. Patterson, “Singular value decomposition (SVD) image coding”, IEEE Trans. Commun., Vol. 24, No.4, pp. 425–432, 1976.

B. Zhou and J. Chen, “A geometric distortion resilient image watermarking algorithm based on SVD”, Chin. J. Image Graphics, Vol. 9, No. 1, pp. 506–512, 2004.

R. Liu and T. Tan, “A SVD-based watermarking scheme for protecting rightful ownership”, IEEE Trans. Multimed., Vol. 4, No. 1, pp. 121–128, 2002.

R.A Ghazy, N. AEl-Fishawy, M.M. Hadhoud, M.I. Dessouky and F.E. AEl-Samie, “An efficient block-by-block SVD-based image watermarking scheme”, Radio Science Conference, NRSC 1–9, 2007.

Bhandari Kunal, K. Mitra Suman and Jadhav Ashish, “A hybrid approach to digital image watermarking using singular value decomposition and spread spectrum”, Pre MI, pp. 272–275, 2005.

Quan Liu and Qingsong Ai, “Combination of DCT-based and SVD-based watermarking scheme”, in Signal Processing Proceedings, ICSP ‘04, 7th International Conference, pp. 873–876, 2004.

Ganic Emir and M. Ahmet Eskicioglu, “Robust DWT-SVD domain image watermarking: Embedding data in all frequencies”, in Proceedings of the workshop on Multimedia and Security, pp. 166–174, 2004.

Zhang Xiao-Ping and Li Kan, “Comments on-An SVD-based watermarking scheme for protecting rightful ownership”, IEEE Trans. On Multimedia, Vol. 7, No.3, pp. 593–594, 2005.

Downloads

Published

05-06-2019

How to Cite

Gopi, B., & Sudha, T. (2019). A Robust Watermarking Scheme Using DWT and SVD. Asian Journal of Computer Science and Technology, 8(S3), 85–89. https://doi.org/10.51983/ajcst-2019.8.S3.2079

Most read articles by the same author(s)