Open Access Open Access  Restricted Access Subscription or Fee Access

Study and Analysis of Robust DCT-2L-DWT-SVD Domain Based Digital Image Watermarking Techniques with Different Attacks Using MATLAB

Vipin Agrawal, Karuna Markam

Abstract


The proposed paper presents a combined technique of Discrete Cosine Transform (DCT), 2level Discrete Wavelet Transform (2L-DWT) and Singular Value Decomposition (SVD) based Digital Image Watermarking (DIW) with dissimilar attacks. In the initial stage, split the original (cover) image into four sub-bands LL,LH,HL,HH which are named according to the filter (high-pass or low-pass), select LL sub-band which is split in to four sub-bands - LL-LL ,LL-LH ,LL-HL, LL-HH using DWT and DCT following the SVD on every band by modifying their singular values. After obtaining the watermarked image (WI), different attacks, namely, blurring, adding noise, contrast adjustment (CA), histogram equalization (HE), swirl, median filter occur. At the end, we extract the original embedded WI in all bands and compare them on the basis of their Peak Signal Noise Ratio (PSNR), mean square error (MSE) parameters. Results obtained from (DCT-2L-DWT-SVD) showed improved performance in terms of imperceptibility, and certain aspect in robustness PSNR, and MSE than that of (DWT- SVD), in addition to the quality of recovered WI.

Full Text:

PDF

References


Furqan, M. Kumar. Study and Analysis of Robust DWT-SVD Domain Based Digital Image Watermarking Technique Using MATLAB, IEEE International Conference on Computational Intelligence & Communication Technology; 2015. [2] V. Potdar, S. Han, E. Chang. A Survey Of Digital Image Watermarking Techniques, In Industrial Informatics, . INDIN ’05. 2005 3rd IEEE International Conference On, Aug. 2005; Pp. 709 – 716. [3] J. O’Ruanaidh , T. Pun, “Rotation, Scale And Translation Invariant Digital Image Watermarking,” In Image Processing, 1997. Proceedings of International Conference; Vol. 1, Oct 1997, Pp. 536 –539. [4] A. Reddy, B. Chatterjee. A New Wavelet Based Logo-Watermarking Scheme, Pattern Recognition Letters; Vol. 26, No. 7, Pp. 1019 – 1027, 2005. [Online]. Available: Http://Www.Sciencedirect.Com/Scienc e/Article/Pii/S016786550400296X [5] Giakoumaki, S. Pavlopoulos, And D. Koutouris, “A Medical Image

Watermarking Scheme based on Wavelet Transform,” In Engineering, Medicine and Biology Society 2003. Proceedings of The 25th Annual International Conference Of The IEEE, Vol. 1, Sept. 2003, Pp. 856 – 859 Vol.1. [6] P. Fakhari, E. Vahedi, C. Lucas. Protecting Patient Privacy From Unauthorized Release Of Medical Images Using A Bio-Inspired WaveletBased Watermarking Approach, Digital Signal Processing; 2011 Vol. 21, No. 3, Pp. 433 – 446,. [Online]. Available: Http://Www.Sciencedirect.Com/Scienc e/Article/Pii/S1051200411000170 [7] R. Liu, T. Tan.An Svd-Based Watermarking Scheme For Protecting Rightful Ownership, Multimedia, IEEE Transactions; 2002 Vol. 4, No. 1, Pp. 121 –128.. [8] S Madhesiya, S Ahmed. Advanced Technique Of Digital Watermarking Based On SVD-DWT-DCT And Arnold Transform, Int Jou Of Advan Resea In Comp Engin& Tech ; May 2013,Volume 2, No 5, ,Pp: 1918-1923. [9] S. Salama, M. A. Mokhtar. Combined Technique for Improving Digital Image Watermarking, 2nd IEEE International Conference on Computer and Communications; 2016. [10] S. S. Gonge, A. A.Ghatol. An Integration of SVD Digital Image Watermarking with AES Technique for Copyright Protection and Security of Bank Cheque Image, IEEE; 2016. [11] M. R. Mitashe, A. R. Habib, A. Razzaque, I. A. Tanima, J. Uddin. An Adaptive Digital Image Watermarking Scheme with PSO, DWT and XFCM, ICIVPR; 2017. [12] S. Pandey, R. Gupta. A novel approach for Digital Image Watermarking Using 5-DWT-SVD and Stream Cipher Encryption with Different Attacks, ICCUBEA; 2016.




DOI: https://doi.org/10.37628/ijoippr.v3i2.267

Refbacks

  • There are currently no refbacks.