An Efficient CRT based Digital Image Watermarking using Double Density Wavelet Transform

Singh, Prerna An Efficient CRT based Digital Image Watermarking using Double Density Wavelet Transform. International Journal of Computer Science and Network - IJCSN, 2016, vol. 5, n. 5. [Journal article (Unpaginated)]

[img] Text
An-Efficient-CRT-based-Digital-Image-Watermarking-using-Double-Density-Wavelet-Transform.pdf

Download (384kB)

English abstract

Digital Watermarking is an unpretentious and effective approach to afford copyright fortification. Watermark transparency is obligatory primarily for copyright protection. The challenge is to introduce a digital watermark that is both transparent and highly robust to common signal processing and possible attacks. The two basic requirements for an effective watermarking scheme, robustness and transparency, conflict with each other.This paper proposesa watermarking technique for digital gray scale images that is based on utilizing congruence’s in number theory and its generalizations in abstract algebra which have been developed in the context of image compression. Watermarking scheme is based on a Chinese Remainder Theorem along with Double Density Discrete Wavelet Transform framework individually which allows for the possibility of directly watermarking the Image bitstream, Watermark region selection is based on transformation level. In proposed scheme, initially, the cover image and watermark are transformed into spatial domain using Double Density Wavelet Transform and then singular values of these transformed images are combined using CRT coefficients. Our scheme is shown to provide very good results both in terms of image transparency and robustness. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. Experimental results are provided in terms of Peak signal to noise ratio (PSNR), Mean Squared Error (MSE), Correlation and Weighted Peak signal to noise ratio (WPSNR) to demonstrate the effectiveness of the proposed algorithm.

Item type: Journal article (Unpaginated)
Keywords: CRT, Digital Watermarking, Multiscale Embedding, Wavelet Subspaces, SVD, DWT, and Double Density Discrete Wavelet Transform
Subjects: I. Information treatment for information services > IH. Image systems.
Depositing user: IJCSN Journal
Date deposited: 14 Nov 2016 04:12
Last modified: 14 Nov 2016 04:12
URI: http://hdl.handle.net/10760/30195

References

[1] Hartung and M. Kutter, "Multimedia Watermarking Techniques,"Proc. of the IEEE, vol. 87, no. 7, pp. 1079-1107, July 1999. [2] Chih-Chin Lai and Cheng-Chih Tsai. (November 2010) ‘Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition’, IEEE Transactions On Instrumentation And Measurement Vol.59, No.11, pp. 3060-3063. [3] Chun-Shien Lu and Hong-Yuan Mark Liao. (October 2001) ‘Multipurpose Watermarking for Image Authentication and Protection’ IEEE Transactions on Image Processing Vol. 10, No.10, pp.1579- 1592. [4] V. Potdar, et al "A Survey of Digital Image Watermarking Techniques", Proc. of the EEE International Conference on Industrial Informatics, Australia Perth, pp. 709-716, 2005. [5] Liu Quan, AI Qingsong “A combination of DCT based and SVD based watermarking, ICSP proceedings of IEEE International conference on signal processing, pp. 873-876, 2004. [6] Feng Liu, et al. “A Watermarking Algorithm for Digital Image Based on DCT and SVD”; Conference on Image and Signal Processing, 2008. [7] Emad E. Abdallah, et al. “A robust block-based image watermarking scheme using fast Hadamard Transform and Singular Value Decomposition” Proceedings of The 18th International Conference on Pattern Recognition, pp:673 - 676, 2006. [8] Tang Xianghong, Yang Lianjie, YueHengli, Yin Zhongke, “A Watermarking Algorithm Based on the SVD and Hadamard Transform”, Proceedings of International Conference on Communications, Circuits and Systems, Volume 2, pp. 874-877, 27-30 May 2005. [9] Ali Al-Haj, “A Hybrid Digital Image Watermarking Algorithm”, 4th International Conference on Innovations in Information Technology. pp: 690 - 694 Nov. 2007. [10] Liu Liang and Sun Qi “A new SVD-DWT composite watermarking”, ICSP proceedings of IEEE International conference on signal processing, 2006. [11] Jung-Chun Liu, Chu-Hsing Lin, and Li-ChingKuo” A Robust full band image watermarking scheme” Proceedings on IEEE, 2006. [12] Qiang Li, et al, “Adaptive DWT-SVD Domain Image Watermarking Using Human Visual Model”, Proceedings of 9th international conference on advanced communication Technology, Volume 3, pp: 1947 - 1951, Feb.2007. [13] Y-P. Lai and C-C. Chang, “Parallel computational algorithms for generalized Chinese Remainder Theorem”, Computers and Electrical Engineering, vol. 29, pp. 801-811, 2003. [14] M-S. Hwang, W-G. Tzeng and W-P. Yang, “An access control scheme based on Chinese Remainder Theorem and time stamp concept”, Computers and Security, vol. 15, No. I, pp. 73-81, 1996. [15] H. Chen, “CRT-based high-speed parallel architecture for long BCH encoding”, IEEE Trans. Circuits and Systems-II, vol. 56, no. 8, pp. 684-86, Aug. 2009. [16] C-C. Chang, Y-P. Hsieh and C-H. Lin, “Sharing secrets in stego images with authentication”, Pattern Recognition, vol. 41, pp. 3130-3137, 2008. [17] J. S. Shyong and Y-R. Chen, “Threshold secret image sharing by Chinese Remainder Theorem”, Proc. IEEE Asia Pacific Services Computing Conference, Yilin, Taiwan, Dec. 2008, pp.1332-1337. [18] J. C. Patra, A. Karthik and C. Bornand, “A Novel CRT-based watermarking technique for authentication of multimedia contents”, Digital Signal Processing, vol. 20, no. 2, pp. 442-453, July 2009. [19] J. C. Patra, J. E.Phua and D. Rajan, “DCT Domain watermarking scheme using Chinese Remainder Theorem for image authentication”, Proc. IEEE Intl. Conf. Multimedia and Expo (ICME 2010), Singapore, July 2010, pp. 111-116. [20] J. C. Patra, J. E. Phua and C. Bornand, “A novel DCT domain CRT based watermarking scheme for image authentication surviving JPEG compression”, Digital Signal Processing, 20(6), 1597-1611, 2010.


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item