scispace - formally typeset
Search or ask a question
Proceedings Article

Comparative analysis of LSB, DCT and DWT for Digital Watermarking

11 Mar 2015-pp 40-45
TL;DR: In this work, watermarking has been done using LSB technique, DCT transform and DWT transform, and parameters are compared for various noises like Gaussian noise, Poisson noise, Salt and Pepper noise and Speckle noise.
Abstract: In one's day to day life; internet is growing and became an important part. Digital content can easily be downloaded, copied or edited. Digital content can be secured by various ways. Digital Watermarking is one of the methods for the protection of Digital Content. Digital Watermarking is a method by which data can be secured by hiding data in any image which can work as a carrier image. The carrier image is also known as cover image. Watermarking is an interactive method to protect and identify the digital data. It permits various types of watermarks to be hidden in digital data e.g. image, audio and video. In this work, watermarking has been done using LSB technique, DCT transform and DWT transform. These techniques are compared on the basis of peak signal to noise ratio (PSNR) and normalized correlation (NC). Parameters are compared for various noises like Gaussian noise, Poisson noise, Salt and Pepper noise and Speckle noise.
Citations
More filters
Journal ArticleDOI
TL;DR: This paper proposes an efficient steganography scheme based on sample comparison in Discrete Wavelet Transform (DWT) domain where the cover audio is decomposed into several multi sub-bands, and then selected coefficients of details are changed by a threshold value depending on the embedding cipher image bit.
Abstract: Steganography is the technique of hiding any secret information like text, image or video behind a cover file. Audio steganography is one of the widespread data hiding techniques that embeds secret data in audio signals. The secret data is hidden in a way that unauthorized people are not aware of the existence of the embedded data and without changing the quality of the audio signal (cover audio). Data hiding in audio signals has various applications such as protection of copyrighted audio signals, secret communication, hiding data that may influence the security and safety of governments and personnel. This paper proposes an efficient steganography scheme based on sample comparison in Discrete Wavelet Transform (DWT) domainwhere the cover audio is decomposed into several multi sub-bands, and then selected coefficients of details are changed by a threshold value depending on the embedding cipher image bit. This approach employs an original image component to perform RSA encryption on it, then cipher bits are embedded in the details components of the audio signal according to a predetermined threshold value. The performance of the algorithm has been estimated extensively against attacks, and simulation results are presented to prove the robustness of the proposed algorithm.

35 citations

Journal ArticleDOI
TL;DR: The proposed digital audio watermarking scheme based on a discrete wavelet transform and Schur decomposition hybrid method is inaudible and robust against common types of attacks such as Gaussian noise, re-quantization, re -sampling, low-pass filter, high- pass filter, echo, MP3 compression, and cropping.
Abstract: The vulnerability of digital audio signals for different types of risks requires an imperceptible and robust digital audio watermarking scheme. In this research, we propose creating one such imperceptible and robust hybrid watermarking scheme based on a discrete wavelet transform (DWT) and Schur decomposition hybrid method. The proposed scheme embeds the foreground bits of the watermarking image into the least significant bit of the diagonal coefficients of the triangular matrix S generated from Schur decomposition. Schur decomposition is applied on the second sub-band HL2 generated from applying a second-level 2D-Haar DWT on the first channel of the original audio signal. We analyze the proposed digital audio watermarking scheme’s performance in terms of signal to noise ratio (SNR), objective difference grades (ODG), and subjective difference grades (SDG) that resulting 81.43, 4.78 and 0.184, respectively. The resulting of payload capacity, NC, and BER are as high as 319.29 bps, 0.9911, and 0.0135, respectively. Experimental results confirm that the proposed scheme is inaudible and robust against common types of attacks such as Gaussian noise, re-quantization, re-sampling, low-pass filter, high-pass filter, echo, MP3 compression, and cropping. In comparison with state-of-the-art audio watermarking schemes, the proposed scheme’s performance is superior in term of imperceptibility, robustness, and data payload size.

23 citations


Cites background from "Comparative analysis of LSB, DCT an..."

  • ...Many studies have been conducted in this field to achieve a high perceptual transparent watermarking scheme [1, 9, 18, 26, 32, 45, 51, 55, 59, 62, 69]....

    [...]

Journal ArticleDOI
Ming-Te Wu1
TL;DR: From computer simulation, the merits of the proposed wavelet transform scheme based on Meyer algorithm over the conventional approaches are verified, in terms of achieving better performance based on the subjective and objective analysis.

20 citations

Journal ArticleDOI
01 Jan 2021
TL;DR: In this paper, a hybrid watermarking scheme is proposed to furnish the robustness and protection of digital data, which is a form of discrete wavelet transform (DWT) and singular value decomposition (SVD).
Abstract: Digital watermarking is playing a vital role in the improvement of authentication, security, and copyright protection in today’s digital transformation. The performance of this technique is shown to be impressive around the globe. Text, audio, video, and image data are acted as watermarks in the digital platform. In this article, a hybrid watermarking scheme is proposed to furnish the robustness and protection of digital data. This hybrid scheme is a form of discrete wavelet transform (DWT) and singular value decomposition (SVD). The embedding and extracting features are carried out through multi-level operations of DWT and SVD. Various attacks are added to the proposed method to justify the robustness of the watermark. In the end, the suggested approach is contrasted with existing methods to confirm the supremacy.

19 citations

Journal ArticleDOI
TL;DR: The simulation result performs that GA is useful to search the value of parameter that produces controllable the combination between robustness, invisibility and capacity, and improves the method by determining the exactvalue of parameter achieving BER, PSNR and payload.
Abstract: data in an image file is needed by its owner to set his ownership in a logo as a watermark embedded in the image file. Hiding the logo in the image was done in several methods. One of the method is domain transform using 2D-DCT in which data is embedded in frequency domain of the image. First, the host RGB image is converted to certain color space. The available and chosen color spaces are RGB, YCbCr or NTSC. The layer in which the watermark is embedded also can be selected. The available choices are 1 st layer, 2 nd layer, 3 rd layer, 1 st & 2 nd layer, 2 nd & 3 rd layer, 1 st & 3 rd layer and all layers. After the selected layer of image in certain color space is transformed in block based to frequency domain by DCT, one bit watermark is embedded on the AC coefficient of each block such a way that the bit is represented by specific value called delta in a zigzag and vary length of pixel. The vary parameters optimized by Genetics Algorithm are selected color space, selected layer, block size, length of pixel to be embedded by one bit watermark, and delta. Bit “1” is represented by +delta, and bit “0” is represented by –delta in vary length of pixel after zigzag. The simulation result performs that GA is useful to search the value of parameter that produces controllable the combination between robustness, invisibility and capacity. Thus, GA improves the method by determining the exact value of parameter achieving BER, PSNR and payload.

16 citations


Additional excerpts

  • ...Neha Bansal [11] published paper that described comparison between LSB, DCT and DWT method in image watermarking....

    [...]

References
More filters
Journal ArticleDOI
01 Jun 1998
TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Abstract: We review developments in transparent data embedding and watermarking for audio, image, and video. Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal. The embedded data are perceptually inaudible or invisible to maintain the quality of the source data. The embedded data can add features to the host multimedia signal, e.g., multilingual soundtracks in a movie, or provide copyright protection. We discuss the reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream. We also discuss the issues and problems associated with copy and copyright protection and assess the viability of current watermarking algorithms as a means for protecting copyrighted data.

1,023 citations

Journal ArticleDOI
TL;DR: A new watermarking algorithm is presented: the method, which operates in the frequency domain, embeds a pseudo-random sequence of real numbers in a selected set of DCT coefficients, which is adapted to the image by exploiting the masking characteristics of the human visual system, thus ensuring the watermark invisibility.

743 citations

Journal ArticleDOI
01 Aug 1996
TL;DR: The authors demonstrate a solution to one of the key problems in image watermarking, namely how to hide robust invisible labels inside grey scale or colour digital images.
Abstract: A watermark is an invisible mark placed on an image that is designed to identify both the source of an image as well as its intended recipient. The authors present an overview of watermarking techniques and demonstrate a solution to one of the key problems in image watermarking, namely how to hide robust invisible labels inside grey scale or colour digital images.

462 citations

Proceedings ArticleDOI
04 Jul 1995
TL;DR: The requirements that an effective image watermarking scheme must possess are specified, followed by a review of current and novel techniques based on image transforms.
Abstract: A watermark is all invisible mark placed on an image that can only be detected when the image is compared with the original. This mark is designed to identify both the source of a document as well as its intended recipient. This paper discusses various techniques for embedding such marks in grey scale and colour digital images. It begins specifying the requirements that an effective image watermarking scheme must possess, followed by a review of current and novel techniques based on image transforms.

344 citations

Journal ArticleDOI
W.C. Chu1
TL;DR: A DCT-based image watermarking algorithm is described, where the original image is not required for watermark recovery, and is achieved by inserting the watermark in subimages obtained through subsampling.
Abstract: A DCT-based image watermarking algorithm is described, where the original image is not required for watermark recovery, and is achieved by inserting the watermark in subimages obtained through subsampling.

303 citations


"Comparative analysis of LSB, DCT an..." refers background in this paper

  • ...A recent survey of major techniques appears in [3]....

    [...]