scispace - formally typeset
Search or ask a question
Proceedings Article

Comparative analysis of LSB, DCT and DWT for Digital Watermarking

11 Mar 2015-pp 40-45
TL;DR: In this work, watermarking has been done using LSB technique, DCT transform and DWT transform, and parameters are compared for various noises like Gaussian noise, Poisson noise, Salt and Pepper noise and Speckle noise.
Abstract: In one's day to day life; internet is growing and became an important part. Digital content can easily be downloaded, copied or edited. Digital content can be secured by various ways. Digital Watermarking is one of the methods for the protection of Digital Content. Digital Watermarking is a method by which data can be secured by hiding data in any image which can work as a carrier image. The carrier image is also known as cover image. Watermarking is an interactive method to protect and identify the digital data. It permits various types of watermarks to be hidden in digital data e.g. image, audio and video. In this work, watermarking has been done using LSB technique, DCT transform and DWT transform. These techniques are compared on the basis of peak signal to noise ratio (PSNR) and normalized correlation (NC). Parameters are compared for various noises like Gaussian noise, Poisson noise, Salt and Pepper noise and Speckle noise.
Citations
More filters
Journal ArticleDOI
TL;DR: A novel invisible watermarking scheme: a Discrete Cosine Transform domain based watermark embedding and blind extraction algorithm for copyright protection of color images that is optimized in terms of robustness, computational load, and quality of the image.
Abstract: The multimedia revolution has made a strong impact on our society. The explosive growth of Internet access to this digital information has generated new opportunities and challenges. The ease of editing and duplicating information in the digital domain has created copyright protection concerns for content providers. Various schemes to embed secondary data in digital media have been investigated to preserve copyright and to discourage unauthorized duplication. In order to achieve the required level of protection to digital information, digital watermarking is a viable solution. This paper proposes a novel invisible watermarking scheme: a Discrete Cosine Transform (DCT) domain based watermark embedding and blind extraction algorithm for copyright protection of color images. The proposed algorithm is optimized in terms of robustness, computational load, and quality of the image. Testing of the proposed watermarking scheme’s robustness and security via different benchmarks as well as comparison with a Discrete Wavelet Transform (DWT) approach proves its resilience to digital attacks. The results show that the Peak Signal to Noise Ratio (PSNR) value obtained under no attack conditions in the proposed algorithm is above 41.81 dB, which is higher than most of the existing watermark algorithms. The results from the detector’s response also show that the proposed algorithm has a better security performance than most of the existing algorithms. The architecture for hardware implementation of the proposed algorithm is also presented and the results from the architecture show a PSNR value of 44.37 dB. This verifies that the presented algorithm is more effective than existing algorithms such as image adaptive watermarking, image adaptive watermark creation, zerotree wavelet, and 9/7 biorthogonal wavelet lifting.

10 citations

Journal ArticleDOI
TL;DR: A novel approach of LSB technique based on matrix multiplication process that selects the non-consecutive matrix of pixels to replace the last three bits of each RGB components of cover image by watermark image, suitable for content authentication and copyright protection applications.

10 citations

Journal ArticleDOI
TL;DR: A new watermarking algorithm based on All phase discrete cosine biorthogonal transform (APDCBT), which has stronger robustness in embedding and extracting the watermark and is tested against four kinds of attacks.
Abstract: Watermarking technique provides the possibility for copyright protection. Discrete cosine transform (DCT) is the most popular tool used in watermarking algorithm. But the watermarking algorithm based on DCT is not the most ideal choice in terms of the complexity and robustness. All phase discrete cosine biorthogonal transform (APDCBT) owns the characteristics of high frequency attenuation and good applications in image coding, image denoising and other fields of digital image processing, which provides an efficient method for watermarking. In this paper, a new watermarking algorithm based on APDCBT is proposed. Besides, the binary image watermark is scrambled by Arnold transform to enhance its privacy and robustness greatly in our algorithm. The watermark information is embedded in direct-current (DC) components considering DC components have much larger perceptual capacity. Compared with the DCT algorithm, the proposed algorithm has stronger robustness in embedding and extracting the watermark. Experimental results show that our algorithm can satisfy the imperceptibility and robustness very well. Furthermore, our algorithm is tested against four kinds of attacks: JPEG compression, Gaussian noise, salt & pepper noise and rotation.

7 citations

Book ChapterDOI
01 Jan 2018
TL;DR: The modified version of LSB algorithm using XOR gate is used and the experimentation results are shown and performance analysis of the algorithm is done.
Abstract: In today’s information age, the technologies have developed so much that most of the users prefer Internet to transfer data from one end to another across the world. So privacy in digital communication is the basic requirement when confidential information is being shared between two users. The attacks on the Internet and Internet-attached systems have grown. Digital watermarking technique is used to hide the information inside a signal. In this paper, least significant bit (LSB) algorithm is discussed. The basic LSB algorithm is easy to decrypt because the watermark image is embedded into a single bit position of an original image. To remove this limitation of basic LSB algorithm, the modified version of LSB algorithm using XOR gate is used and the experimentation results are shown. Performance analysis of the algorithm is also done.

6 citations

Journal Article
TL;DR: In this paper, an image authentication scheme based on digital watermarking using clustering and DCT and clustering together with image scrambling technique is proposed and Arnold Transform is used that scrambles watermark before embedding it in to the cover image.
Abstract: The digital images are being widely used in computer applications. These can be modified without any limit by using different image processing software. As a result the concerned person can suffer from financial and public damage. To overcome this, a reliable digital image authentication scheme is required to be developed. Digital watermarking can be used as a solution to this problem. It is an efficient way to guarantee authenticity and integrity of digital images. A watermark is embedded in to the digital image which uniquely identifies the ownership and provides the security to it and can be easily extracted. In this paper, an image authentication scheme based on digital watermarking using clustering is proposed. We have used a combination of DCT and clustering together with image scrambling technique. DCT is used for watermark embedding process and Fuzzy C-Means is used for clustering. In order to improve the security of the proposed Digital Watermarking scheme, Arnold Transform is used that scrambles watermark before embedding it in to the cover image. Performance of the proposed work is evaluated based on Peak Signal-to-Noise Ratio (PSNR) and Normalized Correlation (NC).

4 citations


Cites methods from "Comparative analysis of LSB, DCT an..."

  • ...[14] compared 3 digital watermarking schemes (LSB technique, DWT transform and DCT transform) using PSNR (Peak Signal-to-Noise Ratio) & NC (Normalized Correlation) and concluded that DCT is the best technique to be used for digital watermarking....

    [...]

References
More filters
Journal ArticleDOI
01 Jun 1998
TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Abstract: We review developments in transparent data embedding and watermarking for audio, image, and video. Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal. The embedded data are perceptually inaudible or invisible to maintain the quality of the source data. The embedded data can add features to the host multimedia signal, e.g., multilingual soundtracks in a movie, or provide copyright protection. We discuss the reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream. We also discuss the issues and problems associated with copy and copyright protection and assess the viability of current watermarking algorithms as a means for protecting copyrighted data.

1,023 citations

Journal ArticleDOI
TL;DR: A new watermarking algorithm is presented: the method, which operates in the frequency domain, embeds a pseudo-random sequence of real numbers in a selected set of DCT coefficients, which is adapted to the image by exploiting the masking characteristics of the human visual system, thus ensuring the watermark invisibility.

743 citations

Journal ArticleDOI
01 Aug 1996
TL;DR: The authors demonstrate a solution to one of the key problems in image watermarking, namely how to hide robust invisible labels inside grey scale or colour digital images.
Abstract: A watermark is an invisible mark placed on an image that is designed to identify both the source of an image as well as its intended recipient. The authors present an overview of watermarking techniques and demonstrate a solution to one of the key problems in image watermarking, namely how to hide robust invisible labels inside grey scale or colour digital images.

462 citations

Proceedings ArticleDOI
04 Jul 1995
TL;DR: The requirements that an effective image watermarking scheme must possess are specified, followed by a review of current and novel techniques based on image transforms.
Abstract: A watermark is all invisible mark placed on an image that can only be detected when the image is compared with the original. This mark is designed to identify both the source of a document as well as its intended recipient. This paper discusses various techniques for embedding such marks in grey scale and colour digital images. It begins specifying the requirements that an effective image watermarking scheme must possess, followed by a review of current and novel techniques based on image transforms.

344 citations

Journal ArticleDOI
W.C. Chu1
TL;DR: A DCT-based image watermarking algorithm is described, where the original image is not required for watermark recovery, and is achieved by inserting the watermark in subimages obtained through subsampling.
Abstract: A DCT-based image watermarking algorithm is described, where the original image is not required for watermark recovery, and is achieved by inserting the watermark in subimages obtained through subsampling.

303 citations


"Comparative analysis of LSB, DCT an..." refers background in this paper

  • ...A recent survey of major techniques appears in [3]....

    [...]