scispace - formally typeset
Search or ask a question
Proceedings Article

Comparative analysis of LSB, DCT and DWT for Digital Watermarking

11 Mar 2015-pp 40-45
TL;DR: In this work, watermarking has been done using LSB technique, DCT transform and DWT transform, and parameters are compared for various noises like Gaussian noise, Poisson noise, Salt and Pepper noise and Speckle noise.
Abstract: In one's day to day life; internet is growing and became an important part. Digital content can easily be downloaded, copied or edited. Digital content can be secured by various ways. Digital Watermarking is one of the methods for the protection of Digital Content. Digital Watermarking is a method by which data can be secured by hiding data in any image which can work as a carrier image. The carrier image is also known as cover image. Watermarking is an interactive method to protect and identify the digital data. It permits various types of watermarks to be hidden in digital data e.g. image, audio and video. In this work, watermarking has been done using LSB technique, DCT transform and DWT transform. These techniques are compared on the basis of peak signal to noise ratio (PSNR) and normalized correlation (NC). Parameters are compared for various noises like Gaussian noise, Poisson noise, Salt and Pepper noise and Speckle noise.
Citations
More filters
Journal ArticleDOI
TL;DR: This paper proposes an efficient steganography scheme based on sample comparison in Discrete Wavelet Transform (DWT) domain where the cover audio is decomposed into several multi sub-bands, and then selected coefficients of details are changed by a threshold value depending on the embedding cipher image bit.
Abstract: Steganography is the technique of hiding any secret information like text, image or video behind a cover file. Audio steganography is one of the widespread data hiding techniques that embeds secret data in audio signals. The secret data is hidden in a way that unauthorized people are not aware of the existence of the embedded data and without changing the quality of the audio signal (cover audio). Data hiding in audio signals has various applications such as protection of copyrighted audio signals, secret communication, hiding data that may influence the security and safety of governments and personnel. This paper proposes an efficient steganography scheme based on sample comparison in Discrete Wavelet Transform (DWT) domainwhere the cover audio is decomposed into several multi sub-bands, and then selected coefficients of details are changed by a threshold value depending on the embedding cipher image bit. This approach employs an original image component to perform RSA encryption on it, then cipher bits are embedded in the details components of the audio signal according to a predetermined threshold value. The performance of the algorithm has been estimated extensively against attacks, and simulation results are presented to prove the robustness of the proposed algorithm.

35 citations

Journal ArticleDOI
TL;DR: The proposed digital audio watermarking scheme based on a discrete wavelet transform and Schur decomposition hybrid method is inaudible and robust against common types of attacks such as Gaussian noise, re-quantization, re -sampling, low-pass filter, high- pass filter, echo, MP3 compression, and cropping.
Abstract: The vulnerability of digital audio signals for different types of risks requires an imperceptible and robust digital audio watermarking scheme. In this research, we propose creating one such imperceptible and robust hybrid watermarking scheme based on a discrete wavelet transform (DWT) and Schur decomposition hybrid method. The proposed scheme embeds the foreground bits of the watermarking image into the least significant bit of the diagonal coefficients of the triangular matrix S generated from Schur decomposition. Schur decomposition is applied on the second sub-band HL2 generated from applying a second-level 2D-Haar DWT on the first channel of the original audio signal. We analyze the proposed digital audio watermarking scheme’s performance in terms of signal to noise ratio (SNR), objective difference grades (ODG), and subjective difference grades (SDG) that resulting 81.43, 4.78 and 0.184, respectively. The resulting of payload capacity, NC, and BER are as high as 319.29 bps, 0.9911, and 0.0135, respectively. Experimental results confirm that the proposed scheme is inaudible and robust against common types of attacks such as Gaussian noise, re-quantization, re-sampling, low-pass filter, high-pass filter, echo, MP3 compression, and cropping. In comparison with state-of-the-art audio watermarking schemes, the proposed scheme’s performance is superior in term of imperceptibility, robustness, and data payload size.

23 citations


Cites background from "Comparative analysis of LSB, DCT an..."

  • ...Many studies have been conducted in this field to achieve a high perceptual transparent watermarking scheme [1, 9, 18, 26, 32, 45, 51, 55, 59, 62, 69]....

    [...]

Journal ArticleDOI
Ming-Te Wu1
TL;DR: From computer simulation, the merits of the proposed wavelet transform scheme based on Meyer algorithm over the conventional approaches are verified, in terms of achieving better performance based on the subjective and objective analysis.

20 citations

Journal ArticleDOI
01 Jan 2021
TL;DR: In this paper, a hybrid watermarking scheme is proposed to furnish the robustness and protection of digital data, which is a form of discrete wavelet transform (DWT) and singular value decomposition (SVD).
Abstract: Digital watermarking is playing a vital role in the improvement of authentication, security, and copyright protection in today’s digital transformation. The performance of this technique is shown to be impressive around the globe. Text, audio, video, and image data are acted as watermarks in the digital platform. In this article, a hybrid watermarking scheme is proposed to furnish the robustness and protection of digital data. This hybrid scheme is a form of discrete wavelet transform (DWT) and singular value decomposition (SVD). The embedding and extracting features are carried out through multi-level operations of DWT and SVD. Various attacks are added to the proposed method to justify the robustness of the watermark. In the end, the suggested approach is contrasted with existing methods to confirm the supremacy.

19 citations

Journal ArticleDOI
TL;DR: The simulation result performs that GA is useful to search the value of parameter that produces controllable the combination between robustness, invisibility and capacity, and improves the method by determining the exactvalue of parameter achieving BER, PSNR and payload.
Abstract: data in an image file is needed by its owner to set his ownership in a logo as a watermark embedded in the image file. Hiding the logo in the image was done in several methods. One of the method is domain transform using 2D-DCT in which data is embedded in frequency domain of the image. First, the host RGB image is converted to certain color space. The available and chosen color spaces are RGB, YCbCr or NTSC. The layer in which the watermark is embedded also can be selected. The available choices are 1 st layer, 2 nd layer, 3 rd layer, 1 st & 2 nd layer, 2 nd & 3 rd layer, 1 st & 3 rd layer and all layers. After the selected layer of image in certain color space is transformed in block based to frequency domain by DCT, one bit watermark is embedded on the AC coefficient of each block such a way that the bit is represented by specific value called delta in a zigzag and vary length of pixel. The vary parameters optimized by Genetics Algorithm are selected color space, selected layer, block size, length of pixel to be embedded by one bit watermark, and delta. Bit “1” is represented by +delta, and bit “0” is represented by –delta in vary length of pixel after zigzag. The simulation result performs that GA is useful to search the value of parameter that produces controllable the combination between robustness, invisibility and capacity. Thus, GA improves the method by determining the exact value of parameter achieving BER, PSNR and payload.

16 citations


Additional excerpts

  • ...Neha Bansal [11] published paper that described comparison between LSB, DCT and DWT method in image watermarking....

    [...]

References
More filters
Journal ArticleDOI
TL;DR: A new semi-blind reference watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition (SVD) for copyright protection and authenticity and it is shown that the proposed scheme also stands with the ambiguity attack also.

269 citations

Proceedings ArticleDOI
09 Jul 2006
TL;DR: Experimental results show that embedding watermark where picture content is moving is less perceptible and the proposed scheme is robust against common video processing attacks.
Abstract: In this paper, we propose a novel digital video watermarking scheme based on multi resolution motion estimation and artificial neural network. A multi resolution motion estimation algorithm is adopted to preferentially allocate the watermark to coefficients containing motion. In addition, embedding and extraction of the watermark are based on the relationship between a wavelet coefficient and its neighbor's. A neural network is given to memorize the relationships between coefficients in a 3times3 block of the image. Experimental results show that embedding watermark where picture content is moving is less perceptible. Further, it shows that the proposed scheme is robust against common video processing attacks

62 citations


"Comparative analysis of LSB, DCT an..." refers background or methods in this paper

  • ...Obviously, it is preferable to have a robust, imperceptible and secure watermarking technique [2] [5]....

    [...]

  • ...Ciphering and control access methods used to prevent the authenticity of digital content of a given media [2], but it avoids free sharing and transmission of the content through the network....

    [...]

Proceedings ArticleDOI
24 Sep 2000
TL;DR: This paper reviews both spatial and frequency domain watermark embedding schemes for single-frame images and focuses on the application of quantum distributed private keys in the concealment of data in images.
Abstract: This paper reviews both spatial and frequency domain watermark embedding schemes for single-frame images. It focuses on the application of quantum distributed private keys in the concealment of data in images. Simple examples are used to illustrate the approach. In the spatial domain, differential PCM is used to detect the edge regions of the image so that data can be hidden on those pixels of the image when the differential signal is larger than a certain threshold level. The method is based on the visual masking phenomenon at large intensity transitions in the neighbourhood of the pixel. In the frequency domain, DCT coefficients with significant variance are chosen and modulated using the private key sequence. Both spatial and DCT schemes are evaluated in terms of the peak signal-to-noise ratio (PSNR).

61 citations

01 Jan 2013
TL;DR: This paper presents a watermarking technique which least significant bits (LSB), its steps and its process with matlab images, which provide security of data.
Abstract: With the rapid development and wide use of Internet, information transmission faces a big challenge of security. People need a safe and secured way to transmit information. Digital watermarking is a technique of data hiding, which provide security of data. This paper presents a watermarking technique which least significant bits (LSB), its steps and its process with matlab images.

27 citations

Proceedings ArticleDOI
19 Mar 2005
TL;DR: A novel method called full counter-propagation neural network (FCNN) is proposed for digital image watermarking, in which the watermark is embedded and extracted through specific FCNN instead of the cover image, which means the watermarked image is almost the same as the original cover image.
Abstract: Digital watermarks are an important technique for protection and identification that allows authentic watermarks to be hidden in multimedia such as image, audio, and video. Watermarking has been developed to protect digital media from being illegally reproduced and modified. Embedding and extracting watermark used to require complex procedures. These include randomizing the watermark, choosing positions to embed and extract it, embedding the randomized watermark into the specific positions, and extracting it from the specific positions. In this paper, we propose a novel method called full counter-propagation neural network (FCNN) for digital image watermarking, in which the watermark is embedded and extracted through specific FCNN. Different from the traditional methods, the watermark is embedded in the synapses of FCNN instead of the cover image. Therefore, the watermarked image is almost the same as the original cover image. In addition, most of the attacks could not degrade the quality of the extracted watermark image. The experimental results show that the proposed method is able to achieve robustness, imperceptibility and authenticity in watermarking.

22 citations


"Comparative analysis of LSB, DCT an..." refers background in this paper

  • ...The privacy, illegitimate sharing and replication of digital content has become major concern for authors, publishers and legitimate owners of the contents [1]....

    [...]