scispace - formally typeset
Search or ask a question
Journal Article

Digital Watermarking on Still Images Using Wavelet Transform

TL;DR: An entropy- based method is developed for selection of DWT coefficients that provides an adaptive way for determining the number of watermarked coefficients and watermarking factor at each level ofDWT decomposition.
Abstract: A new approach for non- blind watermarking of still gray level images in the wavelet domain. The method uses the Human Visual System (HVS) characteristic, and an innovative entropy based approach to create an efficient watermarking scheme is presented in this paper. It decomposes original image in DWT domain in to three hierarchical levels and watermarks it with a logo image, which is scrambled through a well- known PN- sequence. An entropy- based method is developed for selection of DWT coefficients that provides an adaptive way for determining the number of watermarked coefficients and watermarking factor at each level of DWT decomposition. This approach shows an excellent resistance against almost all the attacks known in the watermarking literature. The detection results of the method reveal better resistance in comparison to the existance methods.With simple modifications, the method can be used for color images and in real time systems.
Citations
More filters
Proceedings ArticleDOI
01 Nov 2005
TL;DR: A robust image adaptive digital watermarking algorithm in wavelet transform domain is proposed in this article, which exploits human visual system (HVS) characteristics and entropy masking concept to determine image adaptive thresholds for selection of perceptually significant coefficients.
Abstract: A new robust image adaptive digital watermarking algorithm in wavelet transform domain is proposed in this paper. The proposed method exploits human visual system (HVS) characteristics and entropy masking concept to determine image adaptive thresholds for selection of perceptually significant coefficients. The mark is embedded in the coefficients of all subbands including the LL subband. Experimental results show that the proposed method significantly improves watermarking performance over conventional methods, in the terms of invisibility and robustness.

21 citations

Journal ArticleDOI
TL;DR: The objective quality metrics are demonstrated that, the additive embedding method achieves superior performance against watermark attacks on multiple watermarking technique.
Abstract: The present work compares single and multiple watermarking by using discrete wavelet transform and different embedding methods. The different embedding methods are additive, multiplicative and hybrid watermarking with importance on its robustness versus the imperceptibility of the watermark. The objective quality metrics are demonstrated that, the additive embedding method achieves superior performance against watermark attacks on multiple watermarking technique.

15 citations

Journal Article
TL;DR: A novel image watermarking technique in the wavelet domain is suggested and tested where an arbitrary embedding factor α is introduced to improve the invisibility and robustness.
Abstract: Image watermarking has proven to be quite an efficient tool for the purpose of copyright protection and authentication over the last few years. In this paper, a novel image watermarking technique in the wavelet domain is suggested and tested. To achieve more security and robustness, the proposed techniques relies on using two nested watermarks that are embedded into the image to be watermarked. A primary watermark in form of a PN sequence is first embedded into an image (the secondary watermark) before being embedded into the host image. The technique is implemented using Daubechies mother wavelets where an arbitrary embedding factor α is introduced to improve the invisibility and robustness. The proposed technique has been applied on several gray scale images where a PSNR of about 60 dB was achieved. Keywords—Image watermarking, Multimedia Security, Wavelets, Image Processing.

11 citations


Cites methods from "Digital Watermarking on Still Image..."

  • ...Some of them operate either in the frequency domain using for example the DCT [3], [4], DFT [5] and DWT [6]-[10] or in the spatial domain [11]....

    [...]

Journal ArticleDOI
TL;DR: The experimental results prove that using different strength values increases the robustness of the watermark with little sacrifice in image quality and demonstrate the effectiveness of the scheme for the origin verification as well as the tamper detection.
Abstract: This paper presents an image authentication scheme that can verify the origin of the received image and, moreover, detect if the image has been tampered with. The underlying technologies of the scheme are digital watermarking and image secret sharing. Different from other schemes that use one piece of watermark information for one purpose and a different piece for another, the watermark information used for original verification is also utilized for tamper detection. Moreover, unlike other schemes that employ a fixed strength value for embedding watermarks, the scheme automatically utilizes two different strength values, one for flat regions and the other for complex regions. The experimental results prove that using different strength values increases the robustness of the watermark with little sacrifice in image quality. The results also demonstrate the effectiveness of the scheme for the origin verification as well as the tamper detection.

10 citations

Proceedings ArticleDOI
22 Jan 2009
TL;DR: An algorithm that gray image as watermark is embedded in original color-image is introduced that thinks over both unobtrusiveness and robustness, and the size of image is unlimited.
Abstract: Recently, as the fast development of the computer network communication technology, it’s more and more convenient for the digital information storage and transmission. Therefore, more and more attention is focused on the copyright protection of digital information. An algorithm that gray image as watermark is embedded in original color-image is introduced. This algorithm thinks over both unobtrusiveness and robustness, and the size of image is unlimited. So it has strongly practical significance.

7 citations


Cites background from "Digital Watermarking on Still Image..."

  • ...(5) Calculate the correlation between watermark extracted and original watermark:...

    [...]

  • ...( , ) ( , ) ( , ) F u v F u v aW u v = + (5) Among these, ( , ) F u v is wavelet coefficient and a is stretching factor....

    [...]

References
More filters
Proceedings ArticleDOI
01 Nov 2005
TL;DR: A robust image adaptive digital watermarking algorithm in wavelet transform domain is proposed in this article, which exploits human visual system (HVS) characteristics and entropy masking concept to determine image adaptive thresholds for selection of perceptually significant coefficients.
Abstract: A new robust image adaptive digital watermarking algorithm in wavelet transform domain is proposed in this paper. The proposed method exploits human visual system (HVS) characteristics and entropy masking concept to determine image adaptive thresholds for selection of perceptually significant coefficients. The mark is embedded in the coefficients of all subbands including the LL subband. Experimental results show that the proposed method significantly improves watermarking performance over conventional methods, in the terms of invisibility and robustness.

21 citations

Journal ArticleDOI
TL;DR: The objective quality metrics are demonstrated that, the additive embedding method achieves superior performance against watermark attacks on multiple watermarking technique.
Abstract: The present work compares single and multiple watermarking by using discrete wavelet transform and different embedding methods. The different embedding methods are additive, multiplicative and hybrid watermarking with importance on its robustness versus the imperceptibility of the watermark. The objective quality metrics are demonstrated that, the additive embedding method achieves superior performance against watermark attacks on multiple watermarking technique.

15 citations

Journal Article
TL;DR: A novel image watermarking technique in the wavelet domain is suggested and tested where an arbitrary embedding factor α is introduced to improve the invisibility and robustness.
Abstract: Image watermarking has proven to be quite an efficient tool for the purpose of copyright protection and authentication over the last few years. In this paper, a novel image watermarking technique in the wavelet domain is suggested and tested. To achieve more security and robustness, the proposed techniques relies on using two nested watermarks that are embedded into the image to be watermarked. A primary watermark in form of a PN sequence is first embedded into an image (the secondary watermark) before being embedded into the host image. The technique is implemented using Daubechies mother wavelets where an arbitrary embedding factor α is introduced to improve the invisibility and robustness. The proposed technique has been applied on several gray scale images where a PSNR of about 60 dB was achieved. Keywords—Image watermarking, Multimedia Security, Wavelets, Image Processing.

11 citations

Journal ArticleDOI
TL;DR: The experimental results prove that using different strength values increases the robustness of the watermark with little sacrifice in image quality and demonstrate the effectiveness of the scheme for the origin verification as well as the tamper detection.
Abstract: This paper presents an image authentication scheme that can verify the origin of the received image and, moreover, detect if the image has been tampered with. The underlying technologies of the scheme are digital watermarking and image secret sharing. Different from other schemes that use one piece of watermark information for one purpose and a different piece for another, the watermark information used for original verification is also utilized for tamper detection. Moreover, unlike other schemes that employ a fixed strength value for embedding watermarks, the scheme automatically utilizes two different strength values, one for flat regions and the other for complex regions. The experimental results prove that using different strength values increases the robustness of the watermark with little sacrifice in image quality. The results also demonstrate the effectiveness of the scheme for the origin verification as well as the tamper detection.

10 citations

Proceedings ArticleDOI
22 Jan 2009
TL;DR: An algorithm that gray image as watermark is embedded in original color-image is introduced that thinks over both unobtrusiveness and robustness, and the size of image is unlimited.
Abstract: Recently, as the fast development of the computer network communication technology, it’s more and more convenient for the digital information storage and transmission. Therefore, more and more attention is focused on the copyright protection of digital information. An algorithm that gray image as watermark is embedded in original color-image is introduced. This algorithm thinks over both unobtrusiveness and robustness, and the size of image is unlimited. So it has strongly practical significance.

7 citations