scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Robust Image Watermarking Scheme by Discrete Wavelet Transform

TL;DR: A robust digital image watermarking techniques by using discrete wavelet transform to achieve high performance in term of imperceptibility and is robust against several attacks.
Abstract: This paper proposes a robust digital image watermarking techniques by using discrete wavelet transform. The watermark is embedded in 2-level diagonal coefficient to achieve high performance in term of imperceptibility. The watermark is embedded by selecting a seed that generating pseudorandom noise sequence. Then the Watermark is extracted back by using the same pseudorandom noise sequence seed in the embedding. The experimental results show that the proposed algorithm provides good level of imperceptibility. Moreover, the watermarked image is robust against several attacks.
Citations
More filters
Proceedings ArticleDOI
01 Nov 2016
TL;DR: A simple yet fragile and fidel image PDF digital watermarking technique using 2 and 4 level Discrete Wavelet Transform (DWT) in order to protect and detect the authenticity of a digital Holy Quran.
Abstract: This paper presents digital watermarking for validating and protecting the integrity of digital Holy Quran in Portable Document Format (PDF). The need arises as minute alteration to text or content of Holy Scriptures could result in a devastating situation in the belief of the owners. By this research we have designed and evaluated a simple yet fragile and fidel image PDF digital watermarking technique using 2 and 4 level Discrete Wavelet Transform (DWT) in order to protect and detect the authenticity of a digital Holy Quran. A 512x512 PDF Quran was used as cover image and DWT carried out on it following the watermark image embedding process of a 128x128 and 32x32 on different trials. The Inverse DWT then carried out to obtain the watermarked Quran PDF. Imperceptibility test using Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index (SSIM) were used to evaluate the fidelity and fragility of the watermark scheme over four different embedding gain (k) of 0.001, 0.002, 0.003 and 0.004 for a more robust system. The experimental results demonstrated that our system was indeed effective.

4 citations


Cites background or methods from "Robust Image Watermarking Scheme by..."

  • ...Abdullatif et al[10] proposed a system using DWT where the watermark was embedded in 2-level diagonal coefficient in order to achieve high performance and fidelity....

    [...]

  • ...The higher the PSNR values of a watermarked image it indicates the watermark are visually invisible to human eyes[10]....

    [...]

  • ...The lower the value of PSNR and SSIM signifying that the watermark is fragile against attack[9], [10], [12]....

    [...]

Proceedings ArticleDOI
01 Oct 2018
TL;DR: It is shown here how a watermark image information for authentication is embedded in a given carrier, which makes the proposed scheme independent of the carrier image and the watermarked image, which can be arbitrary.
Abstract: In many communication applications, which involve exchange of digital information of high value, there is a need for secure exchange and authentication of digital information. In this paper and for that particular reason, we are proposing a novel double blind image information hiding technique for recovery and authentication of digital information without requiring knowledge and existence of both the authentication watermark image and the carrier image at a receiving end. We show here how a watermark image information for authentication is embedded in a given carrier. This makes the proposed scheme independent of the carrier image and the watermark image, which can be arbitrary. Here we utilize the properties of the Discrete Wavelet Transform (domain) and Arnold’s Transform algorithm to implement the proposed algorithm. Our proposed technique shows that (a) additional information is not required for the integrity check of the hidden digital information, (b) recovery of the hidden information from cropping and other attacks, (c) improved security is achieved by making extraction of the hidden information inter dependent on the watermarked image, (d) the scheme has high capacity and allows embedding of gray-scale (versus binary) images of same size as a carrier image. The proposed scheme provides localization and recovery towards tampering such as blurring, pixel tampering, and so forth. Effect of JPEG compression and encryption on the quality of the extracted hidden information is also shown.

3 citations

Proceedings ArticleDOI
01 Nov 2019
TL;DR: Experimental results are presented to show the potential value of the proposed non-blind watermarking technique for multiple information hiding of same size and the carrier image, tampering detection/localization, authentication, and tampering self-recovery, including cropping, and robustness of the propose scheme to JPEG compression and encryption, and other unauthorized tampering.
Abstract: In today's world accessibility and trade of advance digital information over the web is of key significance. Security and verification of digital information, including digital images, is one of the greatest concerns. For this specific reason, in this paper we propose a non-blind watermarking technique for self-recovery and authentication of hidden images against unauthorized tampering by utilizing the Discrete Wavelet Transform (DWT) and the Arnold's Transform. Due to the nature of the Discrete Wavelet Transform, DWT-based watermarking schemes, in general, have the hidden images size limited to up to ${}^{1}/{}_{4}$ of the carrier image size; that is, for example, for a $256\mathrm{x}56$ -carrier image the size of the hidden images is usually up to $\mathbf{128\mathrm{x}128}$ . In this paper, we show how the proposed DWT-based technique (a) has a moderately high capacity capability as it allows hidden images of the same size as that of the carrier image, (b) uses a self-recovery framework for watermarking and information hiding that allows embedding twice the number of correction matrices as in prior related work. This makes the proposed non-blind technique equipped with about twice as much capability of self-recovery from unauthorized tampering as in prior work, (c) allows unauthorized tampering localization and recovery against unauthorized tampering such as image cropping, blurring, pixel tampering, (d) utilizes all three-color channels of a carrier image for watermarking and information hiding, and (e) adds security in the secret hidden image information. Experimental results are presented to show the potential value of the proposed non-blind method for multiple information hiding of same size and the carrier image, tampering detection/localization, authentication, and tampering self-recovery, including cropping, and robustness of the proposed scheme to JPEG compression and encryption, and other unauthorized tampering.

3 citations

Proceedings ArticleDOI
12 Jun 2018
TL;DR: A novel image watermarking and information hiding technique for recovery and authentication of hidden images against tampering by utilizing the Discrete Wavelet Transform (DWT) and the Arnold’s Transform to provide tamper detection and recovery against unauthorized tampering.
Abstract: In many industrial environments applications, for example, those involving intelligent measurement systems, distributed networked collaborative virtual environments, tele-control, biomedical intelligent systems with interchange of individuals private health information, to name a few, there is a need to securely exchange digital images or other multi-media information among the various local or remote industrial components. In this paper, and for that purpose, we propose a novel image watermarking and information hiding technique for recovery and authentication of hidden images against tampering by utilizing the Discrete Wavelet Transform (DWT) and the Arnold’s Transform. We show how the proposed technique (a) allows for relatively higher capacity capability in securely embedding not just a watermark image, for authentication purposes, but also a hidden secret image while preserving the transparency in the resulting “watermarked” carrier image (b) allows embedding of gray-scale images and is not limited to embedding binary ones (c) allows redundancy in the hidden information for better recovery in case of image tampering such as cropping, (d) allows for security in the hidden image information. The proposed technique utilizes all three RGB color channels of a carrier image for embedding information. This is to provide a high degree of redundancy for information recovery in case of unauthorized tampering attacks. Furthermore, correction matrices for hidden and/or watermark images are calculated and are also embedded in the carrier image. As we show, the proposed techniques provides tamper detection and recovery against unauthorized tampering such as image cropping, blurring, pixel tampering. We also show robustness of the proposed scheme to JPEG compression and encryption.

3 citations


Cites background from "Robust Image Watermarking Scheme by..."

  • ...In [9] Abdullatif, Khalifa, Olanrewaju, and Zeki propose a DWT based watermarking technique, where they embed a binary watermark image along with a pseudo noise sequence which provides robustness against various attacks....

    [...]

Proceedings ArticleDOI
21 Apr 2016
TL;DR: Two improvements approaches were suggested to make the Intermediate Significant Bits system more robust, both approaches based on partitioning the host image into blocks and repeats the embedded information in a special form in order to improve the robustness.
Abstract: In Intermediate Significant Bits (ISB) model, the watermarking technique was shown to be made robust against different types of attacks with maintaining the quality of watermarked images. In addition, ISB model was found to work properly with many other techniques based on the Least Significant Bits (LSB). In this paper, two improvements approaches were suggested to make the system more robust, both approaches based on partitioning the host image into blocks. The first approach embeds the information based on the average of pixels values; while the second approach repeats the embedded information in a special form in order to improve the robustness. The two improvements processes were applied again and different sizes of blocks were done to further enhance robustness while keeping a high capacity. Most significant bits of watermark image should be embedded within the big size of blocks and the least significant bits of watermark image would be embedded within small size of blocks since most significant bits are more important for image quality than the least significant bits.

1 citations

References
More filters
01 Jan 2004
TL;DR: The main results of this study are the development of novel audio watermarking algorithms, with the state-of-the-art performance and an acceptable increase in computational complexity.
Abstract: Broadband communication networks and multimedia data available in a digital format opened many challenges and opportunities for innovation. Versatile and simple-to-use software and decreasing prices of digital devices have made it possible for consumers from all around the world to create and exchange multimedia data. Broadband Internet connections and near error-free transmission of data facilitate people to distribute large multimedia files and make identical digital copies of them. A perfect reproduction in digital domain have promoted the protection of intellectual ownership and the prevention of unauthorized tampering of multimedia data to become an important technological and research issue. Digital watermarking has been proposed as a new, alternative method to enforce intellectual property rights and protect digital media from tampering. Digital watermarking is defined as imperceptible, robust and secure communication of data related to the host signal, which includes embedding into and extraction from the host signal. The main challenge in digital audio watermarking and steganography is that if the perceptual transparency parameter is fixed, the design of a watermark system cannot obtain high robustness and a high watermark data rate at the same time. In this thesis, we address three research problems on audio watermarking: First, what is the highest watermark bit rate obtainable, under the perceptual transparency constraint, and how to approach the limit? Second, how can the detection performance of a watermarking system be improved using algorithms based on communications models for that system? Third, how can overall robustness to attacks to a watermark system be increased using attack characterization at the embedding side? An approach that combined theoretical consideration and experimental validation, including digital signal processing, psychoacoustic modeling and communications theory, is used in developing algorithms for audio watermarking and steganography. The main results of this study are the development of novel audio watermarking algorithms, with the state-of-the-art performance and an acceptable increase in computational complexity. The algorithms' performance is validated in the presence of the standard watermarking attacks. The main technical solutions include algorithms for embedding high data rate watermarks into the host audio signal, using channel models derived from communications theory for watermark transmission and the detection and modeling of attacks using attack characterization procedure. The thesis also includes a thorough review of the state-of-the-art literature in the digital audio watermarking.

164 citations

Proceedings ArticleDOI
03 Jun 2011
TL;DR: DCT and DCT are compared with respect to peak signal to noise ratio (PSNR) at a different threshold values and DWT gives better Image quality then DCT.
Abstract: Digital watermarking is a technique which allows an individual to add hidden copyright notices or other verification messages to digital audio, video, or image signals and documents. Watermarking can be done by using least significant bit (LSB), singular value decomposition (SVD), Discrete Fourier Transform (DFT), Discrete cosine transform (DCT) and Discrete wavelet transform (DWT) techniques. In this paper Discrete cosine transform (DCT) and Discrete wavelet transform (DWT) are used for embedding and extraction of watermark. DWT and DCT are compared with respect to peak signal to noise ratio (PSNR) at a different threshold values. DWT gives better Image quality then DCT.

69 citations

Proceedings ArticleDOI
14 May 2007
TL;DR: In this paper, comprehensive overview of digital watermarking is discussed, including the general model, types, applications and future trends of current implementations, and the proposed technique is described and analyzed.
Abstract: The field of digital watermarking has recently seen vast interests covering theoretical studies, novel techniques, attacks and analysis. This is due to the fact that over the last 15 years, the watermarking community has focused on developing and introducing new techniques for watermark embedding and detection. Analysis of these techniques leads to methods for attack and development of countermeasures which then used to discover faults and limitations in applications, encouraging the development of better ones. In this paper, comprehensive overview of digital watermarking are discussed. This includes the general model, types, applications and future trends of current implementations. The proposed technique is described and analyzed. The paper concludes with future plans of the chosen method in digital watermarking.

54 citations

Journal Article
TL;DR: The proposed scheme provides good level of imperceptibility as well as robustness against various attacks such as JPEG compression, Filtering, Noise addition, Cropping etc. and competes well with existing methods.
Abstract: In this paper, we present a new method of digital image watermarking in wavelet domain using Discrete Wavelet Packet Transform (DWPT) analysis of the host image The discrete wavelet packet decomposition is chosen to utilize all high frequency components in order to make the watermarking more imperceptible using Coif5 as wavelet basis According to the characteristics of Human Visual System (HVS), human eyes are less sensitive in high frequency bands having orientation of 45,Therefore, the binary watermark is embedded in the high frequency diagonal components of wavelet packet decomposition tree which have maximum entropy Watermarking is achieved by generating a pseudo-random sequence and then embedding it into wavelet coefficients according to the watermark bit pattern Performance of the proposed scheme is evaluated on a variety of images including Lena, Boat, Cameraman and a textured image of Brodatz database The results show that, the proposed scheme provides good level of imperceptibility as well as robustness against various attacks such as JPEG compression, Filtering, Noise addition, Cropping etc and competes well with existing methods General Terms Digital media security, Digital image watermarking

5 citations

Proceedings ArticleDOI
22 May 2009
TL;DR: This paper proposes a watermarking embedding and extracting methods in the frequency domain based on a selection of a high frequency range containing large amount of information that has a higher imperceptibility than Image Watermarking Based On Wavelet-based Contourlet Packet Transform With Best Tree and higher readability measured in term of normalized correlation.
Abstract: This paper proposes a watermarking embedding and extracting methods in the frequency domain based on a selection of a high frequency range containing large amount of information. The selected high-frequency range contributes to the imperceptibility of the watermark while the robustness against compression is achieved because the selected frequency range contains large amount of information. The entropy-based algorithm is adopted to find the best tree of the wavelet-based contourlet packet transform (WCPT.) Such best tree represents the best basis of the WCPT whose corresponding frequency subband contains high information energy. In addition, for security aspect of the watermarking process, the bits of the watermark image is randomly permuted before embedding them to the selected subband. The key of the pseudo-random generator provides the security for the watermark. Each bit of the permuted watermark image are embedded to the original image by adjusting the WCPT coefficients of the selected subband, which also allows us to vary the level of watermarking. The proposed methods are tested with various benchmark images of various sizes and with various watermarking levels. The JPEG compression, Gaussian noise and filtering were applied as the attacks. Image Watermarking Based On Wavelet-based Contourlet Packet Transform With Best Tree has a higher imperceptibility than Image Watermarking Based On Wavelet Packet Transform With Best Tree measured in term of peak signal to noise ratio (PSNR) and higher readability measured in term of normalized correlation (NC).

3 citations