An Additive Watermarking Technique in Gray Scale Images Using Discrete Wavelet Transformation and Its Analysis on Watermark Strength
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
An Additive Watermarking Technique in Gray Scale Images Using Discrete Wavelet Transformation and Its Analysis on Watermark Strength

Authors: Kamaldeep Joshi, Rajkumar Yadav, Ashok Kumar Yadav

Abstract:

Digital Watermarking is a procedure to prevent the unauthorized access and modification of personal data. It assures that the communication between two parties remains secure and their communication should be undetected. This paper investigates the consequence of the watermark strength of the grayscale image using a Discrete Wavelet Transformation (DWT) additive technique. In this method, the gray scale host image is divided into four sub bands: LL (Low-Low), HL (High-Low), LH (Low-High), HH (High-High) and the watermark is inserted in an LL sub band using DWT technique. As the image is divided into four sub bands, a watermark of equal size of the LL sub band has been inserted and the results are discussed. LL represents the average component of the host image which contains the maximum information of the image. Two kinds of experiments are performed. In the first, the same watermark is embedded in different images and in the later on the strength of the watermark varies by a factor of s i.e. (s=10, 20, 30, 40, 50) and it is inserted in the same image.

Keywords: Watermarking, discrete wavelet transform, scaling factor, steganography.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1128273

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1390

References:


[1] Rama Kishore, Sunesh (2015). Digital Watermarking Based on Visual Cryptography and Histogram International Journal of Computer, Electrical, Automation, Control and Information Engineering, World Academy of Science, Engineering and Technology, Vol:10, No:7,
[2] Hussain, M., & Hussain, M. (2013). A Survey of Image Steganography Techniques, 54, 113–124.
[3] Rao, S. S. (2003). Copyright: its implications for electronic information. Online Information Review, 27(4), 264–275. http://doi.org/10.1108/14684520310489050
[4] Nyeem, H., Boles, W., & Boyd, C. (2014). Digital image watermarking: its formal model, fundamental properties and possible attacks.
[5] Singh, S. (2016). A Robust Deinterlacing Multiple Image Watermarking Technique in DWT, 261–266.
[6] Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752. http://doi.org/10.1016/j.sigpro.2009.08.010
[7] Muhammad, K., Sajjad, M., Mehmood, I., Rho, S., & Baik, S. W. (2015). A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications. http://doi.org/10.1007/s11042-015-2671-9
[8] Malekmohamadi, H., & Ghaemmaghami, S. (2009). Steganalysis of LSB based image steganography using spatial and frequency domain features. 2009 IEEE International Conference on Multimedia and Expo, 1744–1747. http://doi.org/10.1109/ICME.2009.5202858
[9] Jia-Fa, M., Xin-Xin, N., Gang, X., Wei-Guo, S., & Na-Na, Z. (2015). A steganalysis method in the DCT domain. Multimedia Tools and Applications, (180). http://doi.org/10.1007/s11042-015-2708-0
[10] Karri, S., & Sur, A. (2014). Steganographic algorithm based on randomization of DCT kernel. Multimedia Tools and Applications, 74(21), 9207–9230. http://doi.org/10.1007/s11042-014-2077-0
[11] Chen, P., & Lin, H. (2006). A DWT Based Approach for Image Steganography, (4), 275–290.
[12] Atawneh, S., & Sumari, P. (2013). Hybrid and blind steganographic method for digital images based on DWT and chaotic map. Journal of Communications, 8(11), 690–699. http://doi.org/10.12720/jcm.8.11.690-699
[13] Singh, S. (2016). Region Based Undetectable Multiple Image Watermarking Technique in DWT, 267–270.
[14] Jia-Fa, M., Xin-Xin, N., Gang, X., Wei-Guo, S., & Na-Na, Z. (2015). A steganalysis method in the DCT domain. Multimedia Tools and Applications, (180). http://doi.org/10.1007/s11042-015-2708-0
[15] Chen, P., & Lin, H. (2006). A DWT Based Approach for Image Steganography, (4), 275–290.
[16] Babakalak, S. R., Balafar, M. A., & Farzan, A. (n.d.). A new DWT-SVD based robust watermarking scheme for real property rights, 4274, 69–78.
[17] MS raval and PP Rege. "Discrete wavelet transform based multiple watermarking scheme",in the procedding of IEEE conference on convergent technologies for the Asia-Pacific Region.In tencon.vol.3,pp.935-938,2003
[18] Ranjan Kumar Arya. Shalu singh. and Ravi Saharan, "A secure Non-blind block based digital Image Watermarking technique using DWT and DCT" In the Proceeding of IEEE. Advances in computing communication and informatics (ICACCI),pp. 2042-2048.2015
[19] B.Sridhar, DR. C. Arun, "On secure multiple image watermarking technique using DWT", IEEE Third national conference on computing Communication & networking technologies (ICCENT),2012
[20] Joshi, K. (2016). PSNR and MSE Based Investigation of LSB, IEEE Third national conference on computing Communication & networking technologies (ICCENT),2012178–183.