A Wavelet Domain Secured Digital Image Watermarking Using SVD Technique

Authors(2) :-Prachi Mishra, Pankaj Sahu

In this work, a new wavelet based secured image to image watermarking based on singular value decomposition scheme is presented. This method uses the time domain signal & process it in frequency domain, while time domain features of the carrier remains same, so visually no one can identify the hidden data into it. The algorithm is based on DWT is used for this purpose, since wavelet decomposition of images gives better resolution results than other transforms. It generates a watermark signal using DWT & embeds it into the signal by measuring the subband threshold using DWT. The watermarks are embedded into non-overlapping DWT coefficients of the host signal which are randomly selected & very hard to detect even with the blind detection. The image watermarking is relatively new & has wide scope for research Proposed algorithm is based on DWT domain while considering the more active components of the signal. Comparison shows the PSNR is 51.95 dB & MSE is 0.78, also SSIM is 0.94 which is very good.

Authors and Affiliations

Prachi Mishra
Communication Systems, Dept. of ECE, GGITS, Jabalpur, Madhya Pradesh, India
Pankaj Sahu
Communication Systems, Dept. of ECE, GGITS, Jabalpur, Madhya Pradesh, India

Image watermarking, DWT, Security, Sub-band Coding, PSNR, MSE, SSIM.

  1. Aniket Roy et-al, "A perception based color image adaptive watermarking scheme in YCbCr space", 2nd IEEE International Conference on Signal Processing and Integrated Networks (SPIN), Pp- 537 - 543, Noida, 2015.
  2. Neha Bansal et-al, "Comparative Analysis of LSB, DCT and DWT for Digital Watermarking", 2nd IEEE International Conference on Computing for Sustainable Global Development (INDIACom), Pp. 40 - 45, New Delhi, 2015.
  3. Sudip Ghosh et-al, "A New Algorithm on Wavelet Based Robust Invisible Digital Image Watermarking for Multimedia Security", IEEE International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV), Pp- 72 - 77, Shillong, 2015.
  4. S. Abolfazl Hosseini et-al, "A New Method for Color Image Watermarking Based on Combination of DCT and PCA", IEEE International Conference on Communications, Signal Processing, and their Applications (ICCSPA), Pp. 1-5, Sharjah, 2015.
  5. Sha Wang et-al, "Adaptive Watermarking and Tree Structure Based Image Quality Estimation", IEEE Transactions on Multimedia, Volume 16, Number 2, February 2014.
  6. Dhananjay Yadav et-al, "Reversible Data Hiding Techniques", International Journal of Electronics and Computer Science Engineering (IJECSE), Volume 1, Number 2, 2013.
  7. Md. Iqbal Hasan Sarker et-al, "FFT-Based Audio Watermarking Method with a Gray Image for Copyright Protection", International Journal of Advanced Science and Technology, Volume 47, October, 2012.
  8. I.J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography. Morgan Kaufmann, 2008.
  9. M. El-Gayyar and J. von zur Gathen, "Watermarking techniques spatial domain," University of Bonn Germany, Tech. Rep., 2006.
  10. J. Liu and X. He, "A review study on digital watermarking," First International Conference on Information and Communication Technologies, pp. 337-341, 2005.
  11. M. Arnold, M. Schmucker, and S. D. Wolthusen, Techniques and Applications of Digital Watermark and Content Protection. Artech House, 2003.
  12. X. Wu, J. Hu, Z. Gu, and J. Huang, "A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters," Australasian Information Security Workshop, vol. 44, 2005.
  13. M. Antonini, M. Barlaud, P. Mathieu, and I. Daubechies, "Image coding using wavelet transform," IEEE Transaction on Image Processing, vol. 1, pp. 205-220, 1992.
  14. Daubechies and W. Sweldens, "Factoring wavelet transforms into lifting steps," SIAM Journal on Mathematical Analysis, 1997.
  15. V. M. Potdar, S. Han, and E. Chang, "A survey of digital image watermarking techniques," 3rd IEEE International Conference on Industrial Informatics, pp. 709-716, 2005.
  16. Tefas, A. Nikolaidis, N. Nikolaidis, V. Solachidis, S. Tsekeridou, and I. Pitas, "Performance analysis of watermarking schemes based on skewtent chaotic sequences," NSIP’01, 2001.
  17. S.Teskeridou, V. Solochidis, N. Nikolaidis, A. Tefas, and I. Pitas, "Bernoulli shift generated chaoticwatermarks: Theoretic investigation," SCIA2001, 2001.
  18. W. Yan, Z. Shi-qiang, and W. Yan-chun, "Wavelet digital watermark based on chaotic sequence," ICICIC’08, 2008.
  19. K. L. W. G. Natasa Terzija, Markus Repges, "Digital image watermarking using discrete wavelet transform: Performance comparison of error correction codes," Visualization, Imaging and Image Processing, 2002.
  20. L. Haiyan, Z. Xuefeng, and W. Ying, "Analysis of the performance of error correcting coding in audio watermarking," 3rd IEEE Conference on Industrial Electronics and Applications, pp. 843-848, 2008.
  21. P. Cika, "Watermarking scheme based on discrete wavelet transform and error-correction codes," 16th International Conference on Systems, Signals and Image Processing, pp. 1-4, 2009.
  22. Bastug and B. Sankur, "Improving the payload of watermarking channels via ldpc coding," Signal Processing Letters, vol. 11, pp. 90-92, 2004.
  23. Nafornita, A. Isar, and M. Kovaci, "Increasing watermarking robustness using turbo codes," International Symposium on Intelligent Signal Processing, pp. 113-118, 2009.
  24. N. Pantuwong and N. Chotikakamthorn, "Line watermark embedding method for affine transformed images," ISSPA 2007, pp. 1-4, 2007

Publication Details

Published in : Volume 2 | Issue 5 | September-October 2017
Date of Publication : 2017-11-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 448-454
Manuscript Number : CSEIT172582
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Prachi Mishra, Pankaj Sahu, "A Wavelet Domain Secured Digital Image Watermarking Using SVD Technique", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.448-454, September-October-2017.
Journal URL : http://ijsrcseit.com/CSEIT172582

Article Preview

Follow Us

Contact Us