IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 6    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 6,June 2012
Copyright Protection of Digital Images Using Robust Watermarking Based on Joint DLT and DWT
Full Text(PDF, )  PP.778-786  
Author(s)
Yusuf Perwej , Firoj Parwej , Asif Perwej
KEYWORDS
— Copyright Protection, Data Hiding, JPEG, Normalized Cross Correlation (NC), Peak Signal to Noise (PSNR), Steganography, Watermarking.
ABSTRACT
Digital watermarking is a new method of protecting multimedia content from unauthorized copying. A digital multimedia technology has offered many facilities in the transmission, reproduction and manipulation of data. However, this advance has also brought the problem such as copyright protection for content providers. Copyright protection of images has become a major concern with the rapid expansion of the Internet, which contains millions of freely available images. Digital watermarking is one of the proposed solutions for copyright protection of multimedia and is becoming a major player not only for use in images but also in the latest technology such as audio, image and video. In this paper robustness of digital image watermarking algorithm based on transforming domain. We are proposing a robust combined Discrete Laguerre Transform (DLT) and Discrete Wavelet Transform (DWT) watermark transformation algorithm. Experimental results show that the higher robustness against common signal processing attacks. The combined of DLT and DWT, the proposed system achieves significantly higher robustness of the method against some common image processing operations such as Salt and Pepper noise addition , Gaussian noise addition, Speckle Noise addition, Cropping, JPEG compression.
References
[1] R.J. Anderson, and F. Petitcolas,―On the Limits of Steganography‖ , IEEE Journal of Selected Areas in Communications, vol 16, Issue 4, pp 474 – 481, 1998.

[2] F. Hartung , and M. Kutter,―Multimedia Watermarking Techniques ‖, Proc. IEEE, vol 87, no.7, pp 1079-1107,1999.

[3] Marvel, L. M., R. J. Boncelet, C.G. , Retter, C. , ―Spread Spectrum Steganography‖, IEEE Transactions on image processing,1999.

[4] S. Katzenbeisser, and F.A.P. Petitcolas (eds), ―Information Hiding Techniques for Steganography and Digital Watermarking‖, Artech House Books, Dec. 1999.

[5] J. L. Liu, D. C. Lou, M. C. Chang and H. K. Tso, "A robust watermarking scheme using self-reference image", Computer Standards & Interfaces, vol. 28, no. 3, pp 356-367, 2006.

[6] A. Essaouabi, F. Regragui, and E. Ibnelhaj , "A blind Wavelet-Based Digital Watermarking for Video", International Journal of Video & Image Processing and Network Security , vol. 9, no. 9, pp 471-476, 2009.

[7] J. y. Xiang , and G. Z. Tan, "An Improved Digital Watermarking Algorithm for Meaningful Image", in proceedings of International Conference on Computer Science and Software Engineering, pp 822 - 825, Wuhan, Hubei, 2008.

[8] E. elbasi , "Robust MPEG Video Watermarking in Wavelet Domain", Trakya University Journal of Science, vol. 8, no. 2, pp 87-93, 2007.

[9] G. Xuan, C. Yang, Y.Q. Shi, Y. Zhen and Z. Ni , "Reversible Data Hiding Based on Wavelet Spread Spectrum", IEE International workshop on multimedia signal processing, 2004.

[10] Potdar, V., S. Han and E. Chang,‖ A Survey of Digital Image Watermarking Techniques,‖ in Proc. of the IEEE International Conference on Industrial Informatics, pp 709-716, Perth, Australia 2005.

[11] S.A.M.Gilani and A.N.Skodras, ―DLT-Based Digital Image Watermarking‖, First IEEE Balkan Conference on Signal Processing, Communications, Circuits and Systems, Istanbul, Turkey, June 2-3, 2000.

[12] Tay, P. and J. Havlicek, "Image Watermarking Using Wavelets," in Proc. of the IEEE Midwest Symposium on Circuits and Systems, pp 258-261, Oklahoma, USA, 2002.

[13] K. V. Swamy, B. C. Mohan, Y.V. B. Reddy and S. S. Kumar , "Image compression and Watermarking Scheme using scalar Quantization", The International Journal of Next Generation Network , vol. 2, no. 1, pp. 37-47,2010.

[14] F. Hartung, and M. Kutter, ―Multimedia watermarking techniques ‖, In Proceedings IEEE: Special Issue on Identification and Protection of Multimedia Information, vol 87(7), pp 1079–1107, 1999.

[15] J. I. Cox , K. Joe, L. Tom, S. Talal, ―Secure spread spectrum watermarking for multimedia‖, NEC Research Institute, Technical Report, 1995.

[16] M. Kutter, and F. A. P. Petitcolas,‖A fair benchmark for image watermarking systems‖,In Proceedings of the SPIE Security and Watermarking of Multimedia Contents, vol 3657, pp 226–239, 1999.

[17] D. Kundur , and D. Hatzinakos, ― A Robust Digital Image Watermarking Method using Wavelet – Based Fusion‖,in Proc. IEEE Int. Conf. on Image Processing ,vol. I, pp 544-547, oct. 1997.

[18] Tay, P. , and J. Havlicek, "Image Watermarking Using Wavelets," in Proc. of the IEEE Midwest Symposium on Circuits and Systems, pp 258-261, Oklahoma, USA, 2002.

[19] Hsieh, M., D. Tseng, and Y. Huang, "Hiding Digital Watermarks Using Multi-resolution Wavelet Transform," IEEE Trans. on Industrial Electronics, vol 48(5), pp 875-882, 2001.

[20] Lin Liu , ―A Survey of Digital Watermarking Technologies‖.

[21] S. G. Mallat ―A Theory for Multiresolution Signal Decomposition: The Wavelet Representation‖ , IEEE.Transactions on Pattern Analysis and Machine Intelligence, vol.11 ,674-693, 1989.

[22] S. Agrestea, G. Andalorob, D. Prestipinob and L. Pucciob , "An image adaptive, wavelet-based watermarking of digital images", Journal of Computational and Applied Mathematics, vol 210, no. 1-2, pp 13-21, 2007.

[23] J. Jiang , and A. Armstrong ,―Data hiding approach for efficient image indexing‖, Electronics letters. 7th, vol 38, no 23, pp 1424 – 1425, 2002.

[24] I. J. Cox., and J. G. Linnartz , ―Some general methods for tampering with watermarks‖, IEEE Journal on Selected Areas in Communications, vol 16(4), pp 587-593, 1998.

[25] Voloshynovskiy, S., S. Pereira and T. Pun , "Attacks on Digital Watermarks: Classification, Estimation-Based Attacks and Benchmarks", Comm. Magazine, vol 39(8), pp 118-126, 2001.

Untitled Page