Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Digital Watermarking using Discrete Wavelet Techniques with the help of Multilevel Decomposition Technique

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 101 - Number 2
Year of Publication: 2014
Authors:
Anum Javeed Zargar
Ninni Singh
10.5120/17660-8475

Anum Javeed Zargar and Ninni Singh. Article: Digital Watermarking using Discrete Wavelet Techniques with the help of Multilevel Decomposition Technique. International Journal of Computer Applications 101(2):25-29, September 2014. Full text available. BibTeX

@article{key:article,
	author = {Anum Javeed Zargar and Ninni Singh},
	title = {Article: Digital Watermarking using Discrete Wavelet Techniques with the help of Multilevel Decomposition Technique},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {101},
	number = {2},
	pages = {25-29},
	month = {September},
	note = {Full text available}
}

Abstract

Digital watermarking plays an important role for securing data, providing authentication, confidentiality and even protects digital images from illegal distortion. In this paper, we are particular using discrete wavelet transform which is more prevalent than others. The watermark logo is inserted after compressing the image with the help of JPEG compression technique. First original image is taken; it is changed into multilevel decomposed with the help of HAAR wavelet, as it is a type of wavelet used for diet (discrete wavelet technique) technique. The algorithm has been tested under the presence of attacks like Gaussian noise, JPEG compression and we see how their BER and PSNR value varies. Further, compression before watermarking is done to ensure inaccessibility of information to unauthorized personnel.

References

  • Cop-Ming Chang and Long-Win Chang, "A Novel Public Watermarking System based on Advanced Encryption System", Proceedings of the 18th International Conference on Advanced Information Networking and Application (AINA'04).
  • Dan Yu, Sirajudeen Gulam Rizal, "transparent, robust information hiding for ownership verification", ICASSP IEEE 2004.
  • Potdar, V. , S. Han and E. Chang, 2005. " A SurveyOf Digital Image Watermarking Techniques", inProc. Of the IEEE International Conference on Industrial Informatics, pp: 709-716, Perth, Australia.
  • Chan, C. and L. Cheng, 2004. "Hiding Data in Images by Simple LSB Substitution, Pattern Recognition", 37(3):469-474.
  • Wang, R. , C. Lin and J. Lin, " Copyright protection of digital images by means of frequency domain watermarking," Proc. of the SPIE Conference On Mathematics of Data/Image Coding, Compression, and Encryption, USA. "
  • Liu Yongliang1, Xiaolin Yang1, Handgun Yao1, Taejon Huang2, Wen Gao2, "Watermark Detection Schemes with High Security", Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) IEEE.
  • Ping Dong, Jovan G. Brankov, Nikolas P. Galatians, Yongyi Yang,, Franck Davoine, "Digital Watermarking Robust to Geometric Distortions", IEEE Transactions On Image Processing, VOL. 14,NO. 12, DECEMBER 2005.
  • Vetterli, M. and J. Kova_evi_, 1995. " Wavelets and Subband Coding. "Prentice Hall, USA.
  • Shin- Hao and Yuan-Pei" I", IEEE Transaction On IP, Vol13, No. 2, Feb-2004
  • Mauro Barniand France Bartolini "Improved Wavelet-Based Watermarking Through Pixel Wise Masking"IEEE Transaction on IP, Vol 10, No. 5, May -2001
  • Wolfgang, R. , C. Podilchuk and E. Delp, 1999. "Perceptual Watermarks for Digital Images and Video," Proc. of the IEEE, vol. 87, no. 7, pp: 1108-1126
  • N. Nikolaidis and I. Pitas, "Copyright protection of images using robust digital signatures," in Proceedings, IEEE International Conference on Acoustics, Speech and Signal Processing, Vol4, May 1996, pp. 2168-2171.
  • Houng-Jyh Wang and C. -C. Jay Kuok, "Image Protection via Watermarking on Perceptually Significant Wavelet Coefficients. "IEEE 1998 Workshop on Multimedia Signal Processing, Redondo Beach, CA. Dec. 7-9, 1998.
  • S. Craver, N. Memon, B. L and M. M Yeung "Resolving rightful ownerships with invisible watermarking techniques:Limitations, attacks, and implications," IEEE Journal on Selected Areas in Communications, Vol. 16 Issue: 4, May 1998, pp. 573–586. Proceedings of the 18th International Conference on Advanced Information Networking and Application (AINA'04) 0-7695-2051-0/04 $ 20. 00 © 2004 IEEE.
  • Rao, K. and P. Yip. Discrete Cosine Transform: algorithms, advantages, applications. Academic Press, USA, 1990.
  • Fan Zhang and Hongbin Zhang. "Image Digital Watermarking Capacity and Reliability Analysis in Wavelet Domain", IEEE2004.
  • Paul Bao and Xiaohu Ma, "Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition", IEEE transactions on circuits and systems for video technology, vol. 15, no. 1, January2005.
  • Lahouari Ghouti, Ahmed Bouridane, Mohammad K. Ibrahim, Said Boussakta, "Digital Image Watermarking Using Balanced Multiwavelets", IEEE Transactions On Signal Processing, Vol. 54,No. 4, April 2006.
  • Anum Javeed Zargar "Digital watermarking using LSB Technique",IJSER VOL 5 ,Issue 7 July 2014
  • Wikipedia for PSNR