Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Robust Non-blind Algorithm for Watermarking Color Images using Multi-resolution Wavelet Decomposition

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 37 - Number 8
Year of Publication: 2012
Authors:
Amal Khalifa
Safwat Hamad
10.5120/4631-6666

Amal Khalifa and Safwat Hamad. Article: A Robust non-Blind Algorithm for Watermarking Color Images using Multi-resolution Wavelet Decomposition. International Journal of Computer Applications 37(8):33-39, January 2012. Full text available. BibTeX

@article{key:article,
	author = {Amal Khalifa and Safwat Hamad},
	title = {Article: A Robust non-Blind Algorithm for Watermarking Color Images using Multi-resolution Wavelet Decomposition},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {37},
	number = {8},
	pages = {33-39},
	month = {January},
	note = {Full text available}
}

Abstract

Research in the field of watermarking is flourishing providing techniques to protect copyright of intellectual property. Among the various methods that exploit the characteristics of the Human Visual System (HVS) for more secure and effective data hiding, wavelet-based watermarking techniques showed to be immune to attacks; adding the quality of robustness to protect the hidden message from third-party modifications. In this paper, we introduce a novel algorithm that applies a casting operation of a binary message onto the wavelet coefficients of colored images decomposed at multi-level resolution. In the extraction process, the original “unwatermarked” image is used to estimate the embedded bit-stream. Experimental results showed the low distortion effect cased by the embedding strategy of the proposed method. Furthermore, the resultant watermarked-images proved high resistance to attacks such as Jpeg compression and normal image processing like sharpening, blurring as well as image filtering. More simulations were carried out to evaluate the performance of the proposed algorithm in comparison to similar transform-domain techniques.

References

  • P. Davern, M. Scott, “Steganography, its history and its application to computer based data files”, Dublin University, Working paper, 1995.
  • R. Anderson, R. Needham, A. Shamir, “The Steganographic File System”, In Proc. the International Information hiding Workshop, 1998, pp. 43-60.
  • Considerations in the design of stegtunnel, http://www.synacklabs.net/projects/stegtunnel/
  • K. Rama , K. Thilagam , S. Manju Priya, A.Jeevarathinam, K .Lakshmi. “Survey and Analysis Of 3D Steganography”. International Journal of Engineering Science and Technology (IJEST), Vol. 3(1), pp.638-643, Jan 2011.
  • H. Dominik, P. Martin, B. Angelika. “DNA watermarks in non-coding regulatory sequences”. BMC Res Notes, 2: 125, 2009.
  • Chang, C.C., Lin, C.C., Tseng, C.S. & Tai, W.L., “Reversible hiding in DCT-based compressed images”. Information Sciences, 177(13), pp. 2768-86, 2007.
  • Chia-Chen Lin, Pei-Feng Shiu, “High Capacity Data Hiding Scheme for DCT-based Images”, Journal of Information Hiding and Multimedia Signal Processing, Vol. 1(3), p.p. 220-240, July 2010.
  • A.Cheddad, J.Condell, K.Curran, P.Mc Kevitt, “A skin tone detection algorithm for an adaptive approach to steganography”. Signal Processing, Vol. 89(12), pp.2465-78, 2009.
  • M. F. Tolba, M. Ghonemy, I. Taha, A. Khalifa ,High Capacity Image Steganography using Wavelet-Based Fusion, in proceedings of The Ninth IEEE Symposium On Computers And Communications (ISCC'2004), Alex-Egypt, June 2004, p.p. 430-435.
  • X. You; L. Du; Y. Cheung; Q. Chen, “A Blind Watermarking Scheme Using New Non-Tensor Product Wavelet Filter Banks”. IEEE Transactions On Image Processing, Vol. 19(12), pp. 3271 – 3284, 2010.
  • F. Kammoun, A. Khalfallah, M. Bouhlel, “New scheme of digital watermarking using an adaptive embedding strength applied on multiresolution filed by 9/7 wavelet“. the International Journal of Imaging Systems and Technology, Vol.16(6), pp. 249–257, 2006.
  • C.C. Wua, Y. Sub, T. Tuc, C. Changa, S. Li, “Saturation Adjustment Scheme of Blind Color Watermarking for Secret Text Hiding”. Journal Of Multimedia, Vol. 5, No. 3, P.P.248-258, June 2010.
  • S. C. Tamane, R. R. Manza and R. R. Deshmukh, B. Ambedkar, “Digital Watermarking using Image Fusion Method”. International Journal of Recent Trends in Engineering, Vol. 1, No. 2, pp.113-116, May 2009.
  • S. Tripathi, N. Ramesh, A. Bernito, K.J. Neeraj, “A DWT based Dual Image Watermarking Technique for Authenticity and Watermark Protection”. Signal & Image Processing : An International Journal(SIPIJ), Vol.1, No.2, pp.33-45, December 2010.
  • K. Navas, M. Sasikumar, “Image Fidelity Metrics: Future Directions”, IETE Technical Review, Vol. 28(1), pp. 50-56, 2011,.
  • S. Katzenbeisser,. “Principles of steganography”. In Information hiding techniques for steganography and digital watermarking. Norwood: Katzenbeisser, S. & Petitcolas, F.A.P. Ed. Artech House, INC, 2000.
  • Lee, S., Yoo, C.D. & Kalker, T., Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Transactions on Information Forensics and Security, 2007, 2(3), pp.321-30.