CFP last date
20 December 2024
Reseach Article

Digital Image Watermarking using Fibonacci Transform in YIQ Color Space

by Manoranjan Kr Sinha, Rajesh Kumar Rai, G. Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 104 - Number 15
Year of Publication: 2014
Authors: Manoranjan Kr Sinha, Rajesh Kumar Rai, G. Kumar
10.5120/18280-9206

Manoranjan Kr Sinha, Rajesh Kumar Rai, G. Kumar . Digital Image Watermarking using Fibonacci Transform in YIQ Color Space. International Journal of Computer Applications. 104, 15 ( October 2014), 28-35. DOI=10.5120/18280-9206

@article{ 10.5120/18280-9206,
author = { Manoranjan Kr Sinha, Rajesh Kumar Rai, G. Kumar },
title = { Digital Image Watermarking using Fibonacci Transform in YIQ Color Space },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 104 },
number = { 15 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 28-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume104/number15/18280-9206/ },
doi = { 10.5120/18280-9206 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:36:15.993800+05:30
%A Manoranjan Kr Sinha
%A Rajesh Kumar Rai
%A G. Kumar
%T Digital Image Watermarking using Fibonacci Transform in YIQ Color Space
%J International Journal of Computer Applications
%@ 0975-8887
%V 104
%N 15
%P 28-35
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital watermarking is a technique for inserting ownership information to the digital data to prove the authenticity. A digital watermarking is perceptually invisible to prevent obstruction of the original image. It is also used for tamper proofing, broadcast monitoring, covert communication etc. In this paper, a wavelet-based watermarking approach for hiding watermark image in color host images is proposed. The host image is converted into YIQ color space and then Y channel decomposed into wavelet coefficients. This proposed methodology overcomes the drawback of the existing approaches and enhances the security by applying Arnold transform and Fibonacci transform for embedding the resultant pattern in the host image. The watermark embedding process does not degrade the visual quality of the image.

References
  1. F. Bartolini, M. Barni, V. Cappellini, and A. Piva, "Mask Building for Perceptually Hiding Frequency Embedded Watermarks," Proc. Int. Conf. on Image Processing, Oct. 1998, vol. I, pp. 450-454.
  2. Wang S. H. , LinY. P. , "Wavelet Tree quantization for copyright protection for Watermarking", IEEE Transactions, Image Processing, pp. 154-165, 2002.
  3. Kundur and D. Hatzinakos, "A Robust Digital Image Watermarking Method Using Wavelet-Based Fusion," Proc. IEEE Int. Conf. on Image Processing, Oct. 1997, vol. I, pp. 544-547.
  4. I. Cox, J. Kilian, F. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
  5. Reddy R. , et al, "Robust Digital Watermarking of Color Images under Noise Attacks", International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May 2009.
  6. Wang Y. , Doherty J. F. , Dyck V. R. E. , "A wavelet-based watermarking algorithm for ownership verification of digital images", IEEE Transactions, Image Processing, 11 pp. 77-88, 2002.
  7. Tao P. , Eskicioglu A. M. , "A robust multiple watermarking scheme in the discrete wavelet transform domain", Proceedings of the SPIE, Vol. 5601, pp. 133-144, 2004.
  8. Luo Y. , et al. "Study on digital elevation mode data watermark via integer wavelets", Journal of software, 16(6), pp. 1096-1103, 2005.
  9. Yuan Y. , Huang D. , Liu D. , "An Integer Wavelet Based Multiple Logo- watermarking Scheme", In IEEE, Vol-2, pp. 175-179, 2006.
  10. Lin Q. , Lin Z. , Feng G. , "DWT based on watermarking algorithm and its implementing with DSP", IEEE Xplore, pp. 131-134, 2009.
  11. Chen, S. T. , Huang, H. N. , Chen, C. J. , Wu, G. D. , 'Energy-proportion based scheme for audio watermarking', IET Signal Process. , 2010, 4,(5), pp. 576–587.
  12. Preda, R. O. , Vizireanu, D. N. , 'A robust digital watermarking scheme for video copyright protection in the wavelet domain', Measurement, 2010, 43, (10), pp. 720– 1726.
  13. Deng, N. , Jiang, C. S. , 'CDMA watermarking algorithm based on wavelet basis'. Proc. 9th Int. Con. Fuzzy Systems and Knowledge Discovery, May 2012, pp. 2148– 2152.
  14. Ho, C. K. and Li, C. T. Semifragile watermarking scheme for authentication of JPEG images. Proceeding of the IEEE international Conference on Information Technology: Coding and Computing, I, Pp. 7 – 11 2004.
  15. I. Cox and M. Miller, "Electronic watermarking: the ?rst 50 years," in IEEE Fourth Workshop on Multimedia Signal Processing, 2001, pp. 225 –230.
  16. Z. Wang, A. Bovic, H. Sheikh, and E. Simoncelli, "Image Quality Assessment: From Error Visibility to Structural Similarity," in IEEE Transactions on Image Processing, 2004, pp. 600-612.
  17. http://www. mathworks. in/help
  18. R. G. Gonzalez and R. E. Woods, Digital Image Processing, 3rd ed. Publishing House of Electronics Industry.
Index Terms

Computer Science
Information Sciences

Keywords

3-level DWT Arnold transform Fibonacci Transform.