CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

An Improved Image Watermarking based on LPM and AQIM

by Somanath Chikane, Sukhwinder K. Bhatia, Rajneesh Talwar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 134 - Number 8
Year of Publication: 2016
Authors: Somanath Chikane, Sukhwinder K. Bhatia, Rajneesh Talwar
10.5120/ijca2016907959

Somanath Chikane, Sukhwinder K. Bhatia, Rajneesh Talwar . An Improved Image Watermarking based on LPM and AQIM. International Journal of Computer Applications. 134, 8 ( January 2016), 22-27. DOI=10.5120/ijca2016907959

@article{ 10.5120/ijca2016907959,
author = { Somanath Chikane, Sukhwinder K. Bhatia, Rajneesh Talwar },
title = { An Improved Image Watermarking based on LPM and AQIM },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 134 },
number = { 8 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 22-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume134/number8/23935-2016907959/ },
doi = { 10.5120/ijca2016907959 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:33:38.266149+05:30
%A Somanath Chikane
%A Sukhwinder K. Bhatia
%A Rajneesh Talwar
%T An Improved Image Watermarking based on LPM and AQIM
%J International Journal of Computer Applications
%@ 0975-8887
%V 134
%N 8
%P 22-27
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Watermarking refers to the hiding of a message in a host message in such a way that if this signal is altered; the hidden message still survives if the host survives. Watermarking used for covert communication, Authentication, broadcast monitoring, tamper proofing, etc. This paper proposes an improved image watermarking scheme based on log polar mapping (LPM) and angle quantization index modulation (AQIM).To keep the watermark robust to translation, rotation and scaling attacks, Log Polar mapping followed by Fast Fourier transform is performed on the original unwater marked image before embedding the watermark. Using AQIM, the watermark is embedded in the gradient vectors of large magnitudes by quantizing the angle. Gradient vectors are obtained in the form of Discrete Wavelet Transform (DWT) coefficients. To makes the watermark robust to amplitude scaling attacks, this method Embeds watermark in the vector angle. Imperceptibility is increased by embedding watermark in the gradient vectors with large magnitudes. Increase in the watermarking capacity, is achieved by employing multiple levels DWT.

References
  1. J. Cox, J. Kilian, F.T. Leighton, and T.Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., vol.6, no.12, pp.1673-1687, Dec.1997.
  2. Ramkumar, M., Akansu, A.N., Alatan, A.A., “A Robust Data Hiding Scheme For Digital Images Using DFT”, in IEEE ICIP, vol 2, pp 211-215, October 99.
  3. Y. Wang, J. F. Doherty, and R. E. Van Dyck, “A wavelet-based watermarking algorithm for ownership verification of digital images,” IEEE Trans. Image Process., vol. 11, no. 2, pp. 77-88,
  4. Lin, C-Y, Wu, M, Bloom, JA, Cox, IJ, Miller, ML & Lui, YM 2001, “Rotation, Scale and Translation Resilient Watermarking for Images”, IEEE Transactions on Image Processing, vol. 10, no. 5, pp. 767-782. Feb. 2002.
  5. D. Kundur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proc. IEEE, vol. 87, no. 7, pp. 1167-1180, Jul. 1999.
  6. B. Chen and G.W. Wornell,“Quantization index modulation: A class of provably good methods for digital Watermarking and
  7. information embedding,” IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
  8. J. Zou, R.K.Ward, and D.Qi, “A new digital image scrambling method based on Fibonacci numbers,” in Proc. Int. Symp. Circuits and Syst., May 2004, vol. 3, pp. 965-968.
  9. C. Ming and P. Xi-jian,“Image steganography Based on Arnold transform,” Comput. Appl.res, vol 1 pp235-237,2006
  10. J. Zou and R. K. Ward, “Introducing two new image scrambling methods,” in IEEE Pacific Rim Conf. Comm.,Comp. and Signal Proces., Aug. 2003, vol 2pp, 708-711.
  11. D. E. Manolakis and J. N. Ellinas, “A robust watermarking scheme based on edge detection and contrast sensitivity function,” in Proc. Int Conf. Comp. Vision Theory and Applications, Barcelona, Spain, 2007.
  12. F. Ourique, V. Licks, R. Jordan, and F. Perez-Gonzalez, “Angle qim: A novel watermark embedding scheme robust against amplitude scaling distortions,” in Proc. IEEE Int. Conf. Acoust., Speech,and Signal Process. (ICASSP ’05), Mar. 2005, vol. 2, pp. ii/7
  13. Joseph J.K., O. Ruanaidh and Thierry Pun “Rotation, Scale and Translation Invariant Digital Image Watermarking” Centre Universitaire d'Informatique, Universite de Geneve, 24 rue General Dufour, CH-1211 Geneve 4, Switzerland
  14. Lin, C-Y, Wu, M, Bloom, JA, Cox, IJ, Miller, ML & Lui, YM 2001, “Rotation, Scale and Translation Resilient Watermarking for Images”, IEEE Transactions on Image
Index Terms

Computer Science
Information Sciences

Keywords

LPM AQIM DWT DCT