We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Secure and Robust DWT based Digital Image Watermarking Technique

by Swati Saxena, Pankaj Soni, Manish Gurjar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 168 - Number 11
Year of Publication: 2017
Authors: Swati Saxena, Pankaj Soni, Manish Gurjar
10.5120/ijca2017914535

Swati Saxena, Pankaj Soni, Manish Gurjar . A Secure and Robust DWT based Digital Image Watermarking Technique. International Journal of Computer Applications. 168, 11 ( Jun 2017), 21-24. DOI=10.5120/ijca2017914535

@article{ 10.5120/ijca2017914535,
author = { Swati Saxena, Pankaj Soni, Manish Gurjar },
title = { A Secure and Robust DWT based Digital Image Watermarking Technique },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 168 },
number = { 11 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 21-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume168/number11/27919-2017914535/ },
doi = { 10.5120/ijca2017914535 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:15:52.058463+05:30
%A Swati Saxena
%A Pankaj Soni
%A Manish Gurjar
%T A Secure and Robust DWT based Digital Image Watermarking Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 168
%N 11
%P 21-24
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to the tremendous growth of internet, the web may produce huge information in digital form. The information may be in the form of numbers, strings, images, and video. If the data to be transmitted are confidential, it is suitable as well for some mischievous users to illegitimately destroy, copy, or change them on the Internet. As a consequence, information security becomes an essential issue. Security and robustness are two important requirements for digital image processing algorithms in applications involving authentication. In this method, we proposed digital image watermarking technique to improve the PSNR value. Our experimental result showed that method is well suited for unauthorized tempering detection. We used watermarking for secure data transmission and to prevent unauthenticated image access. We applied Discrete Wavelet Transform technique to compress the image with better compression ratio and low processing power. Our method detected the image tempering and data can be transmitted securely over the channel.

References
  1. Tianrui Zong1, Yong Xiang1, Song Guo2 and Yue Rong “Rank- Based image watermarking method with high embedding capacity and robustness” IEEE Trans. Image process, vol.4, pp.2169-3536, May 2016.
  2. A.Swaminathan, M. Wu ana, K.J.R Liu, “Digital image forensics via intrinsic Fingerprint” IEEE Trans.inf. Forensics Security, vol.3, no.1, pp.101-117, March 2008.
  3. X. B. Kang and S. M. Wei, “Identifying tampered regions using singular value decomposition in digital image forensics,” in Proc. Int. Conf. Comput. Sci. Softw. Eng., vol. 3. Dec. 2008, pp. 926–930.
  4. A. Swaminathan, Y. Mao, and M. Wu, “Robust and secure image hashing,” IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 215–230, Jun. 2006.
  5. P. W. Wong and N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Trans. Image Process., vol. 10, no. 10, pp. 1593–1601.
  6. J. Lee and C. S. Won, “Authentication and correction of digital watermarking images,” Electron. Lett., vol. 35, no. 11, pp. 886–887, 1999.
  7. D. Kumar and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proc. IEEE, vol. 87, no. 7, pp. 1167–1180, Jul. 1999.
  8. J. Fridrich, “Image watermarking for tamper detection,” in Proc. Int. Conf. Image Process. (ICIP), vol. 2. Oct. 1998, pp. 404–408.
  9. P. W. Wong, “A public key watermark for image verification and authentication,” presented at the IEEE Int. Conf. Image Processing, Chicago, IL, 1998.
  10. S. D. Servetto, C. I. Podilchuk, and K. Ramchandran, “Capacity issues in digital image watermarking,” presented at the 5th IEEE Conf. Image Processing, 1998.
  11. D.Kunder and D. Hatzinakos, “Digital watermarking using multi resolution wavelet decomposition” Proc. IEEE int conf, Acostics, Speech, and signal processing, vol.5 pp.2969-2975, 1998.
  12. A.B Watson, G.Y Yang, J.A.Solomon and J.Villasenor “Visibility of wavelet quantization noise,” IEEE Tran image processing, vol.6, pp.1164-1175, 1997.
Index Terms

Computer Science
Information Sciences

Keywords

Digital image Security Watermarking Discrete Wavelet Transform PSNR MSE.