CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

A VQ-DCT Scheme for Grayscale Image Watermarking

by A.K. Pal, S. Das, G.P. Biswas, S. Mukhopadhyay
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 2 - Number 3
Year of Publication: 2010
Authors: A.K. Pal, S. Das, G.P. Biswas, S. Mukhopadhyay
10.5120/642-898

A.K. Pal, S. Das, G.P. Biswas, S. Mukhopadhyay . A VQ-DCT Scheme for Grayscale Image Watermarking. International Journal of Computer Applications. 2, 3 ( May 2010), 54-59. DOI=10.5120/642-898

@article{ 10.5120/642-898,
author = { A.K. Pal, S. Das, G.P. Biswas, S. Mukhopadhyay },
title = { A VQ-DCT Scheme for Grayscale Image Watermarking },
journal = { International Journal of Computer Applications },
issue_date = { May 2010 },
volume = { 2 },
number = { 3 },
month = { May },
year = { 2010 },
issn = { 0975-8887 },
pages = { 54-59 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume2/number3/642-898/ },
doi = { 10.5120/642-898 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:49:55.310082+05:30
%A A.K. Pal
%A S. Das
%A G.P. Biswas
%A S. Mukhopadhyay
%T A VQ-DCT Scheme for Grayscale Image Watermarking
%J International Journal of Computer Applications
%@ 0975-8887
%V 2
%N 3
%P 54-59
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, a hybrid watermarking scheme, that employs both DCT and VQ, has been presented. The authors have proposed a modification of the conventional LBG algorithm in this paper for designing the codebook to be used subsequently for compressing the image employing VQ. The watermark/logo is embedded in the constructed codebook after suitable DCT operations. The compression and reconstruction of the cover image employs the modified embedded codebook. The indirect mechanism of embedding the watermark and the hybrid combination of VQ and DCT make the entire watermarking scheme reasonably robust with respect to various types of common attacks which include intensity modification in real domain, modification in transformed domain namely JPEG compression etc. The method has been implemented and tested on a number of example images. We have also tested the robustness of authenticating capability of the scheme both qualitatively and quantitatively for various types of attacks.

References
  1. Chun-Shien Lu,” Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property”, Idea Group Publishing, 2005.
  2. P. Wolfgang, E.J. Delp, A watermark for digital images, Proc. IEEE International. Conf. on Image Processing (ICIP’96),Vol. III, Lausanne, Switzerland, pp. 219-222,September 1996,
  3. N. Nikolaidis, I. Pitas, “Robust image watermarking in the spatial domain”, Signal Processing. Vol no.66 ,pp. 385-403,1998
  4. M. U. Celik, G. Sharma, A. M. Tekalp, E. Saber, “Lossless generalized-LSB data embedding”, IEEE Trans. Image Process., 14 (2005) 253-266.
  5. Mauro Barni, Franco Bartolini, Vito Cappellini and Alessandro Piva, “A DCT-domain system for robust image watermarking”, Signal Processing 66 (1998) pp no. 357—372.
  6. Wai C. Chu, “DCT-based Image Watermarking using subsampling”, IEEE Transactions of Multimedia, Vol. 5,No. 1,pp-34-38,March- 2003.
  7. Jiang-Lung Liu, Der-Chyuan Lou, Ming-Chang Chang and Hao-Kuan Tso, “A robust watermarking scheme using self-reference image”, Commuter Standards & Interfaces 28(2006) 356-367.
  8. A. H. Taherinia, and M. Jamzad, “A Robust Image Watermarking using TwoLevel DCT and Wavelet Packets Denoising”, International Conference on Availability, Reliability and Security, pp no 150-157,2009.
  9. Mei Jiansheng, Li Sukang and Tan Xiaomei, “A Digital Watermarking Algorithm Based On DCT and DWT”, International Symposium on Web Information Systems and Applications (WISA’09), pp no-104-107, 2009.
  10. Ali Al-Haj,” Combined DWT-DCT Digital Image Watermarking”, Journal of Computer Science 3 (9): 740-746, 2007.
  11. Rafael C. Gonzalez and Richard E. Woods, “Digital Image Processing”, Pearson Edition, 2005.
  12. Hsien-Chu Wu and Chin-Chen Chang, “A novel digital image watermarking scheme based on the vector quantization technique”, Computers and Security, Vol. 24, pp. 460-471, 2005.
  13. Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng and Hung-Min Sun, “Grouping Strategies for Promoting Image Quality of Watermarking on the basis of Vector Quantization”, Journal of Visual Communication and Image Representation, Vol 21,pp.39-55, 2010.
  14. H. C. Huang, F. H. Wang, and J. S. Pan, “Efficient and robust watermarking algorithm with vector quantization”, Electronics Letters, 37 (2001) 826-828.
  15. Jau-JiShen, andJia-Min Ren,” A robust associative watermarking technique based on vectorquantization”, Digital Signal Processing (2009).
  16. A. Gersho and R. M. Gray, “Vector Quantization and Signal Compression”, Kluwer Academic Publishers, Boston, MA; 1991.
  17. David Salomon, “Data Compression: The Complete Reference”, Springer international Edition, 2005.
  18. Y. Linde, A. Buzo and R. M. Gray, “An algorithm for vector quantizer design”, IEEE Transactions on Communications, vol. 28, pp. 84-95,1980.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Watermarking DCT LBG Vector Quantization