We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Robust non-Blind Algorithm for Watermarking Color Images using Multi-resolution Wavelet Decomposition

by Amal Khalifa, Safwat Hamad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 37 - Number 8
Year of Publication: 2012
Authors: Amal Khalifa, Safwat Hamad
10.5120/4631-6666

Amal Khalifa, Safwat Hamad . A Robust non-Blind Algorithm for Watermarking Color Images using Multi-resolution Wavelet Decomposition. International Journal of Computer Applications. 37, 8 ( January 2012), 33-39. DOI=10.5120/4631-6666

@article{ 10.5120/4631-6666,
author = { Amal Khalifa, Safwat Hamad },
title = { A Robust non-Blind Algorithm for Watermarking Color Images using Multi-resolution Wavelet Decomposition },
journal = { International Journal of Computer Applications },
issue_date = { January 2012 },
volume = { 37 },
number = { 8 },
month = { January },
year = { 2012 },
issn = { 0975-8887 },
pages = { 33-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume37/number8/4631-6666/ },
doi = { 10.5120/4631-6666 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:23:49.235715+05:30
%A Amal Khalifa
%A Safwat Hamad
%T A Robust non-Blind Algorithm for Watermarking Color Images using Multi-resolution Wavelet Decomposition
%J International Journal of Computer Applications
%@ 0975-8887
%V 37
%N 8
%P 33-39
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Research in the field of watermarking is flourishing providing techniques to protect copyright of intellectual property. Among the various methods that exploit the characteristics of the Human Visual System (HVS) for more secure and effective data hiding, wavelet-based watermarking techniques showed to be immune to attacks; adding the quality of robustness to protect the hidden message from third-party modifications. In this paper, we introduce a novel algorithm that applies a casting operation of a binary message onto the wavelet coefficients of colored images decomposed at multi-level resolution. In the extraction process, the original “unwatermarked” image is used to estimate the embedded bit-stream. Experimental results showed the low distortion effect cased by the embedding strategy of the proposed method. Furthermore, the resultant watermarked-images proved high resistance to attacks such as Jpeg compression and normal image processing like sharpening, blurring as well as image filtering. More simulations were carried out to evaluate the performance of the proposed algorithm in comparison to similar transform-domain techniques.

References
  1. P. Davern, M. Scott, “Steganography, its history and its application to computer based data files”, Dublin University, Working paper, 1995.
  2. R. Anderson, R. Needham, A. Shamir, “The Steganographic File System”, In Proc. the International Information hiding Workshop, 1998, pp. 43-60.
  3. Considerations in the design of stegtunnel, http://www.synacklabs.net/projects/stegtunnel/
  4. K. Rama , K. Thilagam , S. Manju Priya, A.Jeevarathinam, K .Lakshmi. “Survey and Analysis Of 3D Steganography”. International Journal of Engineering Science and Technology (IJEST), Vol. 3(1), pp.638-643, Jan 2011.
  5. H. Dominik, P. Martin, B. Angelika. “DNA watermarks in non-coding regulatory sequences”. BMC Res Notes, 2: 125, 2009.
  6. Chang, C.C., Lin, C.C., Tseng, C.S. & Tai, W.L., “Reversible hiding in DCT-based compressed images”. Information Sciences, 177(13), pp. 2768-86, 2007.
  7. Chia-Chen Lin, Pei-Feng Shiu, “High Capacity Data Hiding Scheme for DCT-based Images”, Journal of Information Hiding and Multimedia Signal Processing, Vol. 1(3), p.p. 220-240, July 2010.
  8. A.Cheddad, J.Condell, K.Curran, P.Mc Kevitt, “A skin tone detection algorithm for an adaptive approach to steganography”. Signal Processing, Vol. 89(12), pp.2465-78, 2009.
  9. M. F. Tolba, M. Ghonemy, I. Taha, A. Khalifa ,High Capacity Image Steganography using Wavelet-Based Fusion, in proceedings of The Ninth IEEE Symposium On Computers And Communications (ISCC'2004), Alex-Egypt, June 2004, p.p. 430-435.
  10. X. You; L. Du; Y. Cheung; Q. Chen, “A Blind Watermarking Scheme Using New Non-Tensor Product Wavelet Filter Banks”. IEEE Transactions On Image Processing, Vol. 19(12), pp. 3271 – 3284, 2010.
  11. F. Kammoun, A. Khalfallah, M. Bouhlel, “New scheme of digital watermarking using an adaptive embedding strength applied on multiresolution filed by 9/7 wavelet“. the International Journal of Imaging Systems and Technology, Vol.16(6), pp. 249–257, 2006.
  12. C.C. Wua, Y. Sub, T. Tuc, C. Changa, S. Li, “Saturation Adjustment Scheme of Blind Color Watermarking for Secret Text Hiding”. Journal Of Multimedia, Vol. 5, No. 3, P.P.248-258, June 2010.
  13. S. C. Tamane, R. R. Manza and R. R. Deshmukh, B. Ambedkar, “Digital Watermarking using Image Fusion Method”. International Journal of Recent Trends in Engineering, Vol. 1, No. 2, pp.113-116, May 2009.
  14. S. Tripathi, N. Ramesh, A. Bernito, K.J. Neeraj, “A DWT based Dual Image Watermarking Technique for Authenticity and Watermark Protection”. Signal & Image Processing : An International Journal(SIPIJ), Vol.1, No.2, pp.33-45, December 2010.
  15. K. Navas, M. Sasikumar, “Image Fidelity Metrics: Future Directions”, IETE Technical Review, Vol. 28(1), pp. 50-56, 2011,.
  16. S. Katzenbeisser,. “Principles of steganography”. In Information hiding techniques for steganography and digital watermarking. Norwood: Katzenbeisser, S. & Petitcolas, F.A.P. Ed. Artech House, INC, 2000.
  17. Lee, S., Yoo, C.D. & Kalker, T., Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Transactions on Information Forensics and Security, 2007, 2(3), pp.321-30.
Index Terms

Computer Science
Information Sciences

Keywords

watermarking secure embedding image wavelet bit casting invisibility Robustness attack.