CFP last date
20 December 2024
Reseach Article

A Comparative Study of Digital Watermarking Techniques in Frequency Domain

by Ensaf Hussein, Mohamed A. Belal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 52 - Number 20
Year of Publication: 2012
Authors: Ensaf Hussein, Mohamed A. Belal
10.5120/8321-1961

Ensaf Hussein, Mohamed A. Belal . A Comparative Study of Digital Watermarking Techniques in Frequency Domain. International Journal of Computer Applications. 52, 20 ( August 2012), 43-50. DOI=10.5120/8321-1961

@article{ 10.5120/8321-1961,
author = { Ensaf Hussein, Mohamed A. Belal },
title = { A Comparative Study of Digital Watermarking Techniques in Frequency Domain },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 52 },
number = { 20 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 43-50 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume52/number20/8321-1961/ },
doi = { 10.5120/8321-1961 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:52:48.207926+05:30
%A Ensaf Hussein
%A Mohamed A. Belal
%T A Comparative Study of Digital Watermarking Techniques in Frequency Domain
%J International Journal of Computer Applications
%@ 0975-8887
%V 52
%N 20
%P 43-50
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital watermarking is hiding the information inside a digital media. Its widely used in copyright protection of digital images . This paper presents a comparative study of digital watermarking techniques in frequency domain and explores the role of Discrete cosine transform DCT, Discrete wavelet transform DWT and Contourlet transform CT in generating robust embedding technique that resist various attacks. The experimental results show the superiority of CT-based watermarking over DWT and DCT watermarking techniques, the quality of the watermarked image is excellent, it can include huge amount of hidden data, but it's not much better than other techniques in resisting attacks.

References
  1. C. S. Lu, Multimedia Security: Steganography and Digital Watermarking for Protection of Intellectual Property, Idea Group Publishing, 2005.
  2. F. Hartung, and M. Kutter, "Multimedia Watermarking Techniques", IEEE Proc. IEEE, Special Issue on Identification and Protection of Multimedia Information, vol. 87, pp. 1079–1107, July 1999.
  3. Sin-Joo Lee and Sung-Hwan Jung,"A Survey of Watermarking Techniques Applied toMultimedia",ISIE 2001.
  4. Dickman Shawn D. ,"An Overview of Steganography", James Mandison University Infosec Transport, July 2007.
  5. Petitcolas Fabien A. , Anderson Ross J. , Kuhn Markus G. , "Information Hiding – A Survey", Proceedings of IEEE, Special issue on protection of multimedia content, pp 1062-1078,July 1999.
  6. BijanFadeenaandNasimZarei,"Hyprid DCT-CT "Digital Image Adaptive Watermarking", 3rd International Conference on Advances in Database, Knowledge, an data Applications, IARIA 2011.
  7. Tay P. , Havlicek J. P. , "Image Watermarking using Wavelets". IEEE, pp 258-261, 2002.
  8. M. N. Do and M. Vetterli, "The contourlet transform:An efficient directional multiresolution imagerepresentation," IEEE Trans. on Image Processing,vol. 14, No. 12, pp. 2091–2106, December 2005.
  9. ShereemGhanem and Fatma A. E. Abou-Chadi, "ContourletVersus Wavelet Transform: A Performance Study for a Robust Image Watermarking", 2009.
  10. Jayalakshami M. , S. N. Merchant, Uday B. Desai, "Digital Watermarking in Contourlet Domain", 18th International Conference on Pattern Recognition, 2006.
  11. Ibrahim A. El rube, Mohamed Abou El Nasr, Mostafa M. Naim, Mahmoud Farouk, "Contourlet Versus Wavelet Transform for a Robust Digital Image Watermarking Technique", World Academy of Science, Engineering and Technology,2009.
  12. B. Chandra Mohan and S. Srinvas Kumar, "Robust Digital Watermarking Scheme using Contourlet Transform", IJCSNS International Journal of Computer Science and Network Security, vol. 8, No. 2, February 2008.
  13. MaliniMohan and Anurenjan P. R, "A New Algorithm for Data Hiding in Images using Contourlet Transform", 2011.
  14. HediehSajedi and Mansour Jamzad, "A Stegaanalysis Method based on Contourlet Coefficients", International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008.
  15. Taha El Areef, Hamdy S. Heniedy, S. Elmougy, and Osama M. Ouda, "Performance Evaluation of Image Watermarking Techniques", Third International Conference on Intelligent Computing and Information Systems, Faculty of Computer &Information Sciences, ICICIS 2007, March 15-18, 2007, Cairo.
  16. S. Voloshynovskiy, S. Pereira, T. Pun, University of GenevaJ. J. Eggers and J. K. Su, University of Erlangen-Nuremberg," Attacks on Digital Watermarks: Classification, E(1)stimation-based Attacks and Benchmarks ", 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Digital watermarking Discrete Cosine Transform Discrete Wavelet Transform Contourlet Transform