We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Semi Blind Self Reference Image Watermarking in Discrete Cosine Transform using Singular Value Decomposition

by Satyanarayana Murty. P, Sekhar Dileep Kumar, Rajesh Kumar. P
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 13
Year of Publication: 2013
Authors: Satyanarayana Murty. P, Sekhar Dileep Kumar, Rajesh Kumar. P
10.5120/10141-4948

Satyanarayana Murty. P, Sekhar Dileep Kumar, Rajesh Kumar. P . A Semi Blind Self Reference Image Watermarking in Discrete Cosine Transform using Singular Value Decomposition. International Journal of Computer Applications. 62, 13 ( January 2013), 28-36. DOI=10.5120/10141-4948

@article{ 10.5120/10141-4948,
author = { Satyanarayana Murty. P, Sekhar Dileep Kumar, Rajesh Kumar. P },
title = { A Semi Blind Self Reference Image Watermarking in Discrete Cosine Transform using Singular Value Decomposition },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 13 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 28-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number13/10141-4948/ },
doi = { 10.5120/10141-4948 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:12:57.179501+05:30
%A Satyanarayana Murty. P
%A Sekhar Dileep Kumar
%A Rajesh Kumar. P
%T A Semi Blind Self Reference Image Watermarking in Discrete Cosine Transform using Singular Value Decomposition
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 13
%P 28-36
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An approach to self reference image watermarking scheme based on Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD). First, the original image is segmented into blocks by using ZIG - ZAG sequence. Then find the edges in each block and kept a threshold on these number of edges in each block. Using this threshold, get the essential blocks. A reference image is formed by taking these essential blocks. Reference image is transformed into DCT domain and then SVD is performed on both reference and watermarked image. Embedding is done by modifying singular values of the reference image using singular values of watermark. After embedding, modified reference image is segmented into blocks and these modified blocks are mapped into their original places for constructing watermarked image. For extraction, the watermarked reference image is constructed by the watermarked image using the positions of the selected blocks and the reverse process is used for extracting the singular values of the watermark from watermarked reference image. Robustness of proposed scheme is carried out by a variety of attacks.

References
  1. C. Rey and J. LDugelay, "A Survey of watermarking algorithms for image authentication," EURASIP Journal on Applied Signal Processing, Vol. 6,pp. 613-621,2002.
  2. V. Potdar, S. Han, and E. Chang, 2005. "A Survey of Digital Image Watermarking Techniques", in Proceedings of the 2005 IEEE International Conference on Industrial Informatics, pp. 709-716.
  3. P. Meerwald and A. Uhl, " A Survey of Waveletodomain watermarking Algorithms," Proceedings of the SPICE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, pp. 505 – 516,2001.
  4. M. Vidyasagar, S. Han and E. Chang, "A Survey of Digital Image Watermarking Techniques," 3rd IEEE International Conference on Industrial Informatics (INDIN), Perth, Australia, pp. 709-716, Aug 10 -12, 2005.
  5. Mr. Manjunatha Prasad. R,Dr. Shivaprakash Koliwad "A Comprehensive Survey of Contemporary Researches in Watermarking for Copyright Protection of Digital Images" IJCSNS International Journal of Computer Science and Network Security, VOL. 9 No. 4, pp. 91–107,April 2009.
  6. N. Johnson and S. Katezenbeisser, "A Survey of Steganography Techniques," Chapter3, Techniques for Steganography and Digital Watermarking, Eds. Northwood, MA: Artech House, pp. 43-75, Dec. 1999.
  7. I. J. Cox, M. L. Miller, J. A. Bloom, Digital Watermarking, Academic Press,2002.
  8. F. Hartung and M. Kutter, "Multimedia Watermarking Techniques," in Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107, July 1999.
  9. I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems), 2nd ed. Morgan Kaufmann, 11 2007.
  10. M. Barni and F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Imprint unknown, 1 2004.
  11. Arnold M. , Schmucker M. , Wolthusen S. D. , "Techniques and application of Digital Watermarking and Content Protection", Eds. Northwood, Artech House, 2003.
  12. F. Cayre, C. Fontaine, and T. Furon, "Watermarking security: theory and practice," Signal Processing, IEEE Transactions on, vol. 53, no. 10, pp. 3976–3987, Oct. 2005.
  13. Chi-Kwong Chan , L. M. Cheng "Hiding data in images by simple LSB substitution "Pattern Recognition 37 (2004) 469– 474 , ww. elsevier. com/locate/patcog.
  14. Dr. M. A. Dorairangaswamy "A Robust Blind Image Watermarking Scheme in Spatial Domain for Copyright Protection" International Journal of Engineering and Technology Vol. 1, No. 3,August, 2009 , ISSN: 1793-8236
  15. Piva A. , Barni M. , Bartolini F. , Cappellini V. "DCT-based watermark recovering without resorting to the uncorrupted original image", Proc. IEEE Int. Conf. on Image Processing, ICIP 97, Santa Barbara, CA, pp. 520-527, Oct. 1997.
  16. Podilchuk C. , Zeng W. , "Perceptual watermarking of still images", Proc. IEEE 1st Workshop on Multimedia Signal Processing, Princeton, NJ, pp. 363-368, June 23-25, 1997.
  17. Tao B. , Dickinson B. , "Adaptive watermarking in the DCT domain", IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pp. 20-46, Apr. 1997.
  18. Wolfgang R. B. , Podilchuk C. I. , Delp E. J. , "Perceptual watermarks for digital images and video", Proc. IEEE, vol. 87, pp. 1108-1126, July 1999.
  19. Hernández J. R. , Amado M. , Gonzalez F. P. , "DCT-Domain watermarking techniques for still images: Detector performance analysis and a new structure ", IEEE Transactions of Image Processing, vol. 9, pp. 55-68, Jan. 2000.
  20. Gu F. , Lu Z. M. , Pan J. S. , "Multipurpose image watermarking in DCT domain using subsampling", IEEE Int. Symposium On Circuits and Systems, vol. 5, pp. 4417- 4420, May 2005.
  21. Li X. , Xue X. "Improved robust watermarking in DCT domain for color images", Proc. IEEE Int. Conf. On Advanced Information Networking and Applications, IEEE-AINA 2004, vol. 1, pp. 53 – 58, 2004.
  22. Fanman Meng, Hong Peng, Zheng, Pei,Jun, Wang, " A novel blind image watermarking scheme based on support vector machine in DCT domain," in IEEE International Conference On Computational Intelligence and Security,2008.
  23. C. S. Shieh, H. C. Huang, F. H. Wang and J. S. Pan, "Genetic watermarking based on transform domain technique," Pattern Recognition,37(3):555-565, March 2004.
  24. Zha0 Rui-mei, Lian Hua, Pang Hua-wei and Hu Bo-ning, "A Blind Watermarking Algorithm Based on DCT," Second International Symposium on Intelligent Information Technology Application, vol. 3, pp. 821-824,2008.
  25. Zha0 Rui-mei, Lian Hua, Pang Hua-wei and Hu Bo-ning, "A Watermarking Algorithm by Modifying AC Coefficients in DCT domain," International Symposium on Information Science and engineering, vol. 2, pp. 159-162,2008.
  26. S. D. Lin and C. -F. Chen,"A Robust DCT-Based Watermarking for Copyright Protection," IEEE Transactions on Consumer Electronics, 46(3), August 2000, pp. 415-421.
  27. Gengming Zhu, and Nong Sang "Watermarking Algorithm Research and Implementation Based on DCT Block " proceedings of world academy of science, engineering and technology volume 35 november 2008 issn 2070-3740
  28. Ahmidi N. Safa R. , "A Novel DCT-based Approach for Secure Color Image Watermarking", Proc. Int. Conf. on Information Technology: Coding and Computing (ITCC'04), page 709, IEEE, 2004.
  29. Chu W. C. , "DCT-based image watermarking using subsampling", IEEE Transactions on Multimedia, vol. 5, no. 1, pp. 34-38, June 2005.
  30. LIU Rui-zhen, Tan Tie-niu. 2001. "SVD Based Digital Watermarking Method". Acta Electronica Sinica, Vol. 29, No. 2.
  31. R. Z. Liu and T. N. Tan,2002. "An SVD-Based Watermarking Scheme for Protecting Rightful Ownership", IEEE Trans. On Multimedia, Vol. 4, No. 1, pp. 121–128.
  32. J. M. Shieh, D. C. Lou, and M. C. Chang, "A semi-blind watermarking scheme based on singular value decomposition", computer standards & interface 28 (2006) 428-440.
  33. Aslantas, A singular-value Decomposition-Based Image Watermarking Using Genetic Algorithm. In: International Journal of Electronics and Communications vol. 62, (2007), pp. 386-393.
  34. C. C. Lai, H. C. Huang and C. C. Tsai, Image Watermarking Scheme Using Singular Value Decomposition and Micro-genetic Algorithm. In: Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing, (2008), pp. 469-472.
  35. X. Qi, S. Bialkowski and G. Brimley, An Adaptive QIM-and SVD-based Digital Image Watermarking Scheme in The Wavelet Domain. In: Proceedings of IEEE International Conference on Image Processing, (2008), pp. 421-424.
  36. B. Chandra Mohan, , S. Srinivaskumar, B. N. Chatterji, "A Robust Digital Image Watermarking Scheme using Singular Value Decomposition (SVD), Dither Quantization and Edge Detection," ICGST-GVIP Journal, ISSN: 1687-398X , Volume 8, Issue 1, June 2008.
  37. Alexander Sverdlov, Scott Dexter, Ahmet M. Eskicioglu "Robust SVD DCT based watermarking for copyright protection", IEEE Transactions on Image Processing, 10(5), May 2001, pp. 724-735.
  38. Liu Quan, and AI Qingsong "A combination of DCT based and SVD based watermarking," ICSP proceedings of IEEE International conference on signal processing, pp. 873-876, 2004.
  39. Fangjun Huang and Zhi-Hong Guan, A hybrid SVD-DCT watermarking method based on LPSNR, Pattern Recognition Letters, vol. 25, pp. 1769--1775, 2004.
  40. Feng Liu, and Yangguang Liu, "A Watermarking Algorithm for Digital Image Based on DCT and SVD,"Congress on Image and Signal Processing, pp. 380-383, 2008.
  41. Satyanarayana Murty . P, P. Rajesh Kumar, "A Semi - Blind Watermarking Scheme Using DCT and SVD", 1st International Conference On Emerging trends in signal processing and VLSI design,2010
  42. Gaurav Bahtnagar and Bala Subramanian"Reference Watermarking Scheme in Fractional Fourier Transform Domain Using Singular Value Decomposition ",International journal of information Processing,2(4), pp. 88-97,2008.
Index Terms

Computer Science
Information Sciences

Keywords

DCT SVD Zig-Zag Robust edges