We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Implementation and Comparison of Watermarking Algorithms using DWT

by Bushra Jamal, Athar Hussain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 9
Year of Publication: 2013
Authors: Bushra Jamal, Athar Hussain
10.5120/10106-4759

Bushra Jamal, Athar Hussain . Implementation and Comparison of Watermarking Algorithms using DWT. International Journal of Computer Applications. 62, 9 ( January 2013), 9-14. DOI=10.5120/10106-4759

@article{ 10.5120/10106-4759,
author = { Bushra Jamal, Athar Hussain },
title = { Implementation and Comparison of Watermarking Algorithms using DWT },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 9 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 9-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number9/10106-4759/ },
doi = { 10.5120/10106-4759 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:11:19.151737+05:30
%A Bushra Jamal
%A Athar Hussain
%T Implementation and Comparison of Watermarking Algorithms using DWT
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 9
%P 9-14
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Robustness is an essential requirement of watermarking schemes so that they can sustain several intentional or unintentional image processing attacks. For such a robust watermarking algorithm, watermark will be embedded into the third level wavelet coefficients of an image that is decomposed by using DWT technique. In this paper the third level watermarking scheme is proposed by three different algorithm and the obtained results are then compared so as to find out that which algorithm performs better under a particular condition. In present study the third level enhanced watermarking scheme for two DWT based watermarking techniques namely alpha blending technique and CDMA-DWT based watermarking scheme is also proposed. The results obtained by these two techniques are further compared and analyzed.

References
  1. Koz,A. , 2002, Digital Watermarking Based on Human Visual System, The Graduate School of Natural and Applied Sciences, The Middle East Technical University, September, pp. 2 – 8.
  2. Nikolaidis,A. , Tsekeridou,S. , Tefas,A. , Solachidis,V. , 2001, A Survey On Watermarking Application Scenarios And Related Attacks, Proceedings International Conference, October ,Vol. 3, pp. 991 – 993.
  3. Kutter, M. and Jordan,F. , Digital Watermarking Technology, in AlpVision, Switzerland, pp. 1 – 4.
  4. Ross,J. A. , and Fabien,A. P. Petitcolas, 1998, On the limits of Steganography, IEEE Journal of Selected Areas in Communications, May, 16(4) pp. 474-481.
  5. Chandramouli R. , Memon N. , Rabbani M. , Digital Watermarking
  6. Wolak C. M. , 2000, "Digital Watermarking", Preliminary Proposal, Nova Southeastern University, United States. Available: http://www. itstudyguide. com/papers/cwdiss880preliminary. htm
  7. Woo C. S. , Du J. , Pham B. , 2005, Performance Factors Analysis of a Wavelet- based Watermarking Method, Proc. 3rd Australasian Information Security Workshop (AISW2005), CRPIT, vol. 44, pp. 89-97.
  8. Pereira S. , Voloshynovskiy S. and Pun T. , 2000, "Optimized Wavelet Domain Watermark Embedding Strategy Using Linear Programming", Wavelet Applications VII (part of SPIE AeroSense 2000), April.
  9. Vidyasagar M. P. , Song H. , Elizabeth C. , 2005, "A Survey of Digital Image Watermarking Techniques", School of Information Systems, Curtin University of Technology, Perth, Western Australia, 3rd IEEE International Conference on Industrial Informatics (INDIN),
  10. Jayaraman S. , Esakkirajan S. , Veerakumar T. , "Digital Image Proceesing"
  11. Chandra M. , Pandey S. , 2010 "A DWT Domain Visible Watermarking Techniques for Digital Images", International Conference on Electronics and Information Engineering, Volume 2-421.
  12. Singh A. P. , Mishra A. , 2011, Wavelet Based Watermarking on Digital Image, Indian Journal of computer Science and Engineering.
Index Terms

Computer Science
Information Sciences

Keywords

Digital watermarking Discrete Wavelet transform Insertion Extraction Watermark PSNR MSE Alpha Blending