We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Analysis of Image Watermarking Algorithms

by Naman Goel, Nitish Chandra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Number 10
Year of Publication: 2013
Authors: Naman Goel, Nitish Chandra
10.5120/10959-5925

Naman Goel, Nitish Chandra . Analysis of Image Watermarking Algorithms. International Journal of Computer Applications. 65, 10 ( March 2013), 14-17. DOI=10.5120/10959-5925

@article{ 10.5120/10959-5925,
author = { Naman Goel, Nitish Chandra },
title = { Analysis of Image Watermarking Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 65 },
number = { 10 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 14-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume65/number10/10959-5925/ },
doi = { 10.5120/10959-5925 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:18:28.857751+05:30
%A Naman Goel
%A Nitish Chandra
%T Analysis of Image Watermarking Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 65
%N 10
%P 14-17
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A digital image watermark is a signal permanently embedded into a digital image that can be detected or extracted later by means of some operations for authentication purposes. This paper discusses the results of evaluating three conventional image watermarking algorithms for performance and robustness. The findings are based on experiments on a standard LENA image and thus a comparative analysis between the algorithms becomes apparent and very clear. Three algorithms namely LSB (Least Significant Bit), DCT (Discrete Cosine Transform) and DWT (Discrete Wavelet Transform) were implemented in MATLAB and various results were collected with respect to performance and robustness. LSB embedded watermarks were easily removed using techniques that do not visually degrade the image to the point of being noticeable. Cosine transform algorithm was good in both performance and robustness. The wavelet domain proved to be highly resistant to both compression and noise, with minimal amounts of visual degradation but the original image was significantly affected by the embedding. The numeric data included in the paper make this comparison more formal.

References
  1. Communications in Computer and Information Science – Azizah Adb Manaf, Akram Zeki, Majdak Zamani, Suriayati Chuprat, Eyas El-Qawasmeh(Eds. ).
  2. Combined DWT-DCT Digital Image Watermarking - Ali Al-Haj.
  3. Communications in Computer and Information Science – Vinu V Das, R. Vijaykumar et al. (Eds. ) (page 37)
  4. Digital Watermarking and Steganography - Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, Ton Kalker. (page 175)
  5. A Dual Digital Image Watermarking Technique - Maha Sharkas, Dahlia ElShafie, and Nadder Hamdy, Senior Member IEEE.
  6. Robust Digital Image Watermarking based on Joint DWT and DCT- Saeed K. Amirgholipour, Ahmad R. Naghsh-Nilchi, Computer Engineering Dept. , Isfahan University, IRAN .
  7. Digital Watermarking Using Matlab - Pooya Monshizadeh Niani- University of Tehran, Iran.
  8. DCT: Theory and Application – Syed Ali Khayam, Department of Electrical and Computer Engineering, Michigan State University.
  9. Attacks on Copyright Marking Systems - Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn
Index Terms

Computer Science
Information Sciences

Keywords

Image watermarking DCT DWT LSB MSE SSIM PSNR