CFP last date
20 December 2024
Reseach Article

A Study on Spatial and Transform Domain Watermarking Techniques

by Pooja Dabas, Kavita Khanna
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 71 - Number 14
Year of Publication: 2013
Authors: Pooja Dabas, Kavita Khanna
10.5120/12429-9124

Pooja Dabas, Kavita Khanna . A Study on Spatial and Transform Domain Watermarking Techniques. International Journal of Computer Applications. 71, 14 ( June 2013), 38-41. DOI=10.5120/12429-9124

@article{ 10.5120/12429-9124,
author = { Pooja Dabas, Kavita Khanna },
title = { A Study on Spatial and Transform Domain Watermarking Techniques },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 71 },
number = { 14 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 38-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume71/number14/12429-9124/ },
doi = { 10.5120/12429-9124 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:35:35.601585+05:30
%A Pooja Dabas
%A Kavita Khanna
%T A Study on Spatial and Transform Domain Watermarking Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 71
%N 14
%P 38-41
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital Image Watermarking is used for copyright protection of digital information. With the widespread of internet, the intellectual properties are accessible and manipulated easily. It demanded to have different ways to protect data. Digital watermarking provides a viable and promising solution. In this paper, we have described about the three different watermarking techniques (LSB, DCT, DWT) along with the various performance parameters required to evaluate the best technique out of them. This can help us to propose and implement new technique to achieve maximum robustness against various attacks.

References
  1. C. S. Lu, Multimedia Security: Steganography and Digital Watermarking for Protection of Intellectual Property, Idea Group Publishing, 2005. .
  2. Sin-Joo Lee and Sung-Hwan Jung, "A Survey of Watermarking Techniques Applied to Multimedia", ISIE 2001.
  3. Petitcolas Fabien A. , Anderson Ross J. , Kuhn Markus G. , "Information Hiding – A Survey", Proceedings of IEEE, Special issue on protection of multimedia content, pp 1062-1078,July 1999.
  4. Bijan Fadeena and Nasim Zarei,"Hyprid DCT-CT "Digital Image Adaptive Watermarking", 3rd International Conference on Advances in Database, Knowledge, an data Applications, IARIA 2011.
  5. Tay P. , Havlicek J. P. , "Image Watermarking using Wavelets". IEEE, pp 258-261, 2002.
  6. H. Inoue, A. Miyazaki and T. Katsura, "An Image Watermarking Method Based on the Wavelet Transform", IEEE Conf. on Image Processing, Vol. 1, pp. 296-300, 1999.
  7. Taha El Areef, Hamdy S. Heniedy, S . Elmougy, and Osama M. Ouda, "Performance Evaluation of Image Watermarking Techniques", Third International Conference on Intelligent Computing and Information Systems, Faculty of Computer & Information Sciences, ICICIS 7002 ,March 15-18, 2007, Cairo.
  8. S. Voloshynovskiy, S. Pereira, T. Pun, University of GenevaJ. J. Eggers and J. K. Su, University of Erlangen-Nuremberg," Attacks on Digital Watermarks: Classification, E(1)stimation-based Attacks and Benchmarks ", 2001.
  9. I. Cox, J. Kilian, T. Leighton, and T. Shamoon, , "Secure spread spectrum watermarking for multi-media," IEEE Trans. on Image Processing 6 (1997), 1673-1687.
  10. Baisa L. Gunjal , R. R. Manthalkar "An Overview Of Transform Domain Robust Digital Image Watermarking Algorithms", Journal of Emerging Trends in Computing and Information Sciences, 2010-11.
  11. Craver, S. , N. Memon, B. L. Yeo and M. M. Yeung, "Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications". IEEE J. Selected Areas Commun, 1998.
  12. J. L. , Dugelay, S. Roche, C. Rey, G. Doërr, "Still-image watermarking robust to local geometric distortions," IEEE Trans. on Image Proc. , vol. 15, no. 9, pp. 2831-2842, 2006
  13. Mustafa Osman Ali , Elamir Abu Abaida Ali Osman, Rameshwar Row, Electronics & Communication Engineering Dept. , Biomedical Engineering Dept. , University College of Engineering, Osmania University, "Invisible Digital Image Watermarking in Spatial Domain with Random Localization", International Journal of Engineering and Innovative Technology (IJEIT), Volume 2, Issue 5, November 2012
  14. S Jayaraman, S Esakkirajan, and T Veerakumar: Digital Image Processing. McGraw-Hill, 2009.
  15. Mustafa Osman Ali, and Rameshwar Rao. , " Fundamentals of Digital Image Watermarking: an Overview". International Conference on Information and Communication Technology. pp. 64–67, Oct. 2011.
  16. D. Samanta, A. Basu, T. S. Das, V. H. Mankar, Ankush Ghosh, Manish Das and Subir K Sarkar, SET Based Logic Realization of a Robust Spatial Domain Image Watermarking," Proc. in 5th International Conference on Electrical and Computer Engineering-ICECE 2008, Dhaka, Bangladesh, pp. 986-993, Dec. 2008.
  17. J. R. Hemandez, M. Amado, "DCT domain watermarking techniques for still images as detector performance analysis and a new structure," in IEEE Transactions on Image Processing, 2000, vol. 9, pp. 55-68.
  18. Lee, G. J. , Yoon, E. J. and Yoo, K. Y. (2008), " A new LSB based Digital Watermarking Scheme with Random Mapping Function", in2008 IEEE DOI 10. 1109/UMC. 2008. 33
  19. S. Z. Yu, "A color image-adptive watermark based on wavelet transform," in Computer Simulation, 2006, vol. 23, pp. 132-134.
  20. C. C. Chang, J. Y. Hsiao, and C. S. Chan, "Finding optimal LSB substitution in image hiding by using dynamic programming strategy", Pattern Recognition, Vol. 36, No. 7, 2003, pp. 1583–1595.
  21. S. Shefali and S. M. Deshapande, "Mathematical Model for Improved Capacity Estimations for Data Hiding Techniques under Lossy Compression," in Proceedings of the 2nd IMT-GT Regional Conference in Mathematics, Statistics & Applications, Malaysia , 2006.
  22. AI-Gindy , H. AI-Ahmad, R Qahwaj, and A. Tawfik, "A novel blind Image watermarking technique for colour RGB images in the DCT domain using green channel "in Mosharaka International Conference on Communications. Computers and Applications (MIC-eCA 2008). , Amman, Jordan, 2008 .
Index Terms

Computer Science
Information Sciences

Keywords

Digital Image Watermarking Copyright Protection LSB DCT DWT Robustness Performance Parameters Attacks