We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Novel Image Watermarking Scheme using Hybrid DWT-DCT-ELM Technique

by Anurag Mishra, Amita Goel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 18
Year of Publication: 2014
Authors: Anurag Mishra, Amita Goel
10.5120/17285-7784

Anurag Mishra, Amita Goel . A Novel Image Watermarking Scheme using Hybrid DWT-DCT-ELM Technique. International Journal of Computer Applications. 98, 18 ( July 2014), 28-33. DOI=10.5120/17285-7784

@article{ 10.5120/17285-7784,
author = { Anurag Mishra, Amita Goel },
title = { A Novel Image Watermarking Scheme using Hybrid DWT-DCT-ELM Technique },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 18 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 28-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number18/17285-7784/ },
doi = { 10.5120/17285-7784 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:26:33.054179+05:30
%A Anurag Mishra
%A Amita Goel
%T A Novel Image Watermarking Scheme using Hybrid DWT-DCT-ELM Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 18
%P 28-33
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

We propose a novel gray scale image watermarking scheme using hybrid DCT-DWT transform. The low frequency band coefficients are selected and the dataset of size 256*7 prepared using these coefficients is supplied to a newly developed simple layer feed forward network popularly known as Extreme Learning Machine (ELM). The ELM produces a normalized column vector of size 256*1 which is used as watermark sequence to be embedded in the low frequency coefficients. The DWT-DCT hybrid transform is supposed to produce better results for imperceptibility criteria. Five different image processing attacks are carried out over signed images. Watermarks are extracted successfully from signed and attacked images. Time complexity calculation indicates that the watermarking scheme is completely executed within seconds which makes it suitable for real time watermarking applications. .

References
  1. I. J. Cox, Joe Kilian, F. Thomson Leighton and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia", IEEE Transactions on Image Processing, vol. 6, no. 12 (1997) pp. 1673-1687
  2. M. Kutter and F. Petitcolas, "A fair benchmark for image watermarking systems," Electronic Imaging 199: Security and Watermarking of Multimedia Content, Vol. 3657 of SPIE Proceedings, San Jose, California USA, 25-27
  3. Charu Agarwal and Anurag Mishra, "A Novel Image Watermarking Technique using Fuzzy-BP Network", (2010) Proceedings of 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 102 – 105
  4. Charu Agarwal, Anurag Mishra and Arpita Sharma, "Gray-Scale watermarking using GA-BPN Hybrid Network", (2013), Journal of Visual Communication and Image Representation, Vol 24, pp. 1135 – 1146
  5. M-B. Lin, G-B Huang, P. Saratchandran and N. Sudararajan, "Fully complex extreme learning machine", Neurocomputing, (2005), vol (68), pp 306 – 314
  6. G-B Huang, Q-Y Zhu and C K Siew, "Extreme Learning Machine: Theory and Applications", (2006), Neurocomputing, vol (70), pp 489-501
  7. G-B Huang, Q-Y Zhu and C K Siew, "Real-Time Learning Capability of Neural Networks", (2006), IEEE Transactions on Neural Networks, vol 17(4), pp 863-878
  8. G-B Huang (2004), The Matlab code for ELM is available on: http://www. ntu. edu. sg/home/egbhuang
  9. S. K. Amirgholipour, A. R. Naghsh-Nilchi, "Robust Image Watermarking Based on Joint DWT-DCT,", International Journal of Digital Content Technology and its Applications, vol 3, pp. 42-54, 2009
  10. J X Liu and Z M Lu,. "DWT and DCT Combined Robust Watermarking Algorithm Based on Vector Quantization with Labeled Codewords," Proc. IEEE Conf, Anti-counterfeiting, Security, and Identification in Communication (ASID'08), IEEE press, Nov. 2008, pp. 51- 54
Index Terms

Computer Science
Information Sciences

Keywords

Discrete wavelet transforms (DWT) Extreme Learning Machine (ELM) Similarity Correlation Normalized Correlation Peak Signal Noise Ratio (PSNR) SSIM