Host Feasibility Investigation to Improve Robustness in Hybrid DWT+SVD Based Image Watermarking Schemes

被引:8
作者
Araghi, Tanya Koohpayeh [1 ,2 ]
Abd Manaf, Azizah [3 ]
Alarood, Ala [3 ]
Zainol, Azida Binti [3 ]
机构
[1] Univ Teknol Malaysia, Adv Informat Sch, Kuala Lumpur 54100, Malaysia
[2] Iranian Social Secur Org, Arak 3817793164, Iran
[3] Univ Jeddah, Fac Comp & Informat Technol, Dept Comp Sci, Raids 21432, Saudi Arabia
关键词
D O I
10.1155/2018/1609378
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Today, we face different approaches to enhance the robustness of image watermarking schemes. Some of them can be implemented, but others in spite of spending money, energy, and time for programming purpose would fail because of not having a strong feasibility study plan before implementation. In this paper, we try to show a rational feasibility study before implementation of an image watermarking scheme. We develop our feasibility study by proposing three types of theoretical, mathematical, and experimental deductions. Based on the theoretical deduction, it is concluded that the "5" coefficients in the second level of Singular Value Decomposition (SVD) offer high robustness to embed watermarks. To prove this, a mathematical deduction composed of two parts is presented and the same results were achieved. Finally, for experimental deduction, 60 different host images in both normal and medical images from various sizes of 256*256 to 1024*1024 were imposed to 9 common geometric and signal processing attacks and the resistances of "S" coefficients against the attacks in the first and second levels of SVD were compared. Experimental result shows significant enhancement in stability and robustness of the "5" coefficients in the second level of SVD in comparison to the first level. Consequently all theoretical, mathematical, and experimental deductions confirmed domination of the "5" coefficients in the second level of SVD than the first level. In this paper, we do not show any specific implementation for the watermarking scheme. Instead, we investigate the potential performance gains from the singular values (S), of the second level of SVD and Discrete Wavelet Transform (DWT), and prove their superiority in comparison to conventional SVD+DWT watermarking schemes.
引用
收藏
页数:9
相关论文
共 23 条
[1]   A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition [J].
Agoyi, Mary ;
Celebi, Erbug ;
Anbarjafari, Gholamreza .
SIGNAL IMAGE AND VIDEO PROCESSING, 2015, 9 (03) :735-745
[2]   An optimized watermarking technique based on self-adaptive DE in DWT-SVD transform domain [J].
Ali, Musrrat ;
Ahn, Chang Wook .
SIGNAL PROCESSING, 2014, 94 :545-556
[3]   Multipurpose image watermarking in the domain of DWT based on SVD and ABC [J].
Ansari, Irshad Ahrnad ;
Pant, Millie .
PATTERN RECOGNITION LETTERS, 2017, 94 :228-236
[4]   Image Watermarking using Diffie Hellman Key Exchange Algorithm [J].
Aparna, J. R. ;
Ayyappan, Sonal .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 :1684-1691
[5]  
Araghi T.K., 2016, INT J ADV IMAGE PROC, V3, P6
[6]  
Araghi T. K., 2016, INT J ADV IMAGE PROC, V3, P20
[7]  
Araghi T.K., 2017, INT C REL INF COMM T, P361
[8]   A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition [J].
Araghi, Tanya Koohpayeh ;
Abd Manaf, Azizah ;
Araghi, Sagheb Kohpayeh .
EXPERT SYSTEMS WITH APPLICATIONS, 2018, 112 :208-228
[9]  
Arya D., 2010, INT J SCI AMP ENG RE, V1
[10]   An optimal robust digital image watermarking based on SVD using differential evolution algorithm [J].
Aslantas, Veysel .
OPTICS COMMUNICATIONS, 2009, 282 (05) :769-777