Robust Image Watermarking Based on Lifting Wavelet Transfrom-Hessenberg Decomposition for Copyright Protection

被引:0
作者
Sudrajat, Agung [1 ]
Ernawan, Ferda [1 ,2 ]
Amrullah, Agit [3 ]
机构
[1] Faculty of Information Technology, Universitas Nusa Mandiri, Pasar Minggu Jakarta Selatan, Jakarta
[2] Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah, Pahang, Pekan
[3] Faculty of Computer Science, Universitas AMIKOM, Ring Road Utara Condong Catur Sleman, Yogyakarta
来源
Iraqi Journal for Computer Science and Mathematics | 2024年 / 5卷 / 03期
关键词
copyright protection; hessenberg decomposition; image watermarking; lifting wavelet transform; watermark;
D O I
10.52866/ijcsm.2024.05.03.043
中图分类号
学科分类号
摘要
The modern internet technology enables unauthorized individuals to alter the content of digital images. This work introduces a method for enhancing the robustness of an embedded watermark in images using Lifting Wavelet Transform (LWT) and Hessenberg Decomposition. This study utilizes Hessenberg Decomposition (HD) to insert a watermark image into the LL-sub band of the LWT transform. Singular Value Decomposition (SVD) is employed to convert the H value of HD. Subsequently, the watermark image is put into the singular value. The suggested system underwent testing against a range of image processing assaults, including compression, filters, and noise additions. The testing was conducted using multiple watermark sizes, specifically 256×256, 128×128, and 64×64 pixels. The experimental results demonstrate exceptional imperceptibility, with an average PSNR value of 39.5640 dB and a SSIM value of 0.9993. The results demonstrate a high level of resilience, as indicated by the NC value of 0.96390. © 2024 College of Education, Al-Iraqia University. All rights reserved.
引用
收藏
页码:695 / 706
页数:11
相关论文
共 31 条
[1]  
Sharma S., Zou J. J., Fang G., A Novel Multipurpose Watermarking Scheme Capable of Protecting and Authenticating Images with Tamper Detection and Localisation Abilities, IEEE Access, 10, pp. 85677-85700, (2022)
[2]  
Lu W., Li L., He Y., Wei J., Xiong N. N., RFPS: A Robust Feature Points Detection of Audio Watermarking for against Desynchronization Attacks in Cyber Security, IEEE Access, 8, pp. 63643-63653, (2020)
[3]  
Wang R., Lin C., Zhao Q., Zhu F., Watermark Faker: Towards Forgery Of Digital Image Watermarking, Proceedings - IEEE International Conference on Multimedia and Expo, (2021)
[4]  
Gupta S., Saluja K., Solanki V., Kaur K., Singla P., Shahid M., Efficient methods for digital image watermarking and information embedding, Measurement: Sensors, 24, (2022)
[5]  
Dhevanandhini G., Yamuna G., An effective and secure video watermarking using hybrid technique, Multimed Syst, 27, 5, pp. 953-967, (2021)
[6]  
Rhayma H., Makhloufi A., Hamam H., Ben Hamida A., Semi-fragile watermarking scheme based on perceptual hash function (PHF) for image tampering detection, Multimed Tools Appl, 80, 17, pp. 26813-26832, (2021)
[7]  
Kadian P., Arora S. M., Arora N., Robust Digital Watermarking Techniques for Copyright Protection of Digital Data: A Survey, Wireless Personal Communications, 118, 4, pp. 3225-3249, (2021)
[8]  
Hu R., Xiang S., Cover-lossless robust image watermarking against geometric deformations, IEEE Transactions on Image Processing, 30, pp. 318-331, (2021)
[9]  
Sun W., Zhou J., Li Y., Cheung M., She J., Robust High-Capacity Watermarking over Online Social Network Shared Images, IEEE Transactions on Circuits and Systems for Video Technology, 31, 3, pp. 1208-1221, (2021)
[10]  
Zhu T., Qu W., Cao W., An optimized image watermarking algorithm based on SVD and IWT, Journal of Supercomputing, 78, 1, pp. 222-237, (2022)