Conception & Implementation of a Novel Digital Image Watermarking Algorithm using Cascading of DCT and LWT

被引:0
作者
Tomar, Vivek [1 ]
Kumar, Arvind [2 ]
Choudhary, Ankur [3 ]
机构
[1] ITS Engn Coll, Greater Noida, India
[2] Pitney Bowes Software, Noida, India
[3] Amity Univ, Amity Sch Engn & Technol, Noida, India
来源
PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014) | 2014年
关键词
Image Watermarking; Discrete cosine transform (DCT); Discrete wavelet transform (DWT); Lifting wavelet transform (LWT); copyright protection; DOMAIN;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The recent development in the internet technology is definitely a boon for the society. But as far as copyright protection of multimedia content, prevention of unauthorized access, intellectual property rights etc. are concerned, this is an area that needs immediate attention. Now a days it is a relatively easy process to copy the data available on web, modify it and then put it back for individual as well as business profits. Digital Watermarking provides a viable solution by embedding information, which can be further used to prove the ownership or to detect invasion in the copyright multimedia content like text, audio, video etc. In this paper, we have proposed a new algorithm for the watermarking of digital images using cascading of two transforms i.e. Discrete cosine transform (DCT) and Lifting wavelet transform (LWT). Proposed algorithm takes the approximation component of the LWT transform of cover image and then applies DCT to embed watermark data. Watermarked data is embedded in middle frequency component using comparison based correlation technique. This algorithm has also been compared with the existing ones by applying different image attacks and subsequently measuring the robustness level and proved to be fairly robust.
引用
收藏
页码:501 / 505
页数:5
相关论文
共 15 条
[1]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[2]  
Gunjal L., J EMERGING TRENDS CO, V2
[3]  
Gupta Shital, 2010, IJCCT, V1, P3
[4]  
Johnson N.F., 1999, INFORM TECHNIQUES ST, P43
[5]   Geometric attack resistant watermarking in wavelet transform domain [J].
Lee, CH ;
Lee, HK .
OPTICS EXPRESS, 2005, 13 (04) :1307-1321
[6]   A survey of wavelet-domain watermarking algorithms [J].
Meerwald, P ;
Uhl, A .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 :505-516
[7]  
Primo Braga C.A, 2000, TECHNICAL REPORT
[8]  
Saxena Vikas, IMECS, VII, P1903
[9]  
SUHAIL M, 2003, IEEE T INSTRUMENTATI, V52
[10]  
Tao P., 2004, S INT MULT MAN SYST