A SECURED AND ROBUST IMAGE WATERMARKING BASED ON PIXEL PERMUTATION, WAVELET TRANSFORM AND SINGULAR VALUE DECOMPOSITION

被引:0
作者
Singh, Ranjeet Kumar [1 ]
Shaw, Dilip Kumar [1 ]
机构
[1] Natl Inst Technol Jamshedpur, Dept Comp Applicat, Jamshedpur, India
来源
JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY | 2019年 / 14卷 / 04期
关键词
Correlation coefficient; DWT; QR Code; SVD;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper proposed blind reversible digital image based watermarking technique to combined Singular Value Decomposition (SVD) with Discrete Wavelet Transformation (DWT), to improve data security, robustness and capacity. In this approach, two watermarks are embedded into two different sub-bands of the original image. Initially, we decomposed the original image into four sub-bands using DWT, and again DWT is used on LL sub-band till the third level. Pixel permutation is used to encrypt the QR Code, then encrypt QR code, and logo images are embedded in the third level of LL in LL3 and HL3. After subjecting the watermarked image to various attacks like cropping, rotation, sharpen, adding noise, contrast adjustment and filtering etc., we recovered inserted watermark image from cover image and compared the quality of the recovered watermark by the correlation coefficient. Robustness of the proposed algorithm is comparatively better than some of the previously proposed methods. Various graphs and tables show results in the paper.
引用
收藏
页码:1924 / 1939
页数:16
相关论文
共 18 条
  • [1] Improved image watermarking scheme using fast Hadamard and discrete wavelet transforms
    Abdallah, Ernad E.
    Ben Hamza, A.
    Bhattacharya, Prabir
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2007, 16 (03)
  • [2] Akter A, 2014, 2014 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV)
  • [3] Anita, 2015, 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), P1, DOI 10.1109/ICRITO.2015.7359302
  • [4] SVD-based digital image watermarking scheme
    Chang, CC
    Tsai, P
    Lin, CC
    [J]. PATTERN RECOGNITION LETTERS, 2005, 26 (10) : 1577 - 1586
  • [5] Deb K., 2012, P 7 INT C EL COMP EN
  • [6] Restudy on SVD-based watermarking scheme
    Fan, Ming-Quan
    Wang, Hong-Xia
    Li, Sheng-Kun
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2008, 203 (02) : 926 - 930
  • [7] Ghaderi K., 2012, 2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE 2012), P12, DOI 10.1109/ICCKE.2012.6395344
  • [8] Golea N., 2010, IEEE INT C COMPUTER, P1, DOI [10.1109/AICCSA.2010.5586967, DOI 10.1109/AICCSA.2010.5586967]
  • [9] Khorasani M. K., 2012, 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN 2012), P254, DOI 10.1109/CICSyN.2012.54
  • [10] Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition
    Lai, Chih-Chin
    Tsai, Cheng-Chih
    [J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2010, 59 (11) : 3060 - 3063