A new robust and non-blind digital image watermarking scheme based on integer wavelet transform

Author(s):  
Samaneh Hajiramezan ◽  
Maryam Hasanzadeh ◽  
Abdolrasoul Mirghadri
2019 ◽  
Vol 8 (2S11) ◽  
pp. 3567-3570

Health Informatics systems preserves the patient’s digital records. Two techniques that help in this process are watermarking and encryption. In this paper a reversible image watermarking scheme with logistic encryption is presented. The reversible watermarking is utilizing the concept of integer wavelet transform. The image is divided into sub bands and then the binary data is hidden in these sub bands. The watermarked wavelet sub bands are passed through logistic encryption module which scrambles the coefficients. These coefficients are then sent to inverse wavelet transform for image reconstruction. This process helps encrypt the image though spectral scrambling, thus resulting in faster and better encryption. The proposed algorithm outperforms the exiting algorithms in terms of execution time and the level of encryption.


2019 ◽  
Vol 8 (1) ◽  
pp. 62-68
Author(s):  
Manasha Saqib ◽  
Sameena Naaz

An enormous growth of multimedia information in the internet has given rise to varied unauthorized use and modification. This authenticity issue is equally a limitation both in the defense data transmission and secured transmission. Digital watermarking is one of the legitimate solutions to the above problem since it makes possible validation and secure transmission of secret data. This paper presents a robust and secure digital image watermarking scheme that can be used for copyright protection. The scheme involves Lifting Wavelet Transform (LWT) and Singular Value Decomposition (SVD). The latest approach to wavelet transform is the Lifting Wavelet Transform and the significant transform technique for robust digital image watermarking is Singular Value Decomposition. The results are cross-validated by using inverse LWT and SVD. The digital signature mechanism is used to generate and embed a digital signature after the watermark is embedded, then the ownership is authenticated before extracting watermarks. In order to check the robustness of the method against various common image processing attacks like Mean, Median, Gaussian, Shear, Rotation and Crop, certain performance metrics such as peak to signal noise ratio (PSNR)and mean square error (MSE) is computed. To check similarity, normal cross-correlation (NCC) is used.


Sign in / Sign up

Export Citation Format

Share Document