Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform

2007 ◽  
Vol 2 (3) ◽  
pp. 321-330 ◽  
Author(s):  
Sunil Lee ◽  
Chang D. Yoo ◽  
Ton Kalker
2019 ◽  
Vol 8 (2S11) ◽  
pp. 3567-3570

Health Informatics systems preserves the patient’s digital records. Two techniques that help in this process are watermarking and encryption. In this paper a reversible image watermarking scheme with logistic encryption is presented. The reversible watermarking is utilizing the concept of integer wavelet transform. The image is divided into sub bands and then the binary data is hidden in these sub bands. The watermarked wavelet sub bands are passed through logistic encryption module which scrambles the coefficients. These coefficients are then sent to inverse wavelet transform for image reconstruction. This process helps encrypt the image though spectral scrambling, thus resulting in faster and better encryption. The proposed algorithm outperforms the exiting algorithms in terms of execution time and the level of encryption.


Author(s):  
Ferda Ernawan ◽  
Dhani Ariatmanto

With the era of rapid technology in multimedia, the copyright protection is very important to preserve an ownership of multimedia data. This paper proposes an image watermarking scheme based on Integer Wavelet Transform (IWT) and Singular Value Decomposition (SVD). The binary watermark is scrambled by Arnold transform before embedding watermark. Embedding locations are determined by using variance pixels. Selected blocks with the lowest variance pixels are transformed by IWT, thus the LL sub-band of 8×8 IWT is computed by using SVD. The orthogonal U matrix component of U3,1 and U4,1 are modified using certain rules by considering the watermark bits and an optimal threshold. This research reveals an optimal threshold value based on the trade-off between robustness and imperceptibility of watermarked image. In order to measure the watermarking performance, the proposed scheme is tested under various attacks. The experimental results indicate that our scheme achieves higher robustness than other scheme under different types of attack.


Sign in / Sign up

Export Citation Format

Share Document