scholarly journals A new DWT-SVD based robust watermarking scheme for real property rights

2014 ◽  
Vol 3 (2) ◽  
pp. 69-78
Author(s):  
Sedigeh Razavi babakalak ◽  
Mohammad Ali Balafar ◽  
Ali Farzan

In this paper, a new robust digital image watermarking algorithm which was based on singular value decomposition (SVD) and discrete wavelet transform (DWT) was proposed and simulated for protecting real property rights. A gray scale logo image, rather than a randomly generated Gaussian noise type watermark, was used as a watermark. Its embedding algorithm hid a watermark LL sub-band blocks in the low–low (LL) and high-high (HH) sub-bands of a target non-overlapping block of the host image by modifying singular values on SVD version of these blocks. A semi-blind watermark extraction was designed to estimate the original coefficients. Experimental results showed that the proposed scheme made significant improvements in terms of both transparency and robustness and was superior to the existing methods which were considered in this paper.

2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Tanya Koohpayeh Araghi ◽  
Azizah Abd Manaf ◽  
Ala Alarood ◽  
Azida Binti Zainol

Today, we face different approaches to enhance the robustness of image watermarking schemes. Some of them can be implemented, but others in spite of spending money, energy, and time for programming purpose would fail because of not having a strong feasibility study plan before implementation. In this paper, we try to show a rational feasibility study before implementation of an image watermarking scheme. We develop our feasibility study by proposing three types of theoretical, mathematical, and experimental deductions. Based on the theoretical deduction, it is concluded that the “S” coefficients in the second level of Singular Value Decomposition (SVD) offer high robustness to embed watermarks. To prove this, a mathematical deduction composed of two parts is presented and the same results were achieved. Finally, for experimental deduction, 60 different host images in both normal and medical images from various sizes of 256⁎256 to 1024⁎1024 were imposed to 9 common geometric and signal processing attacks and the resistances of “S” coefficients against the attacks in the first and second levels of SVD were compared. Experimental result shows significant enhancement in stability and robustness of the “S” coefficients in the second level of SVD in comparison to the first level. Consequently all theoretical, mathematical, and experimental deductions confirmed domination of the “S” coefficients in the second level of SVD than the first level. In this paper, we do not show any specific implementation for the watermarking scheme. Instead, we investigate the potential performance gains from the singular values (S), of the second level of SVD and Discrete Wavelet Transform (DWT), and prove their superiority in comparison to conventional SVD+DWT watermarking schemes.


Author(s):  
Jaesung Park ◽  
◽  
Kazuhito Sawase ◽  
Hajime Nobuhara

Digital image watermarking based on singular value decomposition (SVD) is highly robust against misuse, but lacks the ability to distinguish whether watermarks are correct due to the importance of singular values being lower than two orthogonal matrices. To achieve highly accurate watermark extraction while maintaining high robustness, we propose robust watermarking based on discrete wavelet transform (DWT) and n-diagonalization formalized by Householder transformation. We propose that DWT be used to ensure visibility and that n-diagonalization be used to control information quantity related to watermark extraction accuracy. Experimental results confirm the robustness of our proposed method and that the extraction accuracy of the proposed method is approximately 2 times better than that of SVD.


Author(s):  
Chauhan Usha ◽  
Singh Rajeev Kumar

Digital Watermarking is a technology, to facilitate the authentication, copyright protection and Security of digital media. The objective of developing a robust watermarking technique is to incorporate the maximum possible robustness without compromising with the transparency. Singular Value Decomposition (SVD) using Firefly Algorithm provides this objective of an optimal robust watermarking technique. Multiple scaling factors are used to embed the watermark image into the host by multiplying these scaling factors with the Singular Values (SV) of the host image. Firefly Algorithm is used to optimize the modified host image to achieve the highest possible robustness and transparency. This approach can significantly increase the quality of watermarked image and provide more robustness to the embedded watermark against various attacks such as noise, geometric attacks, filtering attacks etc.


2009 ◽  
Vol 09 (03) ◽  
pp. 449-477 ◽  
Author(s):  
GAURAV BHATNAGAR ◽  
BALASUBRAMANIAN RAMAN

This paper presents a new robust reference watermarking scheme based on wavelet packet transform (WPT) and bidiagonal singular value decomposition (bSVD) for copyright protection and authenticity. A small gray scale logo is used as watermark instead of randomly generated Gaussian noise type watermark. A reference watermark is generated by original watermark and the process of embedding is done in wavelet packet domain by modifying the bidiagonal singular values. For the robustness and imperceptibly, watermark is embedded in the selected sub-bands, which are selected by taking into account the variance of the sub-bands, which serves as a measure of the watermark magnitude that could be imperceptibly embedded in each block. For this purpose, the variance is calculated in a small moving square window of size Sp× Sp(typically 3 × 3 or 5 × 5 window) centered at the pixel. A reliable watermark extraction is developed, in which the watermark bidiagonal singular values are extracted by considering the distortion caused by the attacks in neighboring bidiagonal singular values. Experimental evaluation demonstrates that the proposed scheme is able to withstand a variety of attacks and the superiority of the proposed method is carried out by the comparison which is made by us with the existing methods.


Sign in / Sign up

Export Citation Format

Share Document