Blind extraction algorithm of spread-spectrum watermark based on discrete wavelet transform and discrete cosine transform domain

2013 ◽  
Vol 33 (1) ◽  
pp. 138-141 ◽  
Author(s):  
Ran HU ◽  
Tianqi ZHANG ◽  
Hongxing GAO
2021 ◽  
Vol 16 ◽  
pp. 110-120
Author(s):  
Saugata Dutta ◽  
Kavita Saini

Steganography is a technology which is utilized in securing information through hiding data over another data which can be stored or passed over public network without a clue that secret data is hidden in the cover medium. This article focus on securing and hiding the data through transform domain techniques used in Image, Audio and Video steganography. The review study throws light on the algorithm and properties of transform domain techniques and its benefits to utilize in securing data. Parameters such as imperceptibility, capacity and robustness are evaluated for discrete cosine transform (DCT) and discrete wavelet transform (DWT).


Author(s):  
Eko Hari Rachmawanti ◽  
Heru Agus Santoso

Non-blind watermarking is a form of watermarking with a watermark image validation process that requires a host image. The use of the transform domain is more robust and imperceptible. The transform domain method is resistant to various forms of digital image attacks. In this study, Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) were selected as watermark insertion algorithms. DCT is faster and more resistant to attacks, especially in image compression attacks, but has lower imperceptibility than DWT. DWT is also known to be resistant to noise attacks, filtering, blurring, cropping, and has high imperceptibility depending on the sub-band selection but is not resistant to image compression attacks. Based on each algorithm's advantages and disadvantages, there is an opportunity to combine it to analyze and compare the insertion results with DCT and DWT itself. To test the results of imperceptibility, we used the Peak Signal to Noise Ratio (PSNR), while to test the robustness, we used Cross-Correlation (CC) and Bit Error Ratio (BER). Without attacks, the PSNR on the proposed method can reach 71 dB. The CC value without attack can reach a perfect value of 1 and BER = 0. The highest attack test result is CC = 1 on the filtering attack. From the various tests we have conducted, it has been proven that the DCT-DWT is more imperceptive and robust than previous studies


2021 ◽  
Vol 13 (2) ◽  
pp. 15-26
Author(s):  
Xuecheng Gong ◽  
Wanggen Li ◽  
Wang Jing

Digital watermark technology hides copyright information in digital images, effectively protecting the copyright of digital images. At present, the color image digital watermarking algorithm still has defects such as the inability to balance robustness, invisibility and the weak anti-attack ability. Aiming at the above problems, this paper studies the digital watermarking method based on discrete wavelet transform and discrete cosine transform. Then this paper proposes a color image blind digital watermarking algorithm based on QR code. First, convert the color image from RGB space to YCbCr space, extract the Y component and perform the second-level discrete wavelet transform. secondly, block the LL2 subband and perform the discrete cosine transform. finally, use the embedding method to convert the watermark information after the Arnold transform embedded in the block. The experimental results show that the PSNR of the color image embedded with the QR code is 56.7159 without being attacked. After being attacked, its PSNR and NC values are respectively 30dB and 0.95 or more, which proves that the algorithm has good robustness and can achieve watermarking blind extraction.


2013 ◽  
Vol 002 (001) ◽  
pp. 25-27 ◽  
Author(s):  
Anurag Tiwari ◽  
◽  
Payal Chandrakant ◽  
Trip ti ◽  
Surabhi Chaudhary ◽  
...  

Author(s):  
Rahul Dixit ◽  
Amita Nandal ◽  
Arvind Dhaka ◽  
Yohan Varghese ◽  
Vardan Agarwal

: Watermarking is a process of embedding a message inside a digital signal like an image, video or text. It is used for several key reasons such as authenticity verification, ownership recognition and hidden communication. In this paper, we discuss about image watermarking, where secret messages are stored in images. Introduction: We propose a dual watermarking approach, which is based on Discrete Cosine Transform, Discrete Wavelet Transform and Singular Value Decomposition methods. This paper considers one watermark as robust and other water mark as fragile. Method: The robust watermark is embedded in Discrete Wavelet Transform- Singular Value Decomposition - domain and is used to transmit hidden messages. The fragile watermark is embedded in Discrete Cosine Transform domain and is used for verification of secret message of the robust watermark. The proposed algorithm is tested in the experimental results section and shows promising results against denoising, rotation, translation and cropping attacks. Result: The results show that the performance of the proposed algorithm in terms of mean squared error, structural similarity and peak signal to noise ratio is S4considerable as compared with the existing methods. Discussion: We present the comparison results with Himanshu et. al. in table 10, from which we can see that our method performs better with gaussian noise and rotational attack only lacking with Salt and Pepper noise. Fig. 7 and Fig. 8, in terms of resulting PSNR shows the variation of noise variance and degree of rotation. From the graphs it is evident that out method performs better against Gaussian and rotational attack. Conclusion: In this paper a dual watermarking method is proposed in which one watermark is fragile which is called as authentication watermark whereas the other watermark is robust and is called as the information watermark. The authentication watermark is embedded in the fractional part of DCT domain in the cover image and the information watermark is embedded in the diagonal vector of the LL sub-band.


2015 ◽  
Vol 83 (4) ◽  
pp. 3133-3155 ◽  
Author(s):  
Faisal S. Al-Kamal ◽  
Emad S. Hassan ◽  
Mohammed Abd El-Naby ◽  
Farid Shawki ◽  
Said E. El-Khamy ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document