A LL Subband Based Digital Watermarking in DWT

Full Text (PDF, 646KB), PP.50-63

Views: 0 Downloads: 0

Author(s)

Subin Bajracharya ,* Roshan Koju

1. University Institute of Engineering and Technology, Maharshi Dayanand University, Rohtak, Haryana, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijem.2017.02.05

Received: 11 Nov. 2016 / Revised: 16 Dec. 2016 / Accepted: 18 Jan. 2017 / Published: 8 Mar. 2017

Index Terms

Watermarking, Discrete Wavelet Transform, XOR, Embedding, Extraction, Steganography

Abstract

Digital watermarking is a technique which allows an individual to add hidden copyright notices or other verification messages to digital audio, video, image and documents in such a way that the watermark cannot be removed against different attacks. Digital Watermarking is a process to prevent the unauthorized access and modification of data. It ensures that the communication between two parties' remains secure. Digital watermarking can be performed in spatial and frequency domain. In the spatial domain, the watermark is embedded in the very existence of the pixel. In frequency domain, the transformation of any kind is applied and then information is embedded. In this paper, we proposed an approach to watermarking in frequency domain using DWT technique. The gray scale host image is divided into four sub bands: LL, HL, LH, HH and the watermark are inserted in the LL sub band using DWT technique. As the image is divided into four sub bands, a watermark of equal size of the LL sub band is inserted and the results are analyzed on the bases of different parameters such as PSNR and MSE. LL represents the average component of the host image which contains the maximum information of the image. In this approach the watermark is inserted in LL sub band using XOR operation. As the table IV shows, the imperceptibility of this method is quite good. Also, it shows good results when compared with existing methods.

Cite This Paper

Kamaldeep Joshi, Rajkumar Yadav,"A LL Subband Based Digital Watermarking in DWT", International Journal of Engineering and Manufacturing(IJEM), Vol.7, No.2, pp.50-63, 2017. DOI: 10.5815/ijem.2017.02.05

Reference

[1]Christian R., Dugelay J.L.,"A Survey of Watermarking Algorithms for Image Authentication", EURASIP Journal on Applied Signal Processing, 6,613-621, 2002.

[2]Jiang X., "Digital Watermarking and Its Application in Image Copyright Protection" International Conference on Intelligent Computation Technology and Automation, 2, 114 – 117, 2010.

[3]Singh V. "Digital Watermarking: A tutorial" In Cyber Journals: Multidisciplinary journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 2, 10-21, 2011. 

[4]Joshi K, Yadav R, Allwadhi S., "PSNR and MSE based investigation of LSB" IEEE Proceding on International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), 280 - 285, 2016.

[5]Jia-Fa M., Xin-Xin N., Gang X., Wei-Guo, S., Na-Na, Z. "A steganalysis method in the DCT domain" Multimedia Tools and Applications, 75, 5999–6019, 2016.

[6]Karri S., Sur A., "Steganographic algorithm based on randomization of DCT kernel" Multimedia Tools and Applications, 74, 9207–9230, 2014. 

[7]Chen P., Lin, H., "A DWT Based Approach for Image Steganography" 4, 275–290, 2006.

[8]Singh I., Khullar S , Laroiya S.C., "DFT Based Image Enhancement and Steganography" International Journal of Computer Science and Communication Engineering,2 ,2013

[9]Shalu Singh S., "Region Based Undetectable Multiple Image Watermarking Technique in DWT" IEEE Proceding on 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), 141 - 144, 2016.

[10]Shalu Singh "A Robust Deinterlacing Multiple Image Watermarking Technique in DWT" IEEE Proceding on 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), 8-13, 2016.

[11]Chen, P., & Lin, H. "A DWT Based Approach for Image Steganography", International Journal of Applied Science and Engineering, 4, 275–290, 2006.

[12]Muhammad, K., Sajjad, M., Mehmood, I., Rho, S., Baik, S. W., "A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image", Multimedia Tools and Applications, 1-27, 2015.

[13]Raval and PP Rege. (2003) "Discrete wavelet transform based multiple watermarking scheme", in the procedding of IEEE conference on convergent technologies for the Asia-Pacific Region. In tencon.vol.3, 2003, pp.935-938.

[14]Arya R.K., Singh S., Saharan R., "A secure Non-blind block based digital Image Watermarking technique usin DWT and DCT" In the Procedding of IEEE on Advances in computing communication and informatics (ICACCI), 2015 pp.2042-2048.

[15]Sridhar B., Arun C., "On secure multiple image watermarking technique using DWT", IEEE Third national conference on computing Communication & networking technologies (ICCENT), 1-4, 2012

[16]Durge A., Jaiswal A., "Increase Security of images from Attacks Using Watermarking Technique" In International Journal of Scientific & Engineering Research 3, 1-6, 2016.

[17]Sudhir K., Gopal M., "Dual watermarking based on multiple parameter fractional fourier transform and LSB technique" IEEE International Conference on Image information Processing, 1-5, 2011.

[18]Tao P. and Eskicioglu A.m., "A robust Multiple Watermarking Scheme Discrete wavelet transform Domain" Internet Multimedia management System, proceeding of SPIE, 133-144, 2004.