Abstract
Data protection in transmitting online message is a prime concern in present scenario. Preventing the illegal copying and protect the secret data is important. For this information hiding scheme and Data encryption techniques are major tools and several techniques developed for data protection. In this work, DWT and SVD Image watermarking Algorithm has been proposed in which transform is applied to watermarked image to ensure the robustness of Watermark against attacks. The proposed algorithm offer a minimum distortion against various attacks like Crop Attack, Rotation Attack, Mean Attack, Median Attacks, Salt and Pepper Attack, Shear Attack. The significant advantages can be obtained by the new techniques that are DWT-SVD watermarking Techniques to the digital watermarking field and provides benefits to the copyright protection and Data security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mei Jiansheng1, Li Sukang1 and Tan Xiaomei “A Digital Watermarking Algorithm Based on DCT and DWT”, International Symposium on Web Information Systems and Applications (WISA) 2009, pp. 104-107.
W. Zeng and B Liu, “On Resolving Rightful Ownership of Digital Images by Invisible Watermarks”, Proc. IEEE 1997 Intrenational Conference on Image Processing, ICIP-97, Vol. 1, pp 552-555.
Chandra Munesh, Pandey Shikha,” A DWT Domain Visible Watermarking Techniques for Digital Images” International Conference on Electronics and Information Engineering (ICEIE), Volume 2,2010,pp-421-427.
Asna Furqan, Munish Kumar, “Study and Analysis of Robust DWT-SVD Domain Based Digital Image Watermarking Technique Using MATLAB”, IEEE International Conference on Computational Intelligence & Communication Technology, 2015 pp 638-644.
Saira Mudassar, Munazah Jamal, Farkhand Shakeel Mahmood, Nouman Shah, Hamza Bin Tahir, Hassan Malik, “Hybrid DWT-SVD Digital Image Watermarking”, International Journal of Computer (IJC), 2017, pp 105-109
Xueyi Ye, Xueting Chen, Meng Deng, Shuyun Hui, Yunlu Wang, “A Multiple-Level DCT Based Robust DWT-SVD Watermark Method”,10th International Conference on Computational Intelligence and Security, IEEE, 2014, pp 479-483.
Neha Chauhan, Akhilesh A. Waoo and P. S. Patheja, “information hiding watermarking detection technique by psnr and rgb intensity”, Journal of Global Research in Computer Science, Volume 3, No. 9, September 2012 PP 18-22.
Wang Y., Doherty J.F., Dyck V.R.E., “A wavelet-based watermarking algorithm for ownership verification of digital images”, IEEE Transactions, Image Processing, 11 pp. 77-88, 2002.
Evelyn Brannock, Michael Weeks, Robert Harrison, “Watermarking with Wavelets: Simplicity Leads to Robustness”, Computer Science Department Georgia State University, South eastcon, IEEE, 2018, pp 587 – 592.
N. Chandrakar and J. Baggaa, “Performance Comparison of Digital Image Watermarking Techniques: A Survey”, International Journalof computer Application Technology and Research, vol. 2, issue 2,(2013), pp. 126-130.
Parag Havaldar, Gerard Medioni, “Watermarking Techniques” in Multimedia Systems, Algorithms, Standards, and Industry Practices, Boston, USA, Course Technology, Cengage Learning, 2010, ch.13, sec.2.1, pp. 414-415.
Vinita Gupta, “A Review on Image Watermarking and Its Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering,Volume 4, Issue 1, 2014
Emir Ganic, and Ahmet M. Eskicioglu, “Robust DWT-SVD Domain Image Watermarking: Embedding date in All Frequencies,” CiteSeerX, MM&SEC’04, 2004, pp 20-21.
Chandra Munesh, Pandey Shikha,” A DWT Domain Visible Watermarking Techniques for Digital Images” International Conference on Electronics and Information Engineering (ICEIE), Volume 2,2010,pp-421-427.
Harsh Vikram Singh, Sonam Tyagi, Raghav Agarwal Sandeep Kumar Gangwar, “Digital Watermarking Techniques for Security Applications”, International Conference on Emerging Trends in Electrical, Electronics and Sustainable Energy Systems (ICETEESES) 2016, pp 379-382.
M.M Yeung et al. “Digital Watermarking for High-Quality Imaging”,1997 IEEE First Workshop on Multimedia Signal Processing, J Princeton, New Jersey, 1997, pp 357-362.
Munesh Chandra, Shikha Pandel, Rama Chaudhary, “Digital watermarking technique for protecting digital images” Third IEEE International Conference on Computer and Information Science and Technology (ICCSIT 2010), pp.226-233.
Mei Jiansheng1, Li Sukang1 and Tan Xiaomei “A Digital Watermarking Algorithm Based on DCT and DWT”, International Symposium on Web Information Systems and Applications (WISA) 2009, pp. 104-107.
Harsh Vikram Singh, “Information Hiding Techniques for Image Covers,” LAP LAMBERT Academic Publishing GmbH & Co. KG, Ddudweiler Landstr. 99, 66123 Saarbrücken, Germany, ISBN-10: 3843377537 ISBN-13: 978-3843377539
Harsh Vikram Singh, Raghav Agrawal “Diagnosis of Carious Legions Using Digital Processing of Dental Radiographs” Scopus Indexed Springer Book Series “Computational Vision and Bio Inspired Computing”, pp 864-882, 2018. ( ISBN: 978-3-319-71766-1)
Harsh Vikram Singh, Ankur Rai “Medical Image Watermarking in Transform Domain” Accepted in Scopus Indexed Springer Book Series “Advances in Intelligent Systems and Computing”. April 2018 (ISBN: 978-3-319-45991-2)
Harsh Vikram Singh and Arun Kumar Singh “DCT and DWT based Intellectual Right Protection in Digital Images” Accepted in Scopus Indexed Springer Book Series “Advances in Intelligent Systems and Computing”. May 2018 (ISBN: 978-3-319-45991-2)
Harsh Vikram Singh, Ankur Rai, “Machine Learning Based Robust Watermarking Technique for Medical Image Transmitted over LTE Network”, Journal of Intelligent Systems (JISYS), De Gruyter, Scopus, Vol. 27 (1), pp.105-114 (2018) (ISSN2191-026X)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Singh, H.V., Pal, P. (2019). Robust and Secure Hiding Scheme for Open Channel Transmission of Digital Images. In: Singh, A., Mohan, A. (eds) Handbook of Multimedia Information Security: Techniques and Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-15887-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-15887-3_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15886-6
Online ISBN: 978-3-030-15887-3
eBook Packages: Computer ScienceComputer Science (R0)