Skip to main content

Robust and Secure Hiding Scheme for Open Channel Transmission of Digital Images

  • Chapter
  • First Online:
Handbook of Multimedia Information Security: Techniques and Applications
  • 1250 Accesses

Abstract

Data protection in transmitting online message is a prime concern in present scenario. Preventing the illegal copying and protect the secret data is important. For this information hiding scheme and Data encryption techniques are major tools and several techniques developed for data protection. In this work, DWT and SVD Image watermarking Algorithm has been proposed in which transform is applied to watermarked image to ensure the robustness of Watermark against attacks. The proposed algorithm offer a minimum distortion against various attacks like Crop Attack, Rotation Attack, Mean Attack, Median Attacks, Salt and Pepper Attack, Shear Attack. The significant advantages can be obtained by the new techniques that are DWT-SVD watermarking Techniques to the digital watermarking field and provides benefits to the copyright protection and Data security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mei Jiansheng1, Li Sukang1 and Tan Xiaomei “A Digital Watermarking Algorithm Based on DCT and DWT”, International Symposium on Web Information Systems and Applications (WISA) 2009, pp. 104-107.

    Google Scholar 

  2. W. Zeng and B Liu, “On Resolving Rightful Ownership of Digital Images by Invisible Watermarks”, Proc. IEEE 1997 Intrenational Conference on Image Processing, ICIP-97, Vol. 1, pp 552-555.

    Google Scholar 

  3. Chandra Munesh, Pandey Shikha,” A DWT Domain Visible Watermarking Techniques for Digital Images” International Conference on Electronics and Information Engineering (ICEIE), Volume 2,2010,pp-421-427.

    Google Scholar 

  4. Asna Furqan, Munish Kumar, “Study and Analysis of Robust DWT-SVD Domain Based Digital Image Watermarking Technique Using MATLAB”, IEEE International Conference on Computational Intelligence & Communication Technology, 2015 pp 638-644.

    Google Scholar 

  5. Saira Mudassar, Munazah Jamal, Farkhand Shakeel Mahmood, Nouman Shah, Hamza Bin Tahir, Hassan Malik, “Hybrid DWT-SVD Digital Image Watermarking”, International Journal of Computer (IJC), 2017, pp 105-109

    Google Scholar 

  6. Xueyi Ye, Xueting Chen, Meng Deng, Shuyun Hui, Yunlu Wang, “A Multiple-Level DCT Based Robust DWT-SVD Watermark Method”,10th International Conference on Computational Intelligence and Security, IEEE, 2014, pp 479-483.

    Google Scholar 

  7. Neha Chauhan, Akhilesh A. Waoo and P. S. Patheja, “information hiding watermarking detection technique by psnr and rgb intensity”, Journal of Global Research in Computer Science, Volume 3, No. 9, September 2012 PP 18-22.

    Google Scholar 

  8. Wang Y., Doherty J.F., Dyck V.R.E., “A wavelet-based watermarking algorithm for ownership verification of digital images”, IEEE Transactions, Image Processing, 11 pp. 77-88, 2002.

    Article  Google Scholar 

  9. Evelyn Brannock, Michael Weeks, Robert Harrison, “Watermarking with Wavelets: Simplicity Leads to Robustness”, Computer Science Department Georgia State University, South eastcon, IEEE, 2018, pp 587 – 592.

    Google Scholar 

  10. N. Chandrakar and J. Baggaa, “Performance Comparison of Digital Image Watermarking Techniques: A Survey”, International Journalof computer Application Technology and Research, vol. 2, issue 2,(2013), pp. 126-130.

    Article  Google Scholar 

  11. Parag Havaldar, Gerard Medioni, “Watermarking Techniques” in Multimedia Systems, Algorithms, Standards, and Industry Practices, Boston, USA, Course Technology, Cengage Learning, 2010, ch.13, sec.2.1, pp. 414-415.

    Google Scholar 

  12. Vinita Gupta, “A Review on Image Watermarking and Its Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering,Volume 4, Issue 1, 2014

    Google Scholar 

  13. Emir Ganic, and Ahmet M. Eskicioglu, “Robust DWT-SVD Domain Image Watermarking: Embedding date in All Frequencies,” CiteSeerX, MM&SEC’04, 2004, pp 20-21.

    Google Scholar 

  14. Chandra Munesh, Pandey Shikha,” A DWT Domain Visible Watermarking Techniques for Digital Images” International Conference on Electronics and Information Engineering (ICEIE), Volume 2,2010,pp-421-427.

    Google Scholar 

  15. Harsh Vikram Singh, Sonam Tyagi, Raghav Agarwal Sandeep Kumar Gangwar, “Digital Watermarking Techniques for Security Applications”, International Conference on Emerging Trends in Electrical, Electronics and Sustainable Energy Systems (ICETEESES) 2016, pp 379-382.

    Google Scholar 

  16. M.M Yeung et al. “Digital Watermarking for High-Quality Imaging”,1997 IEEE First Workshop on Multimedia Signal Processing, J Princeton, New Jersey, 1997, pp 357-362.

    Google Scholar 

  17. Munesh Chandra, Shikha Pandel, Rama Chaudhary, “Digital watermarking technique for protecting digital images” Third IEEE International Conference on Computer and Information Science and Technology (ICCSIT 2010), pp.226-233.

    Google Scholar 

  18. Mei Jiansheng1, Li Sukang1 and Tan Xiaomei “A Digital Watermarking Algorithm Based on DCT and DWT”, International Symposium on Web Information Systems and Applications (WISA) 2009, pp. 104-107.

    Google Scholar 

  19. Harsh Vikram Singh, “Information Hiding Techniques for Image Covers,” LAP LAMBERT Academic Publishing GmbH & Co. KG, Ddudweiler Landstr. 99, 66123 Saarbrücken, Germany, ISBN-10: 3843377537 ISBN-13: 978-3843377539

    Google Scholar 

  20. Harsh Vikram Singh, Raghav Agrawal “Diagnosis of Carious Legions Using Digital Processing of Dental Radiographs” Scopus Indexed Springer Book Series “Computational Vision and Bio Inspired Computing”, pp 864-882, 2018. ( ISBN: 978-3-319-71766-1)

    Google Scholar 

  21. Harsh Vikram Singh, Ankur Rai “Medical Image Watermarking in Transform Domain” Accepted in Scopus Indexed Springer Book Series “Advances in Intelligent Systems and Computing”. April 2018 (ISBN: 978-3-319-45991-2)

    Google Scholar 

  22. Harsh Vikram Singh and Arun Kumar Singh “DCT and DWT based Intellectual Right Protection in Digital Images” Accepted in Scopus Indexed Springer Book Series “Advances in Intelligent Systems and Computing”. May 2018 (ISBN: 978-3-319-45991-2)

    Google Scholar 

  23. Harsh Vikram Singh, Ankur Rai, “Machine Learning Based Robust Watermarking Technique for Medical Image Transmitted over LTE Network”, Journal of Intelligent Systems (JISYS), De Gruyter, Scopus, Vol. 27 (1), pp.105-114 (2018) (ISSN2191-026X)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Singh, H.V., Pal, P. (2019). Robust and Secure Hiding Scheme for Open Channel Transmission of Digital Images. In: Singh, A., Mohan, A. (eds) Handbook of Multimedia Information Security: Techniques and Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-15887-3_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15887-3_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15886-6

  • Online ISBN: 978-3-030-15887-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics