Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 337))

Abstract

Buyer-Seller watermarking protocol (BSWT) is used to preserve the rights for the buyer and the seller. Frequency domain watermarking embedding that is DCT and DWT can affect the robustness and imperceptibility of watermarking algorithm. This paper studies the comparison of both domain which is DCT and DWT and concludes which one is better on the bases of some parameters. Digital watermarking is a key technology to embed information as unperceivable signals in digital contents. Buyer-seller watermarking protocols based on Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) integrate digital watermarking algorithm and cryptography techniques for copyright protection. In this paper we have shown the comparison of these two, buyer-seller watermarking protocol based on Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). These two protocols use Public Key Infrastructure (PKI), arbitrator and watermarking certificate authority (WCA) for better security. This paper shows results of watermark image quality based on peak signal-to-noise ratio (PSNR) mean square error (MSE) and similarity factor (SF).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shih, F., Wu, Y.-T.: Information Hiding by Digital Watermarking. Information Hiding and Applications (2009)

    Google Scholar 

  2. I Hartung, F., Kuter, M.: Multimedia Watermarking Techniques. Proceeding of the IEEE (1999)

    Google Scholar 

  3. Mintzer, F., Braudaway, G.W.: If one watermark is good, are more better. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1999), Phoenix, Ariz, USA (1999)

    Google Scholar 

  4. Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing (1997)

    Google Scholar 

  5. Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing (2001)

    Google Scholar 

  6. Wang, F.-H., Pan, J.-S., Jain, L.: Intelligent Techniques, Innovations in Digital Watermarking Techniques. Studies in Computational Intelligence. Springer, Heidelberg (2009)

    Google Scholar 

  7. Vetterli, M.A.K.: Wavelets and Subband Coding. Prentice Hall (1995)

    Google Scholar 

  8. S. J. a. N. B. Hingoliwala H.A.: An image comperession by using haar wavelet transform. Advances in Computer Vision and Information Technology (2008)

    Google Scholar 

  9. Kumar, A., Tyagi, V., Ansari, M.D., Kumar, K.: A Practical Buyer-Seller Watermarking Protocol based on Discrete Wavelet Transform. International Journal of Computer Applications (2011)

    Google Scholar 

  10. Choi, J.-G., Sakurai, K., Park, J.-H.: Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 265–279. Springer, Heidelberg (2003)

    Google Scholar 

  11. Memon, N.D., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Transactions on Image Processing (2001)

    Google Scholar 

  12. Ju, H.S., Kim, H.-J., Lee, D.-H., Lim, J.-I.: An anonymous buyer-seller watermarking protocol with anonymity control. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 421–432. Springer, Heidelberg (2003)

    Google Scholar 

  13. Lei, C.-L., Yu, P.-L., Tsai, P.-L., Chan, M.-H.: An efficient and anonymous buyer-seller watermarking protocol. Transactions on Image Processing (2004)

    Google Scholar 

  14. Zhang, J., Kou, W., Fan, K.: Secure buyer-seller watermarking protocol. IEE Proceedings Information Security (2006)

    Google Scholar 

  15. Qiao, L., Nahrstedlt, K.: Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer’s Right. Journal of Visual Communication and Image Representation (1998)

    Google Scholar 

  16. Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of ACM (1978)

    Google Scholar 

  17. Kutter, M., Bhattacharjee, S.K., Ebrahimi, T.: Towards Second Generation Watermarking Scheme Image Processing (1999)

    Google Scholar 

  18. Kumar, A., Ansari, M.D., Ali, J., Kumar, K.: A New Buyer-Seller Watermarking Protocol with Discrete Cosine Transform. In: Das, V.V., Stephen, J., Chaba, Y. (eds.) CNC 2011. CCIS, vol. 142, pp. 468–471. Springer, Heidelberg (2011)

    Google Scholar 

  19. Shieh, C.-S., Huang, H.-C., Wang, F.-H., et al.: Genetic watermarking based on transform-domain techniques. Pattern Recognition (2004)

    Google Scholar 

  20. Promcharoen, S., Rangsanseri, Y.: Genetic Watermarking with Block-Based DCT Clustering

    Google Scholar 

  21. Deng, M., Weng, L., Preneel, B.: Anonymous buyer-seller watermarking protocol with additive homomorphism. In: Proc. of International Conference on Signal Processing and Multimedia Applications (2008)

    Google Scholar 

  22. Hameed, K., Mumtaz, A., et al.: Digital Image Watermarking in the Wavelet Transform Domain. World Academy of Science, Engineering and Technology 13 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashwani Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kumar, A., Ghrera, S.P., Tyagi, V. (2015). A Comparison of Buyer-Seller Watermarking Protocol (BSWP) Based on Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). In: Satapathy, S., Govardhan, A., Raju, K., Mandal, J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1. Advances in Intelligent Systems and Computing, vol 337. Springer, Cham. https://doi.org/10.1007/978-3-319-13728-5_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13728-5_45

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13727-8

  • Online ISBN: 978-3-319-13728-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics