Skip to main content

Digital Image Watermarking Using (2, 2) Visual Cryptography with DWT-SVD Based Watermarking

  • Conference paper
  • First Online:
Computational Intelligence in Data Mining

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 711))

Abstract

It has become earnest necessity to protect the digital multimedia content for the possessors of the documents and service providers. Watermarking is such a technique which helps us to attain copyright protection. The concerned literature includes various methods which help to embed information into various multimedia elements like images, audio, and video. In the given paper, we have reviewed DWT-SVD watermarking technique for image watermarking. We have projected a new algorithm for image watermarking using visual cryptography that generates two shares with DWT-SVD. The scheme is highly protected and vital to the image processing assault. The following material also gives an insight into implementation of the contained algorithm step-by-step and shows the future prospects.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. V. M. Potdar, S. Han and E. Chang, “A survey of digital image watermarking techniques,” INDIN ‘05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005, pp. 709–716.

    Google Scholar 

  2. H. Wei, M. Yuan, J. Zhao and Z. Kou, “Research and realization of digital watermark for picture protecting,” 2009 IEEE First International Workshop on Education Technology and Computer Science (ETCS’09), China, vol. 1, 2009, pp. 968–970.

    Google Scholar 

  3. S. Chhabra and A. K. Singh, “Dynamic data leakage detection model based approach for MapReduce computational security in cloud,” 2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS), Bhopal, 2016, pp. 13–19.

    Google Scholar 

  4. H. Taneja, Kapil and A. K. Singh, “Preserving Privacy of Patients based on Reidentification Risk,” Fourth International Conference on Eco-friendly Computing and Communication Systems (ICECCS), 2015, pp. 448–454.

    Article  Google Scholar 

  5. J. Kumar and A. K. Singh, “Dynamic resource scaling in cloud using neural network and black hole algorithm,” 2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS), Bhopal, 2016, pp. 63–67.

    Google Scholar 

  6. C. I. Podilchuk and E. J. Delp, “Digital watermarking: algorithms and applications,” IEEE Signal Processing Magazine, vol. 18, no. 4, July 2001, pp. 33–46.

    Article  Google Scholar 

  7. J. Kapur and A. J. Baregar, “Security using image processing.” International Journal of Managing Information Technology (IJMIT), vol. 5, no. 2, pp. 13–21, May 2013.

    Article  Google Scholar 

  8. P. Singh and R. S. Chadha, “A survey of digital watermarking techniques, applications and attacks,” International Journal of Engineering and Innovative Technology (IJEIT), vol. 2, no. 9, pp. 165–175, March 2013.

    Google Scholar 

  9. Ma Bin, “Experimental research of image digital watermark based on DWT technology,” IEEE International conference on Uncertainty Reasoning and Knowledge Engineering (URKE), Bali, vol. 2, 2011, pp. 9–12.

    Google Scholar 

  10. Y. Qianli and C. Yanhong, “A digital image watermarking algorithm based on discrete wavelet transform and Discrete Cosine Transform,” 2012 IEEE International Symposium on Information Technology in Medicine and Education (ITME), Japan, vol. 2, 2012, pp. 1102–1105.

    Google Scholar 

  11. M. Thapa, Dr. S. K. Sood and A. P. M. Sharma, “Digital image watermarking techniques based on different attacks,” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 2, no. 4, pp. 14–19, 2011.

    Google Scholar 

  12. N. Divecha and Dr. N. N. Jani, “Implementation and performance analysis of DCT-DWT-SVD based watermarking algorithms for color images,” Proceeding in 2013 IEEE International Conference on Intelligent Systems and Signal Processing (ISSP), 2013, pp. 204–208.

    Google Scholar 

  13. D. V. S. Chandra, “Digital image watermarking using Singular Value Decomposition,” Proceeding of 45th IEEE symposium on circuits and systems, vol. 3, pp. 264–267, 2002.

    Google Scholar 

  14. E. Ganic and A. M. Eskicioglu, “Robust DWT-SVD domain image watermarking: embedding data in all frequencies,” Proceedings of the 2004 ACM Workshop on Multimedia and Security, Sept. 2004, pp. 166–174.

    Google Scholar 

  15. C. C. Lai and C. C. Tsai, “Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition,” in IEEE Transactions on Instrumentation and Measurement, vol. 59, no. 11, pp. 3060–3063, Nov. 2010.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kamal Nayan Kaur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kaur, K.N., Divya, Gupta, I., Singh, A.K. (2019). Digital Image Watermarking Using (2, 2) Visual Cryptography with DWT-SVD Based Watermarking. In: Behera, H., Nayak, J., Naik, B., Abraham, A. (eds) Computational Intelligence in Data Mining. Advances in Intelligent Systems and Computing, vol 711. Springer, Singapore. https://doi.org/10.1007/978-981-10-8055-5_8

Download citation

Publish with us

Policies and ethics