Abstract
Buyer-Seller watermarking protocol (BSWT) is used to preserve the rights for the buyer and the seller. Frequency domain watermarking embedding that is DCT and DWT can affect the robustness and imperceptibility of watermarking algorithm. This paper studies the comparison of both domain which is DCT and DWT and concludes which one is better on the bases of some parameters. Digital watermarking is a key technology to embed information as unperceivable signals in digital contents. Buyer-seller watermarking protocols based on Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) integrate digital watermarking algorithm and cryptography techniques for copyright protection. In this paper we have shown the comparison of these two, buyer-seller watermarking protocol based on Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). These two protocols use Public Key Infrastructure (PKI), arbitrator and watermarking certificate authority (WCA) for better security. This paper shows results of watermark image quality based on peak signal-to-noise ratio (PSNR) mean square error (MSE) and similarity factor (SF).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Shih, F., Wu, Y.-T.: Information Hiding by Digital Watermarking. Information Hiding and Applications (2009)
I Hartung, F., Kuter, M.: Multimedia Watermarking Techniques. Proceeding of the IEEE (1999)
Mintzer, F., Braudaway, G.W.: If one watermark is good, are more better. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1999), Phoenix, Ariz, USA (1999)
Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing (1997)
Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing (2001)
Wang, F.-H., Pan, J.-S., Jain, L.: Intelligent Techniques, Innovations in Digital Watermarking Techniques. Studies in Computational Intelligence. Springer, Heidelberg (2009)
Vetterli, M.A.K.: Wavelets and Subband Coding. Prentice Hall (1995)
S. J. a. N. B. Hingoliwala H.A.: An image comperession by using haar wavelet transform. Advances in Computer Vision and Information Technology (2008)
Kumar, A., Tyagi, V., Ansari, M.D., Kumar, K.: A Practical Buyer-Seller Watermarking Protocol based on Discrete Wavelet Transform. International Journal of Computer Applications (2011)
Choi, J.-G., Sakurai, K., Park, J.-H.: Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 265–279. Springer, Heidelberg (2003)
Memon, N.D., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Transactions on Image Processing (2001)
Ju, H.S., Kim, H.-J., Lee, D.-H., Lim, J.-I.: An anonymous buyer-seller watermarking protocol with anonymity control. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 421–432. Springer, Heidelberg (2003)
Lei, C.-L., Yu, P.-L., Tsai, P.-L., Chan, M.-H.: An efficient and anonymous buyer-seller watermarking protocol. Transactions on Image Processing (2004)
Zhang, J., Kou, W., Fan, K.: Secure buyer-seller watermarking protocol. IEE Proceedings Information Security (2006)
Qiao, L., Nahrstedlt, K.: Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer’s Right. Journal of Visual Communication and Image Representation (1998)
Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of ACM (1978)
Kutter, M., Bhattacharjee, S.K., Ebrahimi, T.: Towards Second Generation Watermarking Scheme Image Processing (1999)
Kumar, A., Ansari, M.D., Ali, J., Kumar, K.: A New Buyer-Seller Watermarking Protocol with Discrete Cosine Transform. In: Das, V.V., Stephen, J., Chaba, Y. (eds.) CNC 2011. CCIS, vol. 142, pp. 468–471. Springer, Heidelberg (2011)
Shieh, C.-S., Huang, H.-C., Wang, F.-H., et al.: Genetic watermarking based on transform-domain techniques. Pattern Recognition (2004)
Promcharoen, S., Rangsanseri, Y.: Genetic Watermarking with Block-Based DCT Clustering
Deng, M., Weng, L., Preneel, B.: Anonymous buyer-seller watermarking protocol with additive homomorphism. In: Proc. of International Conference on Signal Processing and Multimedia Applications (2008)
Hameed, K., Mumtaz, A., et al.: Digital Image Watermarking in the Wavelet Transform Domain. World Academy of Science, Engineering and Technology 13 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Kumar, A., Ghrera, S.P., Tyagi, V. (2015). A Comparison of Buyer-Seller Watermarking Protocol (BSWP) Based on Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). In: Satapathy, S., Govardhan, A., Raju, K., Mandal, J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1. Advances in Intelligent Systems and Computing, vol 337. Springer, Cham. https://doi.org/10.1007/978-3-319-13728-5_45
Download citation
DOI: https://doi.org/10.1007/978-3-319-13728-5_45
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13727-8
Online ISBN: 978-3-319-13728-5
eBook Packages: EngineeringEngineering (R0)