A Robust Digital Image Watermarking Approach Based on DWT Features and LSB Embedding  
  Authors : Dhiraj Singh Kushwah; Pragyesh Kumar Agrawal

 

With the expansion in the digital media transfer, editing and alteration of an image has become an easy task. But this easiness and independence become a problem when an authorized proprietor loses proprietorship due to duplication of images. Keeping this issue in mind this paper focuses on the development of technique for increasing the robustness of the image against various attacks. A new approach for protecting watermark of the fragile images is presented in this paper. DWT and LSB techniques are utilized efficiently in order to satisfy the requirements. Experiments are performed on standard images under various attacks. The results of research work show that proposed technique is better than previous ones.

 

Published In : IJCAT Journal Volume 3, Issue 11

Date of Publication : November 2016

Pages : 504-509

Figures :04

Tables : 03

 

 

 

Dhiraj Singh Kushwah : has received MCA degree from RGPV, Bhopal in 2006 and M.Phil. degree from Aisect University, Bhopal, in 2014. Presently He is a Ph.D. research scholar at Atal Bihari Vajpayi Hindi University, Bhopal M.P., India. He has published 03 research papers in International Journal. His areas of interest are digital image processing and image watermarking.

Pragyesh Kumar Agrawal : is a gold medalist in M.Sc. Physics and is presently working as the Professor of Physics at the Institute for Excellence in Higher Education (IEHE), Bhopal, M.P., India. He has a teaching experience of over twenty-three years. He has published more than 50 research papers and edited several books. He is at present the Chief Editor of a Journal Yuyuts published by IEHE.

 

 

 

 

 

 

 

Digital Image Watermarking, DWT, LSB, Evaluation Parameters

This research paper is based on the watermarking by utilizing DWT and LSB techniques. It is obtained that DWT has improved image by embedding information in LL part, while LSB makes minor changes in the image as compared to MSB and hence, LSB is more fruitful for embedding. Experiments were performed on standard images and comparison is done on evaluation parameters. It is obtained that proposed work is best for all the parameters in presence of different attacks such as filter and noise. Under ideal conditions, extraction rate is 100 percent on all the images. In future other different transform techniques can be utilized for improving watermarking techniques such as DCT, DFT. One can adopt other features of image for increasing robustness of embedded image like edge, color, corner etc.

 

 

 

 

 

 

 

 

 

[1] S. S. Katariya, “Digital Watermarking: Review,” International Journal of Engineering and Innovative Technology (IJEIT), Vol. 1, No. 2, pp. 143-153, Feb. 2012. [2] D. S. Kushwah and P. K. Agrawal, “A Survey on Features Combination for Image Watermarking,” International Journal of Modern Trends in Engineering and Research, Vol. 02, No. 01, pp. 534-540, Jan. 2015. [3] P. Korus and A. Dziech, “Efficient Method for Content Reconstruction with Self-Embedding,” IEEE Transactions on Image Processing, Vol. 22, No. 3, pp. 1134-1147, Mar. 2013. [4] A. Piper and R. Safavi-Naini, “Scalable Fragile Watermarking for Image Authentication,” In IET Information Security, Vol. 7, No. 4, pp. 300–311, 2013. [5] K. Yamato, M. Hasegawa, Y. Tanaka and S. Kato, “Digital Image Watermarking Method Using Between- Class Variance,” In IEEE International Conference on Image Processing, pp.2185-2188, Sep. 2012. [6] A. Rajpoot , R. Batham and N. Chourasia, “Spatial Domain base Image Watermarking by Edge Features,” International Journal of Current Engineering and Technology, Vol.4, No.5, pp. 3596-3601, Oct. 2014. [7] X. Zhang, S. Wang, Z. Qian and G. Feng, “Reference Sharing Mechanism for Watermark Self-embedding,” In IEEE Trans. Image Processing, Vol. 20, No. 2, pp. 485–495, Feb. 2011. [8] A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, “A Secure and Improved Self-embedding Algorithm to Combat Digital Document Forgery,” Signal Processing, Vol. 89, pp. 2324–2332, Dec. 2009. [9] X. Zhang, Z. Qian, Y. Ren, and G. Feng, “Watermarking with Flexible Self-recovery Quality Based on Compressive Sensing and Compositive Reconstruction,” IEEE Transactions on Information Forensics and Security, Vol. 6, No. 4, pp. 1223–1232, Dec. 2011. [10] I. C. Dragoi and D. Coltuc, “Local-Prediction-Based Difference Expansion Reversible Watermarking,” In IEEE Transactions on Image Processing, Vol. 23, No. 4, pp. 1779-1790, Apr. 2014. [11] M. Luby, “LT codes,” In Proc. of the 43rd Symposium on Foundations of Computer Science, Washington, DC, pp. 271–280, Nov. 2002. [12] L. M. Vargas and E. Vera, “An Implementation of Reversible Watermarking for Still Images,” In IEEE Latin America Transactions, Vol. 11, No. 1, pp. 54-59, Feb. 2013. [13] M. A. Chimanna and S.R. Khot, “Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery,” International Journal of Engineering Research and Applications, Vol. 3, No. 2, pp. 839-844, Mar. - Apr. 2013.