With the expansion in the digital media transfer,
editing and alteration of an image has become an easy task.
But this easiness and independence become a problem when
an authorized proprietor loses proprietorship due to
duplication of images. Keeping this issue in mind this paper
focuses on the development of technique for increasing the
robustness of the image against various attacks. A new
approach for protecting watermark of the fragile images is
presented in this paper. DWT and LSB techniques are
utilized efficiently in order to satisfy the requirements.
Experiments are performed on standard images under
various attacks. The results of research work show that
proposed technique is better than previous ones.
Published In:IJCAT Journal Volume 3, Issue 11
Date of Publication : November 2016
Pages : 504-509
Figures :04
Tables : 03
Dhiraj Singh Kushwah : has received MCA degree from RGPV,
Bhopal in 2006 and M.Phil. degree from Aisect University, Bhopal,
in 2014. Presently He is a Ph.D. research scholar at Atal Bihari
Vajpayi Hindi University, Bhopal M.P., India. He has published 03
research papers in International Journal. His areas of interest are
digital image processing and image watermarking.
Pragyesh Kumar Agrawal : is a gold medalist in M.Sc.
Physics and is presently working as the Professor of Physics at
the Institute for Excellence in Higher Education (IEHE), Bhopal,
M.P., India. He has a teaching experience of over twenty-three
years. He has published more than 50 research papers and edited
several books. He is at present the Chief Editor of a Journal
Yuyuts published by IEHE.
Digital Image Watermarking, DWT, LSB,
Evaluation Parameters
This research paper is based on the watermarking by
utilizing DWT and LSB techniques. It is obtained that
DWT has improved image by embedding information in
LL part, while LSB makes minor changes in the image as
compared to MSB and hence, LSB is more fruitful for
embedding. Experiments were performed on standard
images and comparison is done on evaluation parameters.
It is obtained that proposed work is best for all the
parameters in presence of different attacks such as filter and noise. Under ideal conditions, extraction rate is 100
percent on all the images. In future other different
transform techniques can be utilized for improving
watermarking techniques such as DCT, DFT. One can
adopt other features of image for increasing robustness of
embedded image like edge, color, corner etc.
[1] S. S. Katariya, “Digital Watermarking: Review,”
International Journal of Engineering and Innovative
Technology (IJEIT), Vol. 1, No. 2, pp. 143-153, Feb.
2012.
[2] D. S. Kushwah and P. K. Agrawal, “A Survey on
Features Combination for Image Watermarking,”
International Journal of Modern Trends in Engineering
and Research, Vol. 02, No. 01, pp. 534-540, Jan. 2015.
[3] P. Korus and A. Dziech, “Efficient Method for Content
Reconstruction with Self-Embedding,” IEEE
Transactions on Image Processing, Vol. 22, No. 3, pp.
1134-1147, Mar. 2013.
[4] A. Piper and R. Safavi-Naini, “Scalable Fragile
Watermarking for Image Authentication,” In IET
Information Security, Vol. 7, No. 4, pp. 300–311,
2013.
[5] K. Yamato, M. Hasegawa, Y. Tanaka and S. Kato,
“Digital Image Watermarking Method Using Between-
Class Variance,” In IEEE International Conference on
Image Processing, pp.2185-2188, Sep. 2012.
[6] A. Rajpoot , R. Batham and N. Chourasia, “Spatial
Domain base Image Watermarking by Edge Features,”
International Journal of Current Engineering and
Technology, Vol.4, No.5, pp. 3596-3601, Oct. 2014.
[7] X. Zhang, S. Wang, Z. Qian and G. Feng, “Reference
Sharing Mechanism for Watermark Self-embedding,”
In IEEE Trans. Image Processing, Vol. 20, No. 2, pp.
485–495, Feb. 2011.
[8] A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt,
“A Secure and Improved Self-embedding Algorithm to
Combat Digital Document Forgery,” Signal
Processing, Vol. 89, pp. 2324–2332, Dec. 2009.
[9] X. Zhang, Z. Qian, Y. Ren, and G. Feng,
“Watermarking with Flexible Self-recovery Quality
Based on Compressive Sensing and Compositive
Reconstruction,” IEEE Transactions on Information
Forensics and Security, Vol. 6, No. 4, pp. 1223–1232,
Dec. 2011.
[10] I. C. Dragoi and D. Coltuc, “Local-Prediction-Based
Difference Expansion Reversible Watermarking,” In
IEEE Transactions on Image Processing, Vol. 23, No.
4, pp. 1779-1790, Apr. 2014.
[11] M. Luby, “LT codes,” In Proc. of the 43rd Symposium
on Foundations of Computer Science, Washington,
DC, pp. 271–280, Nov. 2002.
[12] L. M. Vargas and E. Vera, “An Implementation of
Reversible Watermarking for Still Images,” In IEEE
Latin America Transactions, Vol. 11, No. 1, pp. 54-59,
Feb. 2013.
[13] M. A. Chimanna and S.R. Khot, “Digital Video
Watermarking Techniques for Secure Multimedia
Creation and Delivery,” International Journal of
Engineering Research and Applications, Vol. 3, No. 2,
pp. 839-844, Mar. - Apr. 2013.