Abstract
Abstract In this paper a new technique of dual image watermarking is proposed for protection of ownership rights which utilizes salient properties of homomorphic transform (HT), discrete wavelet transform (DWT), singular value decomposition (SVD) and Arnold transform (AT). In embedding algorithm host image is splitted into reflectance and illumination components using HT, DWT is further applied to the reflectance component resulting in frequency subbands (HL and LH) which are transformed by SVD. Two image watermarks are selected for embedding process whereas security of proposed algorithm is strengthen by performing scrambling of second watermark through AT. Both watermarks are transformed with DWT and SVD. Singular values (SVs) of both transformed watermark are embedded into SVs of host image. Simulation results clearly signifies for high robustness and imperceptibility of proposed algorithm as it is examined under various attacks. Superiority of proposed technique is illustrated by comparing it with other reported methods.
Highlights
With progressive development of communication technologies over the years made accessibility of multimedia data such as audio, text and images in an easy way
In embedding algorithm host image is splitted into reflectance and illumination components using homomorphic transform (HT), discrete wavelet transform (DWT) is further applied to the reflectance component resulting in frequency subbands (HL and LH) which are transformed by singular value decomposition (SVD)
Mean squared error (MSE), peak signal to noise ratio (PSNR), normalized correlation (NC) [51], structural similarity index [52] and weighted PSNR (WPSNR) [53, 54] are the parameters which are employed for evaluating performance of the proposed technique
Summary
With progressive development of communication technologies over the years made accessibility of multimedia data such as audio, text and images in an easy way. Dual image watermarking methodology is proposed in [19] where two watermarks are simultaneously embedded inside a medical host image In this approach host image is decomposed upto IIIrd level DWT, followed by DCT and SVD. Ray et al [31] introduced a watermarking methodology which basically uses Rivest – Shamir – Adleman (RSA) algorithm In this scheme, different frequency subbands of host image are obtained using Ist level DWT whereas SVs of watermark are attained which are further encrypted with help of RSA algorithm. Different frequency subbands of host image are obtained using Ist level DWT whereas SVs of watermark are attained which are further encrypted with help of RSA algorithm These encrypted SVs of watermark image are embedded into SVs of transformed host image.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have