Abstract
In this paper we propose a hybrid image watermarking algorithm which satisfies both imperceptibility and robustness requirements. Our proposed work provide an optimum solution by using singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark. Further to increase and control the strength of the watermark, we use a scale factor. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. Experimental results are provided in terms of peak signal to noise ratio (PSNR), normalized cross correlation (NCC) and gain factor to demonstrate the effectiveness of the proposed algorithm. Image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking.
Highlights
Due to the advancement of digital technologies and rapid communication network deployment, a wide variety of multimedia contents have been digitalized [1][2][3]and their distribution or duplication made easy without any reduction in quality through both authorized and unauthorized distribution channels [4][5]
The discrete wavelet transform (DWT) technique provides better imperceptibility and higher robustness against attacks, at the cost of the DWT compared to discrete cosine transform (DCT) schemes
Each watermark bit is embedded in various frequency bands and the information of the watermark bit is spread throughout large spatial regions
Summary
Due to the advancement of digital technologies and rapid communication network deployment, a wide variety of multimedia contents have been digitalized [1][2][3]and their distribution or duplication made easy without any reduction in quality through both authorized and unauthorized distribution channels [4][5]. To ensure the IDWT and DWT relationship, the orthogonality condition on the filters is used which is given by Equation (3)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have