Abstract

In this paper, we propose an efficient image watermarking scheme based on combining Singular Value Decomposition (SVD) and Discrete Cosine Transform (DCT) transforms. The main idea consists of exploiting results obtained by the well-known Perona-Malik diffusion applied in image de-noising in watermarking domain by selecting significant blocks to embed a binary logo watermark. After applying the DCT on the selected blocks, the SVD is performed on each of these transformed blocks to modify a few numbers of its U matrix elements according to some defined conditions. Computer simulation and experimental results prove the efficiency of our proposed method against image processing attacks and outperform several previous schemes in terms of imperceptibility and robustness.

Highlights

  • In recent years, the growth of the Internet and the development of powerful computing tools boosted up the digital multimedia e-commerce, which engendered an enormous presence on the web of digital multimedia data, such as audio, image, and video files

  • In the light of the works presented above, we propose in this paper a blind hybrid watermarking technique using the two-dimensional Discrete Cosine Transform (DCT) (2D-DCT) and the Singular Value Decomposition (SVD) transforms

  • In order to evaluate the quality of the watermarked images in terms of watermark imperceptibility in our proposed method, we use the peak signal-to-noise ratio (PSNR) given in (14) [19] as: PSNR

Read more

Summary

INTRODUCTION

The growth of the Internet and the development of powerful computing tools boosted up the digital multimedia e-commerce, which engendered an enormous presence on the web of digital multimedia data, such as audio, image, and video files. The novelty introduced in this paper is to exploit beneficially the well-known anisotropic diffusion technique of Perona-Malik in image watermarking. The proposed method can find its usefulness in many watermarking applications, such as: Ownership Claim, which means that a legal owner can prove his ownership by retrieving the watermark (signature) from its digital content; Copy Control and Fingerprinting where individual watermarks are embedded in each distributed copy of the content This prevents buyers of the content from making illegal copies because they will be identified; Content Authentication permits to ensure the integrity of the watermarked image, which means that it has not been altered by trying to remove the watermark.

The 2D-DCT
The SVD
THE PERONA-MALIK DIFFUSION
THE PROPOSED WATERMARKING ALGORITHM
The Extraction Process
EXPERIMENTAL RESULTS
CONCLUSIONS

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.