Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29644


Select areas to restrict search in scientific publication database:
10006131
An Additive Watermarking Technique in Gray Scale Images Using Discrete Wavelet Transformation and Its Analysis on Watermark Strength
Abstract:
Digital Watermarking is a procedure to prevent the unauthorized access and modification of personal data. It assures that the communication between two parties remains secure and their communication should be undetected. This paper investigates the consequence of the watermark strength of the grayscale image using a Discrete Wavelet Transformation (DWT) additive technique. In this method, the gray scale host image is divided into four sub bands: LL (Low-Low), HL (High-Low), LH (Low-High), HH (High-High) and the watermark is inserted in an LL sub band using DWT technique. As the image is divided into four sub bands, a watermark of equal size of the LL sub band has been inserted and the results are discussed. LL represents the average component of the host image which contains the maximum information of the image. Two kinds of experiments are performed. In the first, the same watermark is embedded in different images and in the later on the strength of the watermark varies by a factor of s i.e. (s=10, 20, 30, 40, 50) and it is inserted in the same image.
Digital Object Identifier (DOI):

References:

[1] Rama Kishore, Sunesh (2015). Digital Watermarking Based on Visual Cryptography and Histogram International Journal of Computer, Electrical, Automation, Control and Information Engineering, World Academy of Science, Engineering and Technology, Vol:10, No:7,
[2] Hussain, M., & Hussain, M. (2013). A Survey of Image Steganography Techniques, 54, 113–124.
[3] Rao, S. S. (2003). Copyright: its implications for electronic information. Online Information Review, 27(4), 264–275. http://doi.org/10.1108/14684520310489050
[4] Nyeem, H., Boles, W., & Boyd, C. (2014). Digital image watermarking: its formal model, fundamental properties and possible attacks.
[5] Singh, S. (2016). A Robust Deinterlacing Multiple Image Watermarking Technique in DWT, 261–266.
[6] Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752. http://doi.org/10.1016/j.sigpro.2009.08.010
[7] Muhammad, K., Sajjad, M., Mehmood, I., Rho, S., & Baik, S. W. (2015). A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications. http://doi.org/10.1007/s11042-015-2671-9
[8] Malekmohamadi, H., & Ghaemmaghami, S. (2009). Steganalysis of LSB based image steganography using spatial and frequency domain features. 2009 IEEE International Conference on Multimedia and Expo, 1744–1747. http://doi.org/10.1109/ICME.2009.5202858
[9] Jia-Fa, M., Xin-Xin, N., Gang, X., Wei-Guo, S., & Na-Na, Z. (2015). A steganalysis method in the DCT domain. Multimedia Tools and Applications, (180). http://doi.org/10.1007/s11042-015-2708-0
[10] Karri, S., & Sur, A. (2014). Steganographic algorithm based on randomization of DCT kernel. Multimedia Tools and Applications, 74(21), 9207–9230. http://doi.org/10.1007/s11042-014-2077-0
[11] Chen, P., & Lin, H. (2006). A DWT Based Approach for Image Steganography, (4), 275–290.
[12] Atawneh, S., & Sumari, P. (2013). Hybrid and blind steganographic method for digital images based on DWT and chaotic map. Journal of Communications, 8(11), 690–699. http://doi.org/10.12720/jcm.8.11.690-699
[13] Singh, S. (2016). Region Based Undetectable Multiple Image Watermarking Technique in DWT, 267–270.
[14] Jia-Fa, M., Xin-Xin, N., Gang, X., Wei-Guo, S., & Na-Na, Z. (2015). A steganalysis method in the DCT domain. Multimedia Tools and Applications, (180). http://doi.org/10.1007/s11042-015-2708-0
[15] Chen, P., & Lin, H. (2006). A DWT Based Approach for Image Steganography, (4), 275–290.
[16] Babakalak, S. R., Balafar, M. A., & Farzan, A. (n.d.). A new DWT-SVD based robust watermarking scheme for real property rights, 4274, 69–78.
[17] MS raval and PP Rege. "Discrete wavelet transform based multiple watermarking scheme",in the procedding of IEEE conference on convergent technologies for the Asia-Pacific Region.In tencon.vol.3,pp.935-938,2003
[18] Ranjan Kumar Arya. Shalu singh. and Ravi Saharan, "A secure Non-blind block based digital Image Watermarking technique using DWT and DCT" In the Proceeding of IEEE. Advances in computing communication and informatics (ICACCI),pp. 2042-2048.2015
[19] B.Sridhar, DR. C. Arun, "On secure multiple image watermarking technique using DWT", IEEE Third national conference on computing Communication & networking technologies (ICCENT),2012
[20] Joshi, K. (2016). PSNR and MSE Based Investigation of LSB, IEEE Third national conference on computing Communication & networking technologies (ICCENT),2012178–183.
Vol:13 No:05 2019Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007