Multimedia Tools and Applications

, Volume 76, Issue 6, pp 8881–8900 | Cite as

Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images



This paper presents a new robust hybrid multiple watermarking technique using fusion of discrete wavelet transforms (DWT), discrete cosine transforms (DCT), and singular value decomposition (SVD) instead of applying DWT, DCT and SVD individually or combination of DWT-SVD / DCT-SVD. For identity authentication purposes, multiple watermarks are embedded into the same medical image / multimedia objects simultaneously, which provides extra level of security with acceptable performance in terms of robustness and imperceptibility. In the embedding process, the cover image is decomposed into first level discrete wavelet transforms where the A (approximation/lower frequency sub-band) is transformed by DCT and SVD. The watermark image is also transformed by DWT, DCT and SVD. The S vector of watermark information is embedded in the S component of the cover image. The watermarked image is generated by inverse SVD on modified S vector and original U, V vectors followed by inverse DCT and inverse DWT. The watermark is extracted using an extraction algorithm. Furthermore, the text watermark is embedding at the second level of the D (diagonal sub-band) of the cover image. The security of the text watermark considered as EPR (Electronic Patient Record) data is enhanced by using encryption method before embedding into the cover. The results are obtained by varying the gain factor, size of the text watermark, and cover medical images. The method has been extensively tested and analyzed against known attacks and is found to be giving superior performance for robustness, capacity and reduced storage and bandwidth requirements compared to reported techniques suggested by other authors.


Image and text watermarking Steganography Discrete wavelet transforms Discrete cosine transforms Singular value decomposition Encryption Robustness Capacity BER 


  1. 1.
    Awasthi M, Lodhi H (2013) Robust image watermarking based on discrete wavelet transform, discrete cosine transform & singular value decomposition. Adv Electron Electr Eng 3(8):971–976Google Scholar
  2. 2.
    Bender W, Gruhl D, Morimoto N, Lou A (1996) Techniques for data hiding. IBM Syst J 35(3&4):313–336CrossRefGoogle Scholar
  3. 3.
    Chellappa R, Theodoridis S (2014) Academic press library in signal processing: signal processing theory and machine learning. 1Google Scholar
  4. 4.
    Craver S (1997) On public-key steganography. In: The Presence of an Active Warden Technical Report RC 20931, IBMGoogle Scholar
  5. 5.
    NHS Executive (2001) Information for Health: An Information Strategy for the Modern NHS 1998–2005. Wetherby: Department of Health Publications; 1998 and NHS Executive. Building the Information Core - Implementing the NHS Plan. London: Department of HealthGoogle Scholar
  6. 6.
    Golshan F, Mohammadi K (2013) A hybrid intelligent SVD-based perceptual shaping of a digital image watermark in DCT and DWT domain. Imaging Sci J 61(1):35–46CrossRefGoogle Scholar
  7. 7.
    Gunjal BL, Mali SN (2012) Applications of digital image watermarking in industries. CSI CommunGoogle Scholar
  8. 8.
    Harish NJ, Kumar SBB, Kusagur A (2013) Hybrid robust watermarking techniques based on DWT, DCT, and SVD. Int J Adv Electr Electron Eng 2(5):137–143Google Scholar
  9. 9.
    Hartung F, Ramme F (2000) Digital rights management and watermarking of multimedia content for m-commerce applications. IEEE Commun Mag 38(11)Google Scholar
  10. 10.
    Horng S-J, Rosiyadi D, Fan P, Wang X, Khan MK (2014) An adaptive watermarking scheme for e-government document images. Multimedia Tools Appl 72(3):3085–3103CrossRefGoogle Scholar
  11. 11.
    Horng S-J, Rosiyadi D, Li T, Takao T, Guo M, Khan MK (2013) A blind image copyright protection scheme for e-government. J Vis Commun Image Represent 24(7):1099–1105CrossRefGoogle Scholar
  12. 12.
    Katzenbeisser S, Petitcolas FAP (2000) Information hiding techniques for steganography and digital watermarking. Artech House, LondonGoogle Scholar
  13. 13.
    Kelkar V, Shaikh H, Mohd. I K (2013) Analysis of robustness of hybrid digital image watermarking technique under various attacks. Int J Comput Sci Mob Comput 2(3):137–143Google Scholar
  14. 14.
    Khan MI, Rahman M, Sarker IH (2013) Digital watermarking for Image authentication based on combined DCT, DWT, and SVD Transformation. Int J Comput Sci Issues 10(5):223–230Google Scholar
  15. 15.
    Lai C-C, Tsai C-C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063CrossRefGoogle Scholar
  16. 16.
    Lin W-H, Horng S-J, Kao T-W, Fan P, Lee C-L, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimedia 10(5):746–757CrossRefGoogle Scholar
  17. 17.
    Lin W-H, Wang Y-R, Horng S-J, Kao T-W, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36(9):11509–11516CrossRefGoogle Scholar
  18. 18.
    Lin W-H, Wang Y-R, Horng S-J (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36(6):9869–9878CrossRefGoogle Scholar
  19. 19.
    Madhesiya S, Ahmed S (2013) Advanced technique of digital watermarking based on SVD-DWT-DCT and Arnold transform. Int J Adv Res Comput Eng Technol 2(5):1918–1923Google Scholar
  20. 20.
    Mallat SG (1989) The theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans Pattern Anal Mach Intell 11(7):693–654CrossRefMATHGoogle Scholar
  21. 21.
    Mohanty SP (1999) Watermarking of digital images. M.S. Thesis, Indian Institute of Science, IndiaGoogle Scholar
  22. 22.
    Navas KA, Cheriyan AM, Lekshmi M, Tampy SA, Sasikumar M (2008) DWT-DCT-SVD based watermarking. Third International conference on Communication Systems Software and Middleware and Workshops, COMSWARE, pp. 271–274Google Scholar
  23. 23.
    Nidhi HD, Jani NN (2012) Image watermarking algorithm using DCT, DWT and SVD. Int J Comput Appl, pp. 13–16Google Scholar
  24. 24.
    Pal K, Ghosh G, Bhattacharya M (2012) Biomedical image watermarking in wavelet domain for data integrity using bit majority algorithm and multiple copies of hidden information. Am J Biomed Eng 2(2):29–37CrossRefGoogle Scholar
  25. 25.
    Rosiyadi D, Horng S-J, Fan P, Wang X (2012) Copyright protection for e-government document images. IEEE MultiMedia 19(3):62–73CrossRefGoogle Scholar
  26. 26.
    Rosiyadi D, Horng S-J, Suryana N, Masthurah N (2012) A comparison between the hybrid using genetic algorithm and the pure hybrid watermarking scheme. Int J Comput Theory Eng (IJCTE) 4(3):329–331CrossRefGoogle Scholar
  27. 27.
    Simmons GJ (1984) The prisoners’ problem and the subliminal channel. In: Advances in Cryptology, Proceedings of CRYPTO 83, Plenum Press, pp. 51–67Google Scholar
  28. 28.
    Singh AK, Dave M, Mohan A. A Hybrid Algorithm for Image Watermarking against Signal Processing Attack. S. Ramanna et al. (Eds.) Proceedings of 7th Multi-Disciplinary International Workshop in Artificial Intelligence, Krabi-Thailand, December 9–11, 2013, Lecture Notes in Computer Science (LNCS) Vol. 8271, pp. 235–246, SpringerGoogle Scholar
  29. 29.
    Singh AK, Dave M, Mohan A (2014) Wavelet based image watermarking: futuristic concepts in information security. Proc Natl Acad Sci India Sect A Phys Sci 84(3):345–359. doi:10.1007/s40010-014-0140-x, Springer CrossRefGoogle Scholar
  30. 30.
    Singh AK, Dave M, Mohan A (2014) Hybrid technique for robust and imperceptible image watermarking in DWT- DCT-SVD domain. Natl Acad Sci Lett 37(4):351–358CrossRefGoogle Scholar
  31. 31.
    Singh AK, Dave M, Mohan A (2015) Hybrid technique for robust and imperceptible multiple watermarking using medical images. J Multimedia Tools Appl. doi:10.1007/s11042-015-2754-7 Google Scholar
  32. 32.
    Singh AK, Dave M, Mohan A (2015) Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wirel Pers Commun Int J 83(3):2133–2150CrossRefGoogle Scholar
  33. 33.
    Singh A, Tayal A (2012) Choice of wavelet from wavelet families for DWT-DCT-SVD image watermarking. Int J Comput Appl 48(17):9–14Google Scholar
  34. 34.
    Srivastava A, Saxena P (2013) DWT-DCT-SVD based semiblind image watermarking using middle frequency band. IOSR J Comput Eng 12(2):63–66CrossRefGoogle Scholar
  35. 35.
    Terzija N, Repges M, Luck K, Geisselhardt W (2002) Digital image watermarking using DWT: performance comparision on error correcting codes. Vis Imaging Image Process Proc (364)Google Scholar
  36. 36.
    Wang B, Ding J, Wen Q, Liao X, Liu C (2009) An image watermarking algorithm based on DWT DCT and SVD. IEEE International Conference on Network Infrastructure and Digital Content, Beijing, pp. 1034–1038Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Department of Computer Science & EngineeringJaypee University of Information Technology WaknaghatSolanIndia

Personalised recommendations