Advertisement

Robust and Secure Hiding Scheme for Open Channel Transmission of Digital Images

  • Harsh Vikram Singh
  • Purnima Pal
Chapter

Abstract

Data protection in transmitting online message is a prime concern in present scenario. Preventing the illegal copying and protect the secret data is important. For this information hiding scheme and Data encryption techniques are major tools and several techniques developed for data protection. In this work, DWT and SVD Image watermarking Algorithm has been proposed in which transform is applied to watermarked image to ensure the robustness of Watermark against attacks. The proposed algorithm offer a minimum distortion against various attacks like Crop Attack, Rotation Attack, Mean Attack, Median Attacks, Salt and Pepper Attack, Shear Attack. The significant advantages can be obtained by the new techniques that are DWT-SVD watermarking Techniques to the digital watermarking field and provides benefits to the copyright protection and Data security.

References

  1. 1.
    Mei Jiansheng1, Li Sukang1 and Tan Xiaomei “A Digital Watermarking Algorithm Based on DCT and DWT”, International Symposium on Web Information Systems and Applications (WISA) 2009, pp. 104-107.Google Scholar
  2. 2.
    W. Zeng and B Liu, “On Resolving Rightful Ownership of Digital Images by Invisible Watermarks”, Proc. IEEE 1997 Intrenational Conference on Image Processing, ICIP-97, Vol. 1, pp 552-555.Google Scholar
  3. 3.
    Chandra Munesh, Pandey Shikha,” A DWT Domain Visible Watermarking Techniques for Digital Images” International Conference on Electronics and Information Engineering (ICEIE), Volume 2,2010,pp-421-427.Google Scholar
  4. 4.
    Asna Furqan, Munish Kumar, “Study and Analysis of Robust DWT-SVD Domain Based Digital Image Watermarking Technique Using MATLAB”, IEEE International Conference on Computational Intelligence & Communication Technology, 2015 pp 638-644.Google Scholar
  5. 5.
    Saira Mudassar, Munazah Jamal, Farkhand Shakeel Mahmood, Nouman Shah, Hamza Bin Tahir, Hassan Malik, “Hybrid DWT-SVD Digital Image Watermarking”, International Journal of Computer (IJC), 2017, pp 105-109Google Scholar
  6. 6.
    Xueyi Ye, Xueting Chen, Meng Deng, Shuyun Hui, Yunlu Wang, “A Multiple-Level DCT Based Robust DWT-SVD Watermark Method”,10th International Conference on Computational Intelligence and Security, IEEE, 2014, pp 479-483.Google Scholar
  7. 7.
    Neha Chauhan, Akhilesh A. Waoo and P. S. Patheja, “information hiding watermarking detection technique by psnr and rgb intensity”, Journal of Global Research in Computer Science, Volume 3, No. 9, September 2012 PP 18-22.Google Scholar
  8. 8.
    Wang Y., Doherty J.F., Dyck V.R.E., “A wavelet-based watermarking algorithm for ownership verification of digital images”, IEEE Transactions, Image Processing, 11 pp. 77-88, 2002.CrossRefGoogle Scholar
  9. 9.
    Evelyn Brannock, Michael Weeks, Robert Harrison, “Watermarking with Wavelets: Simplicity Leads to Robustness”, Computer Science Department Georgia State University, South eastcon, IEEE, 2018, pp 587 – 592.Google Scholar
  10. 10.
    N. Chandrakar and J. Baggaa, “Performance Comparison of Digital Image Watermarking Techniques: A Survey”, International Journalof computer Application Technology and Research, vol. 2, issue 2,(2013), pp. 126-130.CrossRefGoogle Scholar
  11. 11.
    Parag Havaldar, Gerard Medioni, “Watermarking Techniques” in Multimedia Systems, Algorithms, Standards, and Industry Practices, Boston, USA, Course Technology, Cengage Learning, 2010, ch.13, sec.2.1, pp. 414-415.Google Scholar
  12. 12.
    Vinita Gupta, “A Review on Image Watermarking and Its Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering,Volume 4, Issue 1, 2014Google Scholar
  13. 13.
    Emir Ganic, and Ahmet M. Eskicioglu, “Robust DWT-SVD Domain Image Watermarking: Embedding date in All Frequencies,” CiteSeerX, MM&SEC’04, 2004, pp 20-21.Google Scholar
  14. 14.
    Chandra Munesh, Pandey Shikha,” A DWT Domain Visible Watermarking Techniques for Digital Images” International Conference on Electronics and Information Engineering (ICEIE), Volume 2,2010,pp-421-427.Google Scholar
  15. 15.
    Harsh Vikram Singh, Sonam Tyagi, Raghav Agarwal Sandeep Kumar Gangwar, “Digital Watermarking Techniques for Security Applications”, International Conference on Emerging Trends in Electrical, Electronics and Sustainable Energy Systems (ICETEESES) 2016, pp 379-382.Google Scholar
  16. 16.
    M.M Yeung et al. “Digital Watermarking for High-Quality Imaging”,1997 IEEE First Workshop on Multimedia Signal Processing, J Princeton, New Jersey, 1997, pp 357-362.Google Scholar
  17. 17.
    Munesh Chandra, Shikha Pandel, Rama Chaudhary, “Digital watermarking technique for protecting digital images” Third IEEE International Conference on Computer and Information Science and Technology (ICCSIT 2010), pp.226-233.Google Scholar
  18. 18.
    Mei Jiansheng1, Li Sukang1 and Tan Xiaomei “A Digital Watermarking Algorithm Based on DCT and DWT”, International Symposium on Web Information Systems and Applications (WISA) 2009, pp. 104-107.Google Scholar
  19. 19.
    Harsh Vikram Singh, “Information Hiding Techniques for Image Covers,” LAP LAMBERT Academic Publishing GmbH & Co. KG, Ddudweiler Landstr. 99, 66123 Saarbrücken, Germany, ISBN-10: 3843377537 ISBN-13: 978-3843377539Google Scholar
  20. 20.
    Harsh Vikram Singh, Raghav Agrawal “Diagnosis of Carious Legions Using Digital Processing of Dental Radiographs” Scopus Indexed Springer Book Series “Computational Vision and Bio Inspired Computing”, pp 864-882, 2018. ( ISBN: 978-3-319-71766-1)Google Scholar
  21. 21.
    Harsh Vikram Singh, Ankur Rai “Medical Image Watermarking in Transform Domain” Accepted in Scopus Indexed Springer Book Series “Advances in Intelligent Systems and Computing”. April 2018 (ISBN: 978-3-319-45991-2)Google Scholar
  22. 22.
    Harsh Vikram Singh and Arun Kumar Singh “DCT and DWT based Intellectual Right Protection in Digital Images” Accepted in Scopus Indexed Springer Book Series “Advances in Intelligent Systems and Computing”. May 2018 (ISBN: 978-3-319-45991-2)Google Scholar
  23. 23.
    Harsh Vikram Singh, Ankur Rai, “Machine Learning Based Robust Watermarking Technique for Medical Image Transmitted over LTE Network”, Journal of Intelligent Systems (JISYS), De Gruyter, Scopus, Vol. 27 (1), pp.105-114 (2018) (ISSN2191-026X)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Harsh Vikram Singh
    • 1
  • Purnima Pal
    • 1
  1. 1.Department of ElectronicsKamla Nehru Institute of Technology (KNIT)SultanpurIndia

Personalised recommendations