Skip to main content

A Review on Implementation of Digital Image Watermarking Techniques Using LSB and DWT

  • Conference paper
  • First Online:
Information and Communication Technology for Sustainable Development

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 933))

Abstract

The authentic document should be available for the legitimate user so that none other than him can use the document; there are some instances to protect any document from modification, or distribution of the properties in non-authentic way. In this, author has reviewed and implemented the discrete wavelet transform and singular value decomposition with LSB-based techniques to protect the digital rights. The schemes is to develop authentic intellectual properties and prevent them from exhibiting to unknown user. The cover image (the image in which watermark is inserted) is to be fractioned into (HH, LH, LL, and HL) by using commonly used method of transforming frequency domain. This transform can be directly applied to each and every subordinate bands of the original image. The extraction mechanisms work in accordance with the previous work done by the embedding algorithm. The output and the frequency of image will determine strength, apparently maintaining the better quality and robustness to many attacks to compromise the security of intellectual property such as JPEG compression, Gaussian noise, and there are many more.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bittman, J., Steinmetz. A.: Content-based digital signature for motion pictures authentication and content-fragile watermarking. In: IEEE proceeding international conference on miltimedia computing systems (1999)

    Google Scholar 

  2. Lin C., et al.: Robust image authentication method surving jpeg lossy compression. In: Proceeding of SPIE international conference on storage and retrieval of image/video database

    Google Scholar 

  3. Lu, C., Liao, H.: Structural digital signature for image authentication. In: Proceeding of the multimedia security workshop ACM international conference on multimedia

    Google Scholar 

  4. Tewari, T.K., Saxena, V.: An improved and robust DCT based on digital image watermarking scheme. Int. J. Comput. Appl. (0975–8887)

    Google Scholar 

  5. Lagzian, S., Soryani, M., Fathy, M.: A new robust watermarking scheme based on RDWT-SVD. Int. J. Intell. Inf. Process. 2(1), 22–29 (2011)

    Google Scholar 

  6. Hague, S.R.: Singular value decomposition and discrete cosine transform based image watermarking. Department of Interaction and System Design

    Google Scholar 

  7. Rastegar, S., Dr. Bruce.: Watermarking algorithm based on singular value decomposition and radon transform. Int. J. Commun. 65(7), 658–663 (2011)

    Google Scholar 

  8. Kalra, G.S., Talwar, R., Sadawarti, H.: Robust blind digital image watermarking using DWT and dual encryption technique. In: International conference on computational

    Google Scholar 

  9. Kumar, A., Tyagi, V., Ansari, D., Kumar, K.: A practical buyer-seller watermarking protocol based on discrete wavelet transform, Int. J. Comput. Appl. 21(8), 46–51

    Google Scholar 

  10. Kumar, A., Ansari, D., Ali, J., Kumar, K.: A new buyer-seller watermarking protocol with discrete cosine transform. In: International conference on advances in communication, network, and computing, pp. 468–471. Springer, Berlin Heidelberg

    Google Scholar 

  11. Kumar, A., Ghrera, S.P., Tyagi, V.: Modified buyer seller watermarking protocol based on discrete wavelet transform and principal component analysis. Indian J. Sci. Technol. 8(35), 1–9

    Google Scholar 

  12. Kumar, A., Ghrera, S.P., Tyagi, V.: Implementation of wavelet based modified buyer-seller watermarking protocol. WSEAS Trans. signal process. 10, 212–220

    Google Scholar 

  13. Kumar, A., Ghrera, S.P., Tyagi, V.: A new and efficient buyer-seller digital watermarking protocol using identity based technique for copyright protection, In: Third International conference on image information processing (ICIIP), IEEE

    Google Scholar 

  14. Kumar, A., Ghrera, S.P., Tyagi, V.: A comparison of buyer-seller watermarking protocol (BSWP) based on discrete cosine transform (DCT) and discrete wavelet transform (DWT). In: Emerging ICT for bridging the future-proceedings of the 49th annual convention of the computer society of india (CSI) vol. 1, pp. 401–408. Springer. (2015)

    Google Scholar 

  15. Kumar, A., Ghrera, S.P., Tyagi, V.: An ID-based secure and flexible buyer-seller watermarking protocol for copyright protection, science & technology. Pertanika J. Sci. Technol. 25(1), 57–76 (2017)

    Google Scholar 

  16. Fridrich, J.: Image watermarking for tamper detection. Proceedings of ICIP ’98, Chicago (Oct 1998)

    Google Scholar 

  17. Walton, S.: Information authentication for a slippery new age. Dr. Dobbs J. 20(4), 18–26 (1995)

    Google Scholar 

  18. Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of the IEEE international conference on image processing. 2, pp. 86–90. Austin, Texas, (Nov 1994)

    Google Scholar 

  19. Wolfgang, R.B., Delp, E.J.: A watermark for digital images. In: Proceedings of IEEE international conference on image processing, vol. 3, pp. 219–222. (1996)

    Google Scholar 

  20. Ensafi P., Tizhoosh, H.R.: Type-2 fuzzy image enhancement. Systems design engineering, pp. 159–166. University of Waterloo (2005)

    Google Scholar 

  21. Hartati, S., Harjoko, A., Nickerson, B.G.: Image enhancement using fuzzy hyperbolization and artificial neural network for anomaly detection. Int. J. Comput. Electr. Auto. Control Inf. Eng. vol. 3, pp. 2089–2092. (2009)

    Google Scholar 

  22. Kumar, A., et. al.: A lightweight buyer-seller watermarking protocol based on time-stamping and composite signal representation. Int. J. Eng. Technol. 7(4.6), 39–41 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashwani Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, A. (2020). A Review on Implementation of Digital Image Watermarking Techniques Using LSB and DWT. In: Tuba, M., Akashe, S., Joshi, A. (eds) Information and Communication Technology for Sustainable Development. Advances in Intelligent Systems and Computing, vol 933. Springer, Singapore. https://doi.org/10.1007/978-981-13-7166-0_59

Download citation

Publish with us

Policies and ethics