Abstract
The authentic document should be available for the legitimate user so that none other than him can use the document; there are some instances to protect any document from modification, or distribution of the properties in non-authentic way. In this, author has reviewed and implemented the discrete wavelet transform and singular value decomposition with LSB-based techniques to protect the digital rights. The schemes is to develop authentic intellectual properties and prevent them from exhibiting to unknown user. The cover image (the image in which watermark is inserted) is to be fractioned into (HH, LH, LL, and HL) by using commonly used method of transforming frequency domain. This transform can be directly applied to each and every subordinate bands of the original image. The extraction mechanisms work in accordance with the previous work done by the embedding algorithm. The output and the frequency of image will determine strength, apparently maintaining the better quality and robustness to many attacks to compromise the security of intellectual property such as JPEG compression, Gaussian noise, and there are many more.
Keywords
- Intellectual properties
- Image compression
- Frequency distribution
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bittman, J., Steinmetz. A.: Content-based digital signature for motion pictures authentication and content-fragile watermarking. In: IEEE proceeding international conference on miltimedia computing systems (1999)
Lin C., et al.: Robust image authentication method surving jpeg lossy compression. In: Proceeding of SPIE international conference on storage and retrieval of image/video database
Lu, C., Liao, H.: Structural digital signature for image authentication. In: Proceeding of the multimedia security workshop ACM international conference on multimedia
Tewari, T.K., Saxena, V.: An improved and robust DCT based on digital image watermarking scheme. Int. J. Comput. Appl. (0975–8887)
Lagzian, S., Soryani, M., Fathy, M.: A new robust watermarking scheme based on RDWT-SVD. Int. J. Intell. Inf. Process. 2(1), 22–29 (2011)
Hague, S.R.: Singular value decomposition and discrete cosine transform based image watermarking. Department of Interaction and System Design
Rastegar, S., Dr. Bruce.: Watermarking algorithm based on singular value decomposition and radon transform. Int. J. Commun. 65(7), 658–663 (2011)
Kalra, G.S., Talwar, R., Sadawarti, H.: Robust blind digital image watermarking using DWT and dual encryption technique. In: International conference on computational
Kumar, A., Tyagi, V., Ansari, D., Kumar, K.: A practical buyer-seller watermarking protocol based on discrete wavelet transform, Int. J. Comput. Appl. 21(8), 46–51
Kumar, A., Ansari, D., Ali, J., Kumar, K.: A new buyer-seller watermarking protocol with discrete cosine transform. In: International conference on advances in communication, network, and computing, pp. 468–471. Springer, Berlin Heidelberg
Kumar, A., Ghrera, S.P., Tyagi, V.: Modified buyer seller watermarking protocol based on discrete wavelet transform and principal component analysis. Indian J. Sci. Technol. 8(35), 1–9
Kumar, A., Ghrera, S.P., Tyagi, V.: Implementation of wavelet based modified buyer-seller watermarking protocol. WSEAS Trans. signal process. 10, 212–220
Kumar, A., Ghrera, S.P., Tyagi, V.: A new and efficient buyer-seller digital watermarking protocol using identity based technique for copyright protection, In: Third International conference on image information processing (ICIIP), IEEE
Kumar, A., Ghrera, S.P., Tyagi, V.: A comparison of buyer-seller watermarking protocol (BSWP) based on discrete cosine transform (DCT) and discrete wavelet transform (DWT). In: Emerging ICT for bridging the future-proceedings of the 49th annual convention of the computer society of india (CSI) vol. 1, pp. 401–408. Springer. (2015)
Kumar, A., Ghrera, S.P., Tyagi, V.: An ID-based secure and flexible buyer-seller watermarking protocol for copyright protection, science & technology. Pertanika J. Sci. Technol. 25(1), 57–76 (2017)
Fridrich, J.: Image watermarking for tamper detection. Proceedings of ICIP ’98, Chicago (Oct 1998)
Walton, S.: Information authentication for a slippery new age. Dr. Dobbs J. 20(4), 18–26 (1995)
Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of the IEEE international conference on image processing. 2, pp. 86–90. Austin, Texas, (Nov 1994)
Wolfgang, R.B., Delp, E.J.: A watermark for digital images. In: Proceedings of IEEE international conference on image processing, vol. 3, pp. 219–222. (1996)
Ensafi P., Tizhoosh, H.R.: Type-2 fuzzy image enhancement. Systems design engineering, pp. 159–166. University of Waterloo (2005)
Hartati, S., Harjoko, A., Nickerson, B.G.: Image enhancement using fuzzy hyperbolization and artificial neural network for anomaly detection. Int. J. Comput. Electr. Auto. Control Inf. Eng. vol. 3, pp. 2089–2092. (2009)
Kumar, A., et. al.: A lightweight buyer-seller watermarking protocol based on time-stamping and composite signal representation. Int. J. Eng. Technol. 7(4.6), 39–41 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumar, A. (2020). A Review on Implementation of Digital Image Watermarking Techniques Using LSB and DWT. In: Tuba, M., Akashe, S., Joshi, A. (eds) Information and Communication Technology for Sustainable Development. Advances in Intelligent Systems and Computing, vol 933. Springer, Singapore. https://doi.org/10.1007/978-981-13-7166-0_59
Download citation
DOI: https://doi.org/10.1007/978-981-13-7166-0_59
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-7165-3
Online ISBN: 978-981-13-7166-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)