Wavelet Based Digital Image Watermarking

advertisement

Wavelet Based Digital Image Watermarking: A Review

Vandana Yadav

1

, Dr. Parvinder Singh

2

Vandana1055@gmail.com, Parvinder23@rediffmail.com

Department of CSE, Deenbandhu Chhotu Ram University of Science and Technology, Murthal,

Sonipat, Haryana-131039

Abstract - Due to the rapid development in computer networks , digital data can easily be copied, modified and distributed to an illegal way. So the copy right protection, intellectual protection, material protection of owner, buyer and distribute is necessary. The solution of this problem is watermarking. A watermark is an imperceptible, robust, and secure message embedded directly in digital element such as image. In image watermarking, information is embedded into cover media using spatial domain or frequency domain technique. This paper elaborates suitability of wavelet transform for image watermarking, wavelet transform based image watermarking process, and provide a review of the existing literature available on wavelet based digital image watermarking and wavelets and comparison of different wavelets available.

Keywords - Digital Image Watermarking, Discrete Wavelet Transform (DWT), Embedding,

Extraction.

I. Introduction

With the unrestricted widespread use of Internet and rapid development in multimedia technology, it has become a common practice to create copy, transmit and distribute digital data and therefore it may leads to unauthorized replication problem. Therefore digital media require security of data communication over internet. There are various approaches, which provide security such as, cryptography, steganography and watermarking. In Watermarking, a watermark is inserted in the digital media like image. Digital Image Watermarking provides copyright protection to image by hiding appropriate information in original image to declare rightful ownership [1]. Digital watermarking is a technique in which a piece of digital information is embedded into an image and extracted later for ownership. There are number of requirements that are to be possessed by watermarking algorithms, these are [1],[4]:

Transparency: Watermark should be transparent to end user and should not degrade the performance of original image.

Security: Watermark information shall only be accessible to the authorized parties. Only authorized parties shall be able to alter the watermark content.

1

Robustness: Watermark should be robust means that it should be difficult to remove or destroy and robust enough to withstand all kind of attacks whether intentional or not.

Imperceptible: When watermark is embedded quality of host image should not be effected by the presence of watermark.

II. Watermarking Principle

Watermarking system consists of two categories, embedding and extraction. In embedding watermark data is embedded into host image and in extraction watermark data is extracted from the image.

Host image

Watermark embedding algorithm

Watermark image

Watermark extraction algorithm

Host image

Watermark

Watermark

Fig.1 Watermarking Process

Watermark is embedding into the host image using watermark algorithm and a watermarked image is obtained at sender side and this watermark image is send to the receiver through transmission channel where noise effect the watermark object. Receiver receive the watermarked image and by applying the watermark extraction algorithm, watermark is extracted from the host image.

III. Attacks on Digital Image Watermarking

There are various possible malicious intentional or unintentional attacks and the aim of these attacks is to prevent the watermark from performing intended purpose.[3] [7]

Removal attack ; purpose is to remove the watermark data from the watermark object.

Interference attack ; add additional noise to watermark object.

Geometric attack ; manipulate the geometry of the image such as flipping, rotationa, cropping etc.

Forgery attack ; result in object insertion and deletion.

Security attack ; perform modification to render the watermark invalid or to estimate and modify the watermark. In this case we talk about an attack on security. The watermark algorithm is considered secure if the embedded information cannot be destroyed, detected, or forged.

Cryptographic attack ; deals with the cracking of the security, for example finding the secrete watermarking key.

2

Image degradation attack ; damage robust watermark by removing parts of image. The parts that replace may carry watermark information. Example of these operation are partial cropping, row removal, column removal, insert noise.

IV. Image Watermarking Techniques

Digital watermarking techniques refers to the process of embedding and extraction of the given watermark information.

There are three stages in watermarking, there are

Generation and Embedding: Generate the watermark and embed in the original image

Distribution and Possible attacks: Send the watermark image. Possible attacks in the broadcast channel may be intentional or not.

Detection: detect the owner and provide the information to intended receiver [18].

Image watermarking techniques divides into two domains; special domain and Frequency domain.

Spatial domain

In spatial domain the modification would be on the pixels values directly specifically the least significant bit LSB, because it hasn't great effect on the overall pixel value but this technique although it's simple and has less complexity time but it's not robust enough to resist attacks and watermark can easily be detected by intruders.

Frequency domain

There are various frequency domain techniques; Discrete Fourier Transform (DFT), Discrete

Cosine Transform (DCT), Discrete Wavelet Transform (DWT).

Discrete Fourier Transform

Fourier transform is a operation that transform a continuous function into its frequency components. The equivalent transform for discrete valued function requires the Discrete Fourier

Transform (DFT). In digital image processing, the even function that is not periodic can be expressed as the integral of sine and/or cosine multiplied by a weighting function. This weighting function makes up the coefficients of Fourier Transform of the signal. Fourier

Transform allows analysis and processing of the signal in its frequency domain by means of analyzing and modifying these coefficients.

3

Discrete Cosine Transform

Discrete Cosine Transform is related to DFT in a sense that it transforms a time domain signal into its frequency components. The DCT use only the real part of the DFT coefficients. DCT has a strong energy compaction property and most of the signal information tends to be concentrated in a few low-frequency component of the DCT.

Discrete wavelet Transform

The disadvantage of Fourier theory is that it has only frequency resolution and no time resolution. This means that although we might be able to determine all the frequencies present in a signal we do not know when they are present so the solution of this is Wavelet. Wavelet

Transform has both frequency and time resolution. Wavelet is a mathematical function that cut up data into different frequency components.

Table below shows the comparison of different Watermarking techniques [30], [31], [33]

Sr. no Embedding

LSB

DCT

DWT

At least significant bit.

Divide image into frequency band and embed watermark in frequency band

Divide the image into LL,

LH, HL, HH frequency bands and embed water mark in frequency band.

Attacks

Blurring

Scaled to half size

Resizing of scaled image

Cropping

Blurring

Cropping

Scaled to half size

Resizing of scaled image

Blurring

Cropping

Scaled to half size

Resizing of scaled image

Performance

Easy

Take less time high compression ratio, small bit error rate more accurate, robust, Multi-resolution characteristic, Provide better quality, noise reduction, HVS

Table 1. Different watermarking techniques.

V. Discrete Wavelet Transform

Discrete Wavelet Transform has both frequency and time resolution. The DWT separates an image into a lower resolution approximation image (LL) as well horizontal (HL), vertical (LH) and diagonal (HH). The LL band stands for the coarse one which represents the low frequency part where most energy focuses. The sub-bands labeled HL, LH, and HH represent the details of wavelet coefficients. To obtain the next coarser wavelet coefficients, the sub-band LL is further decomposed as shown in Figure 2. This process can be repeated several times, which is determined by the requirement of user.

4

LL

2

HL

2

HL

1

LH

2

HH

2

LH

1

HH

1

Fig.2 Level 2 DWT

1. Wavelet Transform is computationally efficient and can be implemented by using simple filter convolution.

2. With multi-resolution analysis, image can be represented at more than one resolution level.

Wavelets allow image to be described in terms of coarse overall shape and details ranging from broad to narrow.

3. Magnitude of DWT coefficients is larger in the lowest bands (LL) at each level of decomposition and is smaller for other bands (HH, LH, HL).

4. The larger the magnitude of wavelet coefficient, the more significant it is.

5. Watermark detection at lower resolutions is computationally effective because at every successive resolution level, less no. of frequency bands are involved.

6. High resolution sub bands help to easily locate edge and textures patterns in an image. [7],

[19]

Digital Image Water Marking Process Using DWT

Embedding Watermark: DWT divides the image into different levels or sub bands and watermark is embedded in DWT coefficients.

Original image

Watermark

DWT

Resize image according to LL

Embedded

Watermark in LL sub-band

IDWT of

Watermarked

Image

Watermark

Original image

Extract Watermark DWT

Fig. 3 Digital image watermark embedding and extraction using DWT [30].

Transmission : Watermarked data is passed through transmission channels, where various noise effect the watermarked data.

Extraction and Detection: Extraction is the process of extracted/obtaining the watermark from original image and Detection is the process of identifying the identity of owner.

5

VI. Review of Wavelet Based Image Watermarking

B.L. Gunjal and R.R. Manthalkar[1], proposed a Discrete Wavelet Tranform based robust watermarking scheme for information hiding in digital image. In this paper, they used Arnold transform and purposed embedding and extraction algorithm and calculate PSNR for image with size MxN as

Where f(i,j) is pixel gray value of original image, f’(i,j) is pixel gray value of watermark image, max1 is the maximum pixel value of image which is equal to 255 for grayscale image pixel are represented with 8 bits.

Chih-Chin Lai and Ching-Chin Tsai[2], proposed Digital Image Watermarking Using Discrete

Wavelet Transform and Singular Value Decomposition. A hybrid image-watermarking technique based on DWT and SVD has been presented, where the watermark is embedded on the singular values of the cover image’s DWT sub band. The main objective of developing this technique is to satisfy both imperceptibility and robustness.

Bhupender Ram [3], described a Digital Image Watermarking Technique Using Discrete

Wavelet Transform and Discrete Cosine Transform, where the method operates in the frequency domain embedding a pseudo-random sequence of real number in a selected set of DCT coefficient and watermark is added in the selected coefficients with significant image energy in the discrete wavelet transform domain to ensure non-erasability of the watermark.

Sasmita Mishra et.al. [4], described a survey on digital watermarking techniques, the idea behind this survey is to study different kind of watermarking techniques and present a robust watermark data using DWT and introduce fragile and semi-fragile watermarking techniques.

Evelyn Brannock et.al. [5], described watermarking with wavelet algorithm and measure the success of algorithm by using Haar wavelet, the PSNR for each wavelet family and image is obtained, and described various requirements of Watermarking. The quality of an NxM host image (f(x,y)) is compared to the image containing the watermark (g(x,y)) using the formula,

Aree Ali Mohammed & Haval Mohammed Sidqi [8], proposed an image watermarking scheme based on multi bands wavelet transformation method. At first, the proposed scheme is tested on the spatial domain (for both a non and semi blind techniques) in order to compare its results with a frequency domain. In the frequency domain, an adaptive scheme is designed and implemented

6

based on the bands selection criteria to embed the watermark. These criteria depend on the number of wavelet passes. In this work three methods are developed to embed the watermark

(one band(LL|HH|HL|LH), two bands (LL&HH | LL&HL | LL&LH | HL&LH | HL&HH |

LH&HH) and three bands (LL&HL&LH | LL&HH&HL | LL&HH&LH | LH&HH&HL) selection. This is advantage of the scheme is the involvement of a large number of wavelet bands in the embedding process.

P. Surekha and S. Sumathi [9], proposed a discrete wavelet transformed based image watermarking algorithm by using genetic algorithm. The amplification factor of the watermark is the significant parameter that helps in improving the perceptual transparency and robustness against attacks. The tradeoff between the transparency and robustness is considered as an optimization problem and is solved by applying Genetic Algorithm.

Kamran Hameed, Adeel Mumtaz, and S.A.M. Gilani[12], this paper gives an overview of various wavelet based digital watermarking techniques that have been developed for copyright protection. The author proposes a new joo’s watermarking techniques and embed watermark into wavelet DC components.

Hanaa A. Abdallah, Mohiy M. Hadhoud ,Abdalhameed A. Shaalan and Fathi E. Abd Elsamie[35], this paper proposed a wavelet based watermarking and uses blind wavelet based watermarking. In this watermark is inserted in the coarsest scale wavelet coefficiects. Wavelet divides the image into 3-levels and watermark is embed into the coarsesr scale. This scheme depends on the quantization of certain wavelet coefficients within certain amplitude ranges in a binary manner to embed meaningful information in the image.

Anuradha, Rudresh Pratap Singh[36], proposed a discrete wavelet transform based watermarking and uses haar wavelet for copy right protection, intellectual protection and material protection.

This paper introduced a suitable method of watermarking and divide the image into 3-levels using DWT.

Liang Zongbao and Wang Jiawei[37], proposed a watermarking algorithm using 3-level wavelet transform where watermark is embedded in medium frequency component on horizontal and vertical direction based on the wavelet coefficients.

Sr.

No.

Author’s name

Title Year Pag e

Description Technique used

1 B.L. Gunjal and R.R.

Manthalkar

Discrete

Wavelet

Transform based Strongly

Robust

Watermarking

Schemes for

2010-

12 no.

-

124

129

Proposed strongly a Discrete

Wavelet Tranform based robust

Watermarking scheme for

Information Hiding in digital image & used

Arnold transform for

DWT

Arnold

Transform

&

7

2

3

4

Chih-Chin

Lai

Ching-Chin

Tsai

Bhupender

Ram

Sasmita

Mishra et.al. and

Information

Hiding in

Digital Images

Digital Image

Watermarking

Using Discrete

Wavelet

Transform and

Singular Value

Decomposition

2010 306

0-

306

3

Digital Image

Watermarking

Technique

Using Discrete

Wavelet

Tranform And

Discrete Cosine

Transform

A Survey on

Digital

Watermarking

Techniques

Watermarking with Wavelet:

Simplicity Lead to Robustness

2013 19-

27

2013 451

-

456

2008 587

-

592 embedding and extraction algorithm

A hybrid imagewatermarking technique based on DWT and SVD has been presented, where the watermark is embedded on the singular values of the cover image’s DWT sub band.

Proposed a Digital Image

Watermarking Technique

Using Discrete Wavelet

Transform and Discrete

Cosine Transform

Described a Survey on

Digital Watermarking techniques

DWT &

SVT

DWT

DCT

DWT

&

5 Evelyn

Brannock et.al.

7 P. Surekha and

Sumathi

S.

Implementation of genetic algorithm for a dwt based image watermarking scheme

2011 244

-

252

8 Kamran

Hameed et.al.

Digital Image

Watermarking in the Wavelet

Transform

2006 86-

89

Described Watermarking with Wavelet, the objective is to develop a algorithm and measure the success of algorithm by using Haar wavelet

The amplification factor of the watermark is the significant parameter that helps in improving the perceptual transparency and robustness against attacks. The tradeoff between the transparency and robustness is considered as an optimization problem and is solved by applying

Genetic Algorithm.

The author proposes a new joo’s watermarking techniques and embed watermark into wavelet

DWT

DWT,GA(G enetic

Algorithm)

DWT

8

9 Hanaa A.

10

Abdallah et.al.

Anuradha,

Rudresh

Pratap

Singh

11 Liang

Zongbao and Wang

Jiawei

12 S. Kurshid

Jinna, Dr.

L. Ganesan

Domain

Blind Wavelet-

Based Image

Watermarking

DWT Based

Watermarking

Algorithm using

Haar Wavelet

A Novel Digital

Watermark

Based on

Wavelet

Coefficients

Comparison

Lossless Image

Watermarking using Lifting

Wavelet

Transform

2011

2012

2012

15-

28

01-

06

7-

10

2009 191

-

195

DC components.

This paper proposed a wavelet based watermarking and uses blind wavelet based watermarking. In this watermark is inserted in the coarsest scale wavelet coefficiects. Wavelet divides the image into 3levels and watermark is embed into the coarsesr scale.

Proposed a discrete wavelet transform based watermarking and uses haar wavelet for copy right protection, intellectual protection and material protection.

Proposed a watermarking algorithm using 3-level wavelet transform where watermark is embedded in medium frequency component on horizontal and vertical direction based on the wavelet coefficients.

The proposed scheme uses neighboring pixel pairs to adaptively embed the watermark as byte directly. The bytes are embedded as the difference between neighboring pixel pairs whichever is expandable. Experiments are conducted to test the embedding capacity of different wavelet families.

DWT and

Quantizatio n

DWT

DWT

Integer to integer wavelet transform

9

13 Xiangui

Kang,

Wenjun

Zeng, and

Jiwu Huang

A Multi-band

Wavelet

Watermarking

Scheme

2008

-

121

126

Proposed blind watermarking in the multi- band wavelet domain can achieve higher perceptual trans- parency and stronger robustness.

Table 2. Summary on various Watermarking Techniques

Multiband wavelet transform

VII. Optimization Techniques Used for Digital Image Watermarking

Optimization techniques are used to improve the performance of watermark image using DWT.

There are various optimization techniques used like Singular Value Decomposition (SVD),

Particle Swarm Optimization (PSO), Genetic Algorithm (GA),Back Propagation Neural

Network, Fuzzy Logic and many more.

Singular Value Decomposition (SVD); Here the singular values of the image are modified to embed the watermark image by employing multiple singular functions [2].

Particle Swarm Optimization (PSO); To make an intelligent watermarking particle swarm optimization (PSO) technique is used in wavelet domain. The cover image is transformed into frequency bands and the coefficients are randomly selected from different sub bands to make up a block to increase the security so that an unauthorized party is unable to remove the watermark or to detect the existence of the watermark. This concept is called significant difference of the wavelet coefficients quantization [32].

VIII. Wavelets Analysis

The type of wavelet to be used for image watermarking depends on the following aspects:

1. Symmetry: The wavelets used should be symmetric as human visual system is less sensitive to symmetry.

2. Perfect Reconstruction: To retain the quality of watermarked image and imperceptibility, the decomposed image should be perfectly reconstructed.

Table below shows the comparison of various wavelets.

Type Filter

Haar FIR

Daubechies(db) FIR

Symlets

Coiflets

Spline

Morlet

Maxican Hat

FIR

FIR

FIR

IIR

IIR

Symmetry

Symmetric

Asymmetric

Orthogonality Fast Algorithm

Orthogonal

Orthogonal

Yes

Yes

Near Symmetric Orthogonal

Near Symmetric Orthogonal

Symmetric Biorthogonal

Symmetric

Symmetric

No

No

Yes

Yes

Yes

No

No

10

Meyer

Butterworth

IIR

IIR

Symmetric

Asymmetric

Orthogonal

Orthogonal

Table 3. Main properties of wavelets.

No

Yes

The above table shows comparison of wavelet family like haar, daubechies, symlets etc. on the basis of filter, symmetry, orthogonality, and performance, in which some may be symmetric, orthogonal, and biorthogonal. Here FIR is finite impulse response, are digital filters, whose impulse response is of finite duration and IIR is infinite impulse response, are digital filters with infinite impulse response. Unlike FIR filters, IIR have the feedback and are known as recursive filter therefore.

IX. Conclusion

This paper discussed about digital image watermarking, and how to embed and extract watermark. This paper provides the review of various techniques used in watermarking like

DFT, DCT, DWT. Discrete wavelet transform overcome the limitations of DFT and DCT because DWT provides time and frequency information of the signal and passes time domain signals to various high pass and low pass filters in order to divide the image into subbands

(LL,HL,LH,HH) and then embed the watermark in the selected band. This paper shows the comparison of various literatures based on different techniques and different wavelets. Haar wavelet is the first and simplest orthogonal wavelet and provides the basis of all wavelets. In practice wavelets analysis is performed using filter banks and for watermarking we need to select an appropriate wavelet or basis. Daubechies wavelets are the most popular due to orthogonal and compact support abilities. Coiflets was derived from daubechies and having more computational overhead. In future DWT can be combined with optimization technique or artificial intelligence for better transparency and robustness.

X. References

[1] B.L. Gunjal, R.R. Manthalkar, “Discrete Wavelet Transform based Strongly Robust

Watermarking Schemes for Information Hiding in Digital Images”, Third International

Conference on Emerging Trends in Engineering and Technology, DOI

10.1109/ICETET.2010.12.

[2] Chih-Chin Lai, Cheng-Chih Tsai, “Digital Image Watermarking Using Discrete Wavelet

Transform and Singular Value Decomposition”, IEEE Transcation on Instrumentation and

Measurement”, vol. 59, no. 11,November 2010.

[3] Bhupender Ram, “Digital Image Watermarking Technique Using Discrete Wavelet Tranform

And Discrete Cosine Transform”, International Journal of Advancements in Research &

Technology, Vol. 2, Issued4, April-2013.

11

[4] Sasmita Mishra, Amitav Mahapatra, Pranati Mishra, “A Survey on Digital Watermarking

Techniques”, International Journal of Computer Science and Information Technologies, Vol.

4(3),2013,451-456.

[5] Evelyn Brannock, Michael Weeks, Robert Harrison, “Watermarking with Wavelet:

Simplicity Lead to Robustness”, IEEE 978-1-4244-1884-8/2008.

[6] Aseem Saxsena, Amit Kumar Singh, Shashank Chakrawarti, Surabhi Charu,”Digital

Watermarking using MATBAL”, International Journal of Advance in Science Engineering and

Technology, Vol. 1, Issue-3, Jan-2014.

[7] Vaishhali S.Jbade, Sachin R. Gengaje, “Literature Review of Wavelet Based Digital Inage

Watermarking Techniques”, Internatinal Journal of Computer Application, Vol. 31, No. 1, Oct-

2011.

[8] Aree Ali Mohammed & Haval Mohammed Sidqi,” Robust Image Watermarking Scheme

Based on Wavelet Technique”, International Journal of Computer Science and Security (IJCSS),

Volume (5) : Issue (4) : 2011

[9] P. Surekha and S. Sumathi, “ implementation of genetic algorithm for a dwt based image watermarking scheme”, ictact journal on soft computing: special issue on fuzzy in industrial and process automation, volume: 02, issue: 01, july 2011.

[10] G. Dayalin Leena and S. Selva Dhayanithy,” Robust Image Watermarking in Frequency

Domain”,International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 2 No. 4, pp. 582-587, Apr. 2013.

[11] Jian-Wei Yang, Guo-Sheng Cheng, Yuan-Yan Tang, “parametrization construction of twodimensional wavelet filters”, proceedings of the 2007 international conference on wavelet analysis and pattern recognition, beijing, china, 2-4 nov. 2007.

[12] Kamran Hameed, Adeel Mumtaz, and S.A.M. Gilani, “digital image watermarking in the wavelet transform domain”, world academy of science, engineering and technology 13 2006

[13] Na Li; Xiaoshi Zheng; Yanling Zhao; Huimin Wu; Shifeng Li ,”Robust Algorithm of

Digital Image Watermarking Based on Discrete Wavelet Transform”, Electronic Commerce and ecurity, International Symposium, Page(s):942 – 945, , 3-5 Aug. 2008.

[14] Victor V., Guzman, Meana, “Analysis of a Wavelet-based Watermarking Algorithm”, IEEE

Proceedings of the International Conference on Electronics, Communications and Computer, pp.

283-287, 2004.

[15] Barni M, Bartolini F, Piva, “An Improved Wavelet Based Watermarking Through Pixelwise

Masking”, IEEE transactions on image processing, Vol. 10, pp.783-791, 2001.

12

[16] N. Kaewkamnerd and K.R. Rao, “Wavelet Based Image Adaptive Watermarking Scheme”,

IEEE Electronic Letters, Vol. 36, pp.312-313, Feb. 2000.

[17] Radhika v. Totla, K.S.Bapat, “ Comparative Analysis of Watermarking in Digital Image using DCT and DWT”, International Journal of Scientific and Research Publications, Volume 3,

Issue 2, February 2013.

[18] L. Robert, T.Shanmugapriya, “A Study on Digital Watermarking Techniques”, International

Journal of Recent Trends in Engineering, Vol. 1, No. 2, May 2009.

[19] Ensaf Hussein, Mohamed A. Belal, “ A Comparative Study of Digital Watermarking

Techniques in Frequency Domain”, International Journal of Computer Applications (0975 –

8887) Volume 52– No.20, August 2012.

[20] Christopher B. Smith and Sos S. Agaian, “ Mismatched Wavelets: Information Hiding And

Edge Detection”, Multidisciplinary Journals in Science and Technology, Journal of Selected

Areas in Telecommunications (JSAT), August Edition, 2011

[21] Zohaib Khan, Atif Bin Mansoor, “An Evaluation of Wavelet Filters Performance for

Steganalysis”, 978-1-4244-3314-8/09/IEEE, 2009.

[22] Gengming Zhu, Shaobo Zhang , “ Research and Implementation of DCT-based Image

Digital Watermarking Algorithm”, 2009 Second International Symposium on Electronic

Commerce and Security, 2009.

[23] D. Dejey R.S. Rajesh, “Robust discrete wavelet–fan beam transforms-based colour image watermarking”, Published in IET Image Processing Received on 28th August 2009 Revised on

19th February 2010 doi: 10.1049/iet-ipr.2009.0239.

[24] Achintya Singhal, Rudra Pratap Singh , Monal Tenguria’ “comparison of different wavelets for watermarking of colored images”, 978-1-4244-8679-3/11/IEEE, 2011.

[25] Yasunori Ishikawa, Kazutake Uehira, and Kazuhisa Yanaka, “Optimization of Size of Pixel

Blocks for Orthogonal Transform in Optical Watermarking Technique”, journal of display technology, vol. 8, no. 9, september 2012.

[26] S. Kurshid Jinna, Dr. L. Ganesan, “Lossless Image Watermarking using Lifting Wavelet

Transform”, International Journal of Recent Trends in Engineering, Vol 2, No. 1, November

2009.

[27] H. B. Kekre, Archana B. Patankar, Dipali Koshti, “ Performance Comparison of Simple

Orthogonal Transforms and Wavelet Transforms for Image Steganography”, International

Journal of Computer Applications (0975 – 8887) Volume 44– No.6, April 2012.

[28] Pratibha Sharma, Shanti Swami, “Digital Image Watermarking Using 3 level Discrete

Wavelet Transform”, Conference on Advances in Communication and Control Systems 2013

(CAC2S 2013).

13

[29] Vidyasagar M. Potdar, Song Han, Elizabeth Chang, “A Survey of Digital Image atermarking Techniques”, 3rd IEEE International Conference on Industrial Informatics (INDIN), pp.709-713, 2005.

[30] Navnidhi Chaturvedi, Dr. S. J. Basha, “Comparison of Digital Image watermarking Methods

DWT & DWT-DCT on the Basis of PSNR”, ISSN: 2319 – 8753 International Journal of

Innovative Research in Science, Engineering and Technology Vol. 1, Issue 2, December 2012.

[31] Namita Chandrakar, Jaspal Bagga, “Performance Comparison of Digital Image

Watermarking Techniques: A Survey”, International Journal of Computer Applications

Technology and Research Volume 2– Issue 2, 126 - 130, 2013.

[32] Vivek Tomar, Deepti Mehrotra, Ankur Choudhary, “ A Statistical Comparison of Digital

Image Watermarking Techniques”, Special Issue of International Journal of Computer

Applications (0975 – 8887) 3rd International IT Summit Confluence 2012 - The Next Generation

Information Technology Summit, 2012.

[33] Y. Wang, W. Lin, and L. Yang, “An intelligent pso watermarking”, pp. 11–14, July 2010.

[34] Abdelaziz I. Hammouri, Basem Alrifai and Heba Al-Hiary, “An Intelligent Watermarking

Approach Based Particle Swarm Optimization in Discrete Wavelet Domain”, IJCSI International

Journal of Computer Science Issues, ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784, Vol.

10, Issue 2, No 1, March 2013

[35] Hanaa A. Abdallah, Mohiy M. Hadhoud ,Abdalhameed A. Shaalan and Fathi E. Abd Elsamie, “Blind Wavelet-Based Image Watermarking”, International Journal of Signal Processing,

Image Processing and Pattern Recognition Vol. 4, No. 1, March 2011.

[36] Anuradha, Rudresh Pratap Singh, “DWT Based Watermarking Algorithm using Haar

Wavelet”, nternational Journal of Electronics and Computer Science Engineering”, ISSN- 2277-

1956, 2012.

[37] Liang Zongbao and Wang Jiawei , “A Novel Digital Watermark Based on Wavelet

Coefficients Comparison”, IJCSNS International Journal of Computer Science and Network

Security, VOL.12 No.7, July 2012.

[38] Xiangui Kang1, Wenjun Zeng2, and Jiwu Huang, “A Multi-band Wavelet Watermarking

Scheme”, International Journal of Network Security, Vol.6, No.2, PP.121–126, Mar. 2008.

14

Download