Skip to main content

A Robust and Secure DWT-SVD Digital Image Watermarking Using Encrypted Watermark for Copyright Protection of Cheque Image

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 536))

Included in the following conference series:

Abstract

Digital watermarking is a process of embedding a data/additional information into exiting data. This additional data/information are used for embedding called as watermark. With this watermark, if the file or data get copied, this is then used to identify the originality of data. As, Digital communication facilitates transfer of digital data such as text, audio, image, video, etc. The un-authorized user can copy this data & can use anywhere they want. However, this creates the problem of security, ownership and copyright protection. To overcome this problem, digital watermarking is used. During transmission of data, there are many attacks occurring either intentionally or non-intentionally on digital watermarked image. These results into degradation of image quality and watermark may get destroyed. To provide security to watermark private key encryption and decryption is used. This encrypted watermark is used further for digital watermarking process using combined DWT-SVD transform. In this Paper, it is going to discuss “A Robust and Secure DWT-SVD Digital Image Watermarking Using Encrypted Watermark for Copyright Protection of Cheque Image.” Digital Watermarking Technique is used to provide ownership & copyright protection for cheque image and private key encryption & decryption technique used for security of bank watermark.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Data Communication and Networking, Fourth Edition by-Forouzan Copyright © the McGraw-Hill Companies, Inc

    Google Scholar 

  2. Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Pearson Education, New Delhi (2006)

    Google Scholar 

  3. Stallings, W.: Cryptography and Network Security. Prentice Hall, Saddle River (2003)

    Google Scholar 

  4. Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Pearson Education, New Delhi (2004)

    Google Scholar 

  5. Polikar, R.: TheWaveletTutorial

    Google Scholar 

  6. Rao, R.M., Bopardikar, A.S.: Wavelet Transforms: Introduction to Theory and Applications. Addison-Wesley, New York (1998)

    MATH  Google Scholar 

  7. Gonge, S.S., Ghatol, A.A.: Combination of encryption and digital watermarking techniques used for security and copyright protection of still image. In: IEEE International Conference on Recent Advanced and Innovations in Engineering (ICRAIE-2014), Jaipur, 09–11 May 2014

    Google Scholar 

  8. Yin, C.-q., Li, L., Lv, A.-q., Qu, L.: Color image watermarking algorithm based on DWT-SVD. In: Proceedings of the IEEE International Conference on Automation and Logistics, Jinan, 18–21 August 2007

    Google Scholar 

  9. Gonge, S.S., Ghatol, A.A.: Combined DWT-DCT digital watermarking technique software used for CTS of bank. In: 2014 IEEE Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT-2014), Ghaziabad, 7th and 8th February 2014

    Google Scholar 

  10. Kundur, D., Hatzinakos, D.: A Robust Digital Image Watermarking Method Using Wavelet-Based Fusion

    Google Scholar 

  11. Luo, T.: Mutual information based watermarking detection in wavelet domain for copyright protection. In: IEEE. School of Computer Science and Technology(HUST)

    Google Scholar 

  12. Shnayderman, A., Gusev, A., Eskicioglu, A.M.: An SVD-Based gray scale image quality measure for local and global assessment. IEEE Trans. Image process. 15(2), 422–429 (2006)

    Article  Google Scholar 

  13. Chung, K.-L., Yang, W.-N., Huang, Y.-H., Wu, S.-T., Hsu, Y.-C.: On SVD-based watermarking algorithm. Appl. Math. Comput. 188(1), 54–57 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  14. Kaladharan, N.: Unique key using encryption and decryption of image. Int. J. Adv. Res. Comput. Commun. Eng. 3(10) (2014). ISSN: 2278-1021, 2319-5940

    Google Scholar 

  15. Liu, R., Tan, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 4, 121–128 (2002)

    Article  Google Scholar 

  16. Wen-ge, F., Lei, L.: SVD and DWT zero-bit watermarking algorithm. In: 2nd International Asia Conference on Informatics in Control, Automation and Robotics, 2010, 2nd March 2011

    Google Scholar 

  17. Golub, G.H., Van Loan, C.F.: Matrix Computations, 3rd edn. John Hopkins University Press, Baltimore (1996)

    MATH  Google Scholar 

  18. Golub, G., Kahan, W.: Calculating the singular values and pseudo-inverse of a matrix. SIAM J. Numer. Anal. 2(2), 205–224 (1965)

    MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sudhanshu Suhas Gonge .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Gonge, S.S., Ghatol, A. (2015). A Robust and Secure DWT-SVD Digital Image Watermarking Using Encrypted Watermark for Copyright Protection of Cheque Image. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22915-7_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22914-0

  • Online ISBN: 978-3-319-22915-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics