Skip to main content
Log in

DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this article, a new DWT-SVD and DCT with Arnold Cat Map encryption based robust and blind watermarking scheme is proposed for copyright protection. The proposed scheme solves the most frequently occurring watermarking security problems in Singular Value Decomposition (SVD) based schemes which are unauthorized reading and false-positive detection. This scheme also optimizes fidelity and robustness characteristics. The grey image watermark splits into two parts using four bits MSBs and four bits LSBs of each pixel. Discrete Cosine Transform (DCT) coefficients of these MSBs and LSBs values are embedded into the middle singular value of each block having size 4 × 4 of the host image’s one level Discrete Wavelet Transform (DWT) sub-bands. The reason for incorporating Arnold Cat Map in the proposed scheme is to encode the watermark image before embedding it in the host image. The proposed scheme is a blind scheme and does not require the choice of scaling factor. Thus, the proposed scheme is secure as well as free from the false positive detection problem. The proposed watermarking scheme is tested for various malicious and non-malicious attacks. The experimental results demonstrate that the scheme is robust, imperceptible and secure to several attacks and common signal processing operations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Akansu AN, Serdijn WA, Selesnick IW (2010) Emerging applications of wavelets: a review. Phys Commun 3(1):1–18

    Article  Google Scholar 

  2. Ali M, Ahn CW (2014) An optimized watermarking technique based on self-adaptive de in dwt–svd transform domain. Signal Process 94:545–556

    Article  Google Scholar 

  3. Ali M, Ahn CW (2015) Comments on ?optimized gray-scale image watermarking using dwt-svd and firefly algorithm?. Expert Syst Appl 42(5):2392–2394

    Article  Google Scholar 

  4. Ali M, Ahn CW, Pant M (2014) A robust image watermarking technique using svd and differential evolution in dct domain. Optik-Int J Light Electron Opt 125(1):428–434

    Article  Google Scholar 

  5. Aslantas V (2009) An optimal robust digital image watermarking based on svd using differential evolution algorithm. Optics Commun 282(5):769–777

    Article  Google Scholar 

  6. Barni M, Bartolini F, Cappellini V, Piva A (1998) A dct-domain system for robust image watermarking. Signal Process 66(3):357–372

    Article  MATH  Google Scholar 

  7. Bhatnagar G, Raman B (2009) A new robust reference watermarking scheme based on dwt-svd. Comput Standards Interf 31(5):1002–1013

    Article  Google Scholar 

  8. Bhatnagar G, Wu QJ, Raman B (2012) A new robust adjustable logo watermarking scheme. Comput Secur 31(1):40–58

    Article  Google Scholar 

  9. Bhatnagar G, Wu QJ, Raman B (2013) A new aspect in robust digital watermarking. Multimed Tools Appl 66(2):179–200

    Article  Google Scholar 

  10. Bhatnagar G, Wu QMJ, Atrey PK (2013) Secure randomized image watermarking based on singular value decomposition. ACM Trans Multimed Comput Commun Appl 10(1):4:1–4:21. doi:10.1145/2542205.2542207

    Article  Google Scholar 

  11. Bianchi T, Piva A (2013) Secure watermarking for multimedia content protection: a review of its benefits and open issues. IEEE Signal Processg Mag 30(2):87–96

    Article  Google Scholar 

  12. Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  13. Cox IJ, Miller ML, Bloom JA, Honsinger C (2002) Digital watermarking, vol 53. Springer

  14. Fowler JE (2005) The redundant discrete wavelet transform and additive noise. IEEE Signal Process Lett 12(9):629–632

    Article  Google Scholar 

  15. Ganic E, Eskicioglu AM (2005) Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition. J Electron Imaging 14(4):043,004–043, 004

    Article  Google Scholar 

  16. Gupta AK, Raval MS (2012) A robust and secure watermarking scheme based on singular values replacement. Sadhana 37(4):425–440

    Article  MathSciNet  MATH  Google Scholar 

  17. Hamghalam M, Mirzakuchaki S, Akhaee MA (2013) Geometric modeling of the wavelet coefficients for image watermarking. In: 2013 8th Iranian conference on machine vision and image processing (MVIP). IEEE, pp 27–32

  18. Heil CE, Walnut DF (1989) Continuous and discrete wavelet transforms. SIAM Rev 31(4):628–666

    Article  MathSciNet  MATH  Google Scholar 

  19. Horng SJ, Rosiyadi D, Fan P, Wang X, Khan MK (2014) An adaptive watermarking scheme for e-government document images. Multimed Tools Appl 72(3):3085–3103

    Article  Google Scholar 

  20. Horng SJ, Rosiyadi D, Li T, Takao T, Guo M, Khan MK (2013) A blind image copyright protection scheme for e-government. J Vis Commun Image Represent 24(7):1099–1105

    Article  Google Scholar 

  21. Huang F, Guan ZH (2004) A hybrid svd-dct watermarking method based on lpsnr. Pattern Recog Lett 25(15):1769–1775

    Article  Google Scholar 

  22. Islam MS, Chong U (2015) Performance of a hybrid dct svd visually imperceptible digital watermarking against signal processing attacks. In: Computer science and its applications. Springer, pp 7– 14

  23. Jain C, Arora S, Panigrahi PK (2008) A reliable svd based watermarking schem. arXiv:0808.0309

  24. Keyvanpour M, Bayat FM (2013) Blind image watermarking method based on chaotic key and dynamic coefficient quantization in the dwt domain. Math Comput Modell 58(1):56–67

    Article  MATH  Google Scholar 

  25. Lagzian S, Soryani M, Fathy M (2011) Robust watermarking scheme based on rdwt-svd: Embedding data in all subbands. In: 2011 International symposium on artificial intelligence and signal processing (AISP). IEEE, pp 48–52

  26. Lai CC (2011) A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Digit Signal Process 21(4):522–527

    Article  Google Scholar 

  27. Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrument Measur 59(11):3060–3063

    Article  Google Scholar 

  28. Li Q, Wang Z (2009) Reduced-reference image quality assessment using divisive normalization-based image representation. IEEE J Selected Topics Signal Process 3(2):202–211

    Article  Google Scholar 

  29. Lin ET, Delp EJ (1999) A review of fragile image watermarks. In: Proceedings of the multimedia and security workshop (ACM Multimedia’99) multimedia contents. Citeseer, pp 25–29

  30. Lin SD, Shie Sc, Guo JY (2010) Improving the robustness of dct-based image watermarking against jpeg compression. Comput Standards Interfaces 32(1):54–60

    Article  Google Scholar 

  31. Lin WH, Horng SJ, Kao TW, Chen RJ, Chen YH, Lee CL, Terano T (2009) Image copyright protection with forward error correction. Expert Syst Appl 36(9):11,888–11,894

    Article  Google Scholar 

  32. Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10(5):746–757

    Article  Google Scholar 

  33. Lin WH, Wang YR, Horng SJ (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36(6):9869–9878

    Article  Google Scholar 

  34. Lin WH, Wang YR, Horng SJ, Kao TW, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36(9):11,509–11,516

    Article  Google Scholar 

  35. Liu R, Tan T (2002) An svd-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4(1):121–128

    Article  Google Scholar 

  36. Makbol NM, Khoo BE (2013) Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU-Int J Electron Commun 67(2):102– 112

    Article  Google Scholar 

  37. Megalingam RK, Nair MM, Srikumar R, Balasubramanian VK, Sarma VSV (2010) Performance comparison of novel, robust spatial domain digital image watermarking with the conventional frequency domain watermarking techniques. In: International conference on signal acquisition and processing, 2010. ICSAP’10. IEEE, pp 349–353

  38. Mishra A, Agarwal C, Sharma A, Bedi P (2014) Optimized gray-scale image watermarking using dwt–svd and firefly algorithm. Expert Syst Appl 41(17):7858–7867

    Article  Google Scholar 

  39. Mohammad AA, Alhaj A, Shaltaf S (2008) An improved svd-based watermarking scheme for protecting rightful ownership. Signal Process 88(9):2158–2180

    Article  MATH  Google Scholar 

  40. Ouhsain M, Hamza AB (2009) Image watermarking scheme using nonnegative matrix factorization and wavelet transform. Expert Syst Appl 36(2):2123–2129

    Article  Google Scholar 

  41. Pandey P, Kumar S, Singh SK (2014) Rightful ownership through image adaptive dwt-svd watermarking algorithm and perceptual tweaking. Multimed Tools Appl 72(1):723–748

    Article  Google Scholar 

  42. Pandey P, Kumar S, Singh SK (2014) A robust logo watermarking technique in divisive normalization transform domain. Multimed Tools Appl 72(3):2653–2677

    Article  Google Scholar 

  43. Peng F, Guo RS, Li CT, Long M (2010) A semi-fragile watermarking algorithm for authenticating 2d cad engineering graphics based on log-polar transformation. Comput-Aided Des 42(12):1207– 1216

    Article  Google Scholar 

  44. Podilchuk CI, Delp EJ (2001) Digital watermarking: algorithms and applications. IEEE Signal Process Mag 18(4):33–46

    Article  Google Scholar 

  45. Pun CM (2006) A novel dft-based digital watermarking system for images. In: 2006 8th International conference on signal processing, vol 2. IEEE

  46. Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. J Vis Commun Image Represent 22(2):187–200

    Article  Google Scholar 

  47. Rastegar S, Namazi F, Yaghmaie K, Aliabadian A (2011) Hybrid watermarking algorithm based on singular value decomposition and radon transform. AEU-Int J Electron Commun 65(7):658–663

    Article  Google Scholar 

  48. Rosiyadi D, Horng SJ, Fan P, Wang X, Khan MK, Pan Y (2012) Copyright protection for e-government document images. IEEE MultiMed 19(3):62–73

    Article  Google Scholar 

  49. Run RS, Horng SJ, Lai JL, Kao TW, Chen RJ (2012) An improved svd-based watermarking technique for copyright protection. Expert Syst Appl 39(1):673–689

    Article  Google Scholar 

  50. Shieh JM, Lou DC, Chang MC (2006) A semi-blind digital watermarking scheme based on singular value decomposition. Comput Standards Interf 28(4):428–440

    Article  Google Scholar 

  51. Shivani S, Patel AK, Kamble S, Agarwal S (2011) An effective pixel-wise fragile watermarking scheme based on ara bits. In: Proceedings of the 2011 international conference on communication, computing & security. ACM, pp 221–226

  52. Singh D, Shivani S, Agarwal S (2013) Self-embedding pixel wise fragile watermarking scheme for image authentication. In: Intelligent interactive technologies and multimedia. Springer, pp 111–122

  53. Singh D, Singh SK (2015) Dct based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl:1–25

  54. Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent pp. doi:10.1016/j.jvcir.2016.04.023. http://www.sciencedirect.com/science/article/pii/S1047320316300566

  55. Singh P, Chadha R (2013) A survey of digital watermarking techniques, applications and attacks. Int J Eng Innov Technol (IJEIT) 2(9)

  56. Solachidis V, Pitas I (2004) Optimal detector for multiplicative watermarks embedded in the dft domain of non-white signals. EURASIP J Appl Signal Process 2004:2522–2532

    Article  MathSciNet  MATH  Google Scholar 

  57. Song C, Sudirman S, Merabti M (2009) Recent advances and classification of watermarking techniques in digital images. In: Proceedings of post graduate network symposium

  58. Song C, Sudirman S, Merabti M (2012) A robust region-adaptive dual image watermarking technique. J Vis Commun Image Represent 23(3):549–568

    Article  Google Scholar 

  59. Tareef A, Al-Ani A (2015) A highly secure oblivious sparse coding-based watermarking system for ownership verification. Expert Syst Appl 42(4):2224–2233

    Article  Google Scholar 

  60. Wang Y, Doherty JF, Van Dyck RE (2002) A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans Image Process 11(2):77–88

    Article  Google Scholar 

  61. Wu L, Zhang J, Deng W, He D (2009) Arnold transformation algorithm and anti-arnold transformation algorithm. In: 2009 1st International conference on information science and engineering (ICISE). IEEE, pp 1164–1167

  62. Yavuz E, Telatar Z (2013) Comments on a digital watermarking scheme based on singular value decomposition and tiny genetic algorithm?. Digit Signal Process 23(4):1335–1336

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Durgesh Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, D., Singh, S.K. DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimed Tools Appl 76, 13001–13024 (2017). https://doi.org/10.1007/s11042-016-3706-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3706-6

Keywords

Navigation