Skip to main content
Log in

Analysis of frequency domain watermarking techniques in presence of geometric and simple attacks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Protection of manuscript accessible online is always an apprehension for researchers. Many ideas had come up for copyright protection and authentication of such documents. One of the admired keys to provide safety to the owner’s data is digital watermarking. It is the process of hiding the secret message (text, audio, image, logo, signature) into the document for providing authentication. A watermarking mechanism is said to be effectual if it offers high imperceptibility, robustness against attacks, security and last but not the least has the high correlation value of extracted watermark with the original one. Numerous survey papers are available in literature taking only a few techniques or parameters into account, but this paper takes almost all frequency domain (standalone and hybrid) methods in absence and presence of geometric and simple attacks and does an exhaustive analysis on the same. MATLAB software is used for implementation. Results illustrate the superlative technique under the influence of simple attacks is DWT-FFT, and under geometric attacks DWT-SVD is preeminent.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2 and 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33
Fig. 34
Fig. 35
Fig. 36
Fig. 37
Fig. 38
Fig. 39
Fig. 40
Fig. 41
Fig. 42
Fig. 43
Fig. 44

Similar content being viewed by others

References

  1. Abraham J, Paul V (2016) A DCT based imperceptible color image watermarking scheme. Int J Signal Process Image Process Pattern Recogn 9(7):137–146

    Google Scholar 

  2. Akhaee MA, Mohammad Ebrahim Sahraeian S, Marvasti F (2010) Contourlet-based image watermarking using optimum detector in a Noisy environment. IEEE Trans Image Process 19(4):967–980

    MathSciNet  MATH  Google Scholar 

  3. Al-Afandy KA, El-Shafai W, El-Rabaie E-SM, Abd El-Samie FE, Faragallah OS, El-Mhalaway A, Shehata AM, El-Banby GM, El-Halawany MM (2018) Robust hybrid watermarking techniques for different color imaging systems. Multimed Tools Appl, Springer Science+Business Media, LLC, part of Springer Nature 77(19):25709–25759

    Google Scholar 

  4. Al-Ataby A, Al-Naima F (2010) A modified high capacity image steganography technique based on wavelet transform. Int Arab J Inform Technol 7(4):358–364

    Google Scholar 

  5. Anita Pradhan KRS, Swain G (2016) Digital image steganography based on seven way pixel value differencing. Indian J Sci Technol 9(37):1–11

    Google Scholar 

  6. Arya H, Singh S, Kushwah BV, Jain P (2016) A Survey on Digital Watermarking Techniques. Int J Eng Technol Sci Res IJETSR ISSN 2394–3386 3(5):240–245

    Google Scholar 

  7. Md Asikuzzaman And Mark R. Pickering, “An Overview Of Digital Video Watermarking”, IEEE Trans Circ Syst Video Technol, Volume 28, Issue 9 , pp.2061–2077, 2018

  8. Assini I, Badri A, Safi K, Sahel A, Baghdad A (2017) Hybrid multiple watermarking technique for securing medical image using DWT-FWHT-SVD. 3rd international conference on advanced Technologies for Signal and Image Processing – ATSIP '2017, Fez, Morocco

  9. Bhaskar T, Vasumathi D (2015) DCT based watermark embedding into mid frequency of DCT coefficients using luminance component. Int Res J Eng Technol (IRJET) 02(3):738–741

    Google Scholar 

  10. Chaudhari MM, Pawar KN (2015) Stationary wavelet transform based steganography for transmitting images. International Journal of Innovative Research in Science, Engineering and Technology 4(12):12064–12069

    Google Scholar 

  11. Dar SB, Dar AB (2014) Watermarking in frequency domain a review. Int J Eng Comput Sci ISSN: 2319–7242 3(11):9215–9218

    Google Scholar 

  12. Dar SB, Dar AB (2014) Watermarking in frequency domain a review. Int J Eng Comput Sci ISSN:2319–7242 3(11):9215–9218

    Google Scholar 

  13. Dar SB, Dar AB (2014) Watermarking in frequency domain a review. Int J Eng Comput Sci 3(11):9215–9218

    Google Scholar 

  14. Dhall S, Bhushan B, Gupta S (2016) An improved hybrid mechanism for secure data communication. Int J Comput Netw Inform Sec 8(6):67–78

    Google Scholar 

  15. Dinesh Kumar G, Teja DP, Sykam SR, Devi NS (2017) An efficient watermarking technique for biometric images. 7th Int Conf Adv Comput Commun ICACC 2017 115(2):423–430

    Google Scholar 

  16. Do MN, Vetterli M, Fellow IEEE (2005) The Contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process 14(12):2091–2106

    Google Scholar 

  17. Favorskaya M, Oreshkina E (2015) Digital gray-scale watermarking based on biometrics. Intell Interact Multimed Syst Services 40:203–214

    Google Scholar 

  18. Fazlali HR, Samavi S, Karimi N, Shirani S (2017) Adaptive blind image watermarking using edge pixel concentration. Multimed Tools Appl 76(2):23459–23479

    Google Scholar 

  19. Goel S, Rana A, Kaur M (2013) A review of comparison techniques of image steganography. IOSR J Electr Electron Eng (IOSR-JEEE) 6(1):9–14

    Google Scholar 

  20. Guru J, Damecha H (2014) Digital watermarking classification: a survey. Int J Comput Sci Trends Technol (IJCST) 2(5):8–13

    Google Scholar 

  21. Hallur SR, Kuri S, Kulkarni GH (2015) Robust digital watermarking using DWT-DCT-SVD algorithms for color image. Int J Curr Eng Technol 5(4):2722–2727

    Google Scholar 

  22. Hemani, Singh S (2017) A survey of digital watermarking techniques and performance evaluation metrics. Int J Eng Trends Technol 46(2):128–132

    Google Scholar 

  23. Ingale SP, Dhote CA (2016) Digital watermarking algorithm using DWT technique. International Journal of Computer Science and Mobile Computing, IJCSMC 5(5):1–9

    Google Scholar 

  24. Irfan M, Zheng L, Shahzad H (2013) Review of computing algorithms for discrete fractional Fourier transform. Res J Appl Sci Eng Technol 6(11):1911–1919

    Google Scholar 

  25. Islam MS, Chong UP (2014) A digital image watermarking algorithm based on DWT DCT and SVD. Int J Comput Commun Eng 3(5):356–360

    Google Scholar 

  26. Jain P, Ghanekar U (2017) Robust watermarking technique for textured images. 6th Int Conf Smart Comput Commun ICSCC 2017 Procedia Comput Sci 125:179–186

    Google Scholar 

  27. Jain R, Jain M (2015) Digital image watermarking using 3-level DWT and FFT via image compression. Int J Comput Appl 124(16):35–38

    Google Scholar 

  28. Jane O, Elbaõ E, Lk HG (2014) Hybrid non-blind watermarking based on DWT and SVD. J Appl Res Technol 12(4):750–761

    Google Scholar 

  29. Jangde K, Raja R (2014) Image compression based on discrete wavelet and lifting wavelet transform technique. Int J Sci Eng Technol Res (IJSETR) 3(3):394–399

    Google Scholar 

  30. Katharotiya A k, Patel S, Goyani M (2011) Comparative analysis between DCT & DWT techniques of image compression. J Inform Eng Appl 1(2):9–17

    Google Scholar 

  31. Kullayamma and Sathyanarayana (2016) A novel method of digital image watermarking in spatial domain based on interpolation. International J Adv Res Comput Commun Eng 5(2):451–457

    Google Scholar 

  32. Kumar Sahu A, Swain G (2018) An improved data hiding technique using bit differencing and LSB matching. Int Netw Indonesia J 10(1):17–21

    Google Scholar 

  33. kumar M, Manikandan T, Sapthagirivasan V (2011) Non-blind image watermarking using countourlet transform. Indian J Comput Sci Eng (IJCSE) 2(1):31–38

    Google Scholar 

  34. Lai C-C, Tsai C-C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063

    Google Scholar 

  35. Lokeswara Reddy V, Subramanyam DA, Chenna Reddy DP (2011) Implementation of LSB steganography and its evaluation for various file formats. Int J Ad Netw Appl 2(5):868–872

    Google Scholar 

  36. Loukhaoukha K, Refaey A, Zebbiche K, Nabti M (2015) On the security of robust image watermarking algorithm based on discrete wavelet transform, discrete cosine transform and singular value decomposition. Appl Math Inf Sci 9(3):1159–1166

    Google Scholar 

  37. Manikandaprabu S, Ayyasamy S (2014) An efficient watermarking algorithm based on DWT and FFT approach. Int J Comput Sci Eng (IJCSE) 6(6):211–216

    Google Scholar 

  38. Media K (2018) Online copyright infringement tracker latest wave of research” published by intellectual property office

  39. Pambi M, Swapna E (2016) A review on digital watermarking for copyright protection of digital data. Int J Innovative Eng Manag Res 5(2):169–173

    Google Scholar 

  40. Pareek S, Vyas A (2014) Hybrid watermarking techniques. 1(9):189–192

  41. Parvathavarthini S (2014) An adaptive watermarking process in Hadamard transform. Int J Adv Inform Technol (IJAIT) 4(2):1–7

    Google Scholar 

  42. Patel MB, Patel PKR (2015) Implementation of digital image watermarking using discrete fractional Fourier transform. IJSRD - Int J Sci Res Dev 3(3):1060–1064

    Google Scholar 

  43. Pradhan A, Sahu AK, Gandharba S, Raja Sekhar K (2016) Performance evaluation parameters of image steganography techniques. IEEE Int Conf Res Adv Integrat Nav Syst 14(12):1–11

    Google Scholar 

  44. Pramanik M, Sharma K (2014) Analysis of visual cryptography, steganography schemes and its hybrid approach for security of images. Int J Emerg Technol Adv Eng 4(2):174–179

    Google Scholar 

  45. Ruanaidh JJKO, Dowling WJ, Boland FM (1996) Phase watermarking of images. IEEE Int Conf Image Process 6(3):239–242

    Google Scholar 

  46. Sahu AK, Swain G (2017) Information hiding using group of bits substitution. Int J Commun Antenna Propagation 7(2):162–167

    Google Scholar 

  47. Sahu AK, Swain G (2018) An improved image steganography using bit flipping. Cybernet Inform Technol 18(1):69–80

    Google Scholar 

  48. Saiyyad MAM, Dept NNP (2014) Watermarking of compressed images using SWT technique and fragile approach. IEEE Global Conference on Wireless Computing and Networking (GCWCN) 1(1):254–257

    Google Scholar 

  49. Sangeetha P, Chacko P (2014) Image authentication: a few approaches using digital watermarking. IJAICT 1(1):149–152

    Google Scholar 

  50. Senthilkumaran N, Abinaya S (2016) Digital image watermarking using DFT algorithm. Advanced Computing: An International Journal (ACIJ) 7(1/2):9–17

    Google Scholar 

  51. Shokrollahi Z, Yazdi M (2017) A robust blind watermarking scheme based on stationary wavelet transform. J Inform Hiding Multimed Sign Process 8(3):676–687

    Google Scholar 

  52. Singh P, Agarwal S (2013) A hybrid DCT- SVD based robust watermarking scheme for copyright protection. International Conference on Emerging Trends Eng Technol (ICETET'2013) 13(3):1–5

    Google Scholar 

  53. Snehlata Maloo NL, Pareek NK (2017) Study of digital watermarking techniques for against security attacks. Information Commun Technol Intell Syst (ICTIS 2017) 1:509–515

    Google Scholar 

  54. Sreenivas K, Kamkshi Prasad V (2018) Fragile watermarking schemes for image authentication: a survey. Int J Mach Learn Cybern 9(7):1193–1218

    Google Scholar 

  55. Sun Q, Wang L, Shao Y, Zuo J (2016) Watermarking technique based on three-coefficient comparison in DCT domain. J Supercomput 72(7):189–192

    Google Scholar 

  56. Swain G (2016) Digital image steganography using variable length Group of Bits Substitution. Procedia Comput Sci 85(4):31–38

    Google Scholar 

  57. Tejal, Rao D (2017) A review paper on image steganography and its techniques. Int J Res Appl Sci Eng Technol (IJRASET) 5(4):1756–1761

    Google Scholar 

  58. Thota NR, Devireddy SK (2008) Image compression using discrete cosine transform Nageswara. Georgian Electronic Sci J: Comput Sci Telecommun 17(3):35–43

    Google Scholar 

  59. Tiwari N, Hemrajamani N, Goyal D (2017) Improved digital image watermarking algorithm based on hybrid DWT-FFT and SVD techniques. Indian J Sci Technol 10(3):1–7

    Google Scholar 

  60. Tyagi S, Singh HV, Agarwal R, Gangwar SK (2016) Digital watermarking techniques for security applications. International conference on emerging trends in electrical, electronics and sustainable energy systems (ICETEESES–16): 380–382

  61. Varshney Y (2017) Attacks on digital watermarks: classification, implications, benchmarks. Int J Emerg Technol (Special Issue NCETST-2017) 8(1):229–235

    MathSciNet  Google Scholar 

  62. Vijay B, Swathi J (2015) An efficient fast Hadamard transform oriented digital image-in-image watermarking. Int J Res Appl Sci Eng Technol (IJRASET) 3(5):570–585

    Google Scholar 

  63. Viraktamath SV, Attimarad GV (2011) Impact of quantization matrix on the performance of JPEG. Int J Future Gen Commun Netw 4(3):107–118

    Google Scholar 

  64. Walia E, Jain P, Navdeep (2010) An analysis of LSB & DCT based steganography. Global J Comput Sci Technol 10(1):4–8

    Google Scholar 

  65. Yadav K, Kaushik A (2013) A Review of hybrid digital watermarking. Int J Eng Trends Technol (IJETT) 4(Issue 7):3123–3126

    Google Scholar 

  66. Yadav M, Kumar A (2017) Digital image watermarking using SWT and SVD. International J Adv Res Comput Commun Eng 6(5):87–91

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anshul Chopra.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chopra, A., Gupta, S. & Dhall, S. Analysis of frequency domain watermarking techniques in presence of geometric and simple attacks. Multimed Tools Appl 79, 501–554 (2020). https://doi.org/10.1007/s11042-019-08087-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08087-x

Keywords

Navigation