Skip to main content

A Joint DWT-DCT Based Robust Digital Watermarking Algorithm for Ownership Verification of Digital Images

  • Conference paper
Computer Networks and Intelligent Computing (ICIP 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 157))

Included in the following conference series:

Abstract

In this paper, a robust digital image watermarking algorithm based on joint Discrete Wavelet Transform and Discrete Cosine Transform (DWT-DCT) is proposed. The proposed system provides imperceptibility and higher robustness against common signal processing attacks. A binary watermarked image is embedded in certain subbands of a 3-level DWT transformed coefficients of a host image. Then, DCT coefficients of each selected DWT subband is computed. A randomly generated two-dimensional key is used to encrypt the watermark. This 2D key provides security to the image and ownership copyrights. The PN-sequences of the encrypted watermark bits are embedded in the coefficients of the corresponding DCT middle frequencies providing higher security. In extraction stage, the same approach as that of the embedding process is used to extract the DCT middle frequencies of each subband. Finally, correlation between mid-band coefficients and PN-sequences is calculated to determine watermark bit which is again post-processed by the two-dimensional key generated to derive the actual watermark. Experimental results show that the proposed method based on joint procedure of DWT-DCT may be used for watermarking the digital images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kim, Y., Kwon, O., Park, R.: Wavelet Based Watermarking Method for Digital Images Using the Human Visual System. In: IEEE International Symposium on Circuits and Systems, vol. 4, pp. 80–83 (July 1999)

    Google Scholar 

  2. Lin, S., Chin, C.: A Robust DCT-based Watermarking for Copyright Protection. IEEE Transactions on Consumer Electronics 46(3), 415–421 (2000)

    Article  Google Scholar 

  3. Wang, Y., Doherty, J.F., Dyck, R.E.V.: A Wavelet-Based Watermarking Algorithm for Ownership Verification of Digital Images. IEEE Transactions on Image Processing 11(2), 77–88 (2002)

    Article  Google Scholar 

  4. Nikolaidis, A., Pitas, I.: Asymptotically Optimal Detection for Additive Watermarking in the DCT and DWT Domains. IEEE Transactions on Image Processing 2(10), 563–571 (2003)

    Article  Google Scholar 

  5. Chu, W.: DCT-Based Image Watermarking Using Sub sampling. IEEE Transactions on Multimedia 5(1), 34–38 (2003)

    Article  Google Scholar 

  6. Deng, W., Wang, B.: A Novel Technique For Robust Image Watermarking in the DCT Domain. In: Proceedings of IEEE International Conference on Neural Networks and Signal Processing, vol. 2, pp. 1525–1528 (2003)

    Google Scholar 

  7. Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 2nd edn. Prentice Hall Inc., Englewood Cliffs (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Laskar, R.H., Choudhury, M., Chakraborty, K., Chakraborty, S. (2011). A Joint DWT-DCT Based Robust Digital Watermarking Algorithm for Ownership Verification of Digital Images. In: Venugopal, K.R., Patnaik, L.M. (eds) Computer Networks and Intelligent Computing. ICIP 2011. Communications in Computer and Information Science, vol 157. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22786-8_61

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22786-8_61

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22785-1

  • Online ISBN: 978-3-642-22786-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics