Skip to main content
Log in

Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents a new robust hybrid multiple watermarking technique using fusion of discrete wavelet transforms (DWT), discrete cosine transforms (DCT), and singular value decomposition (SVD) instead of applying DWT, DCT and SVD individually or combination of DWT-SVD / DCT-SVD. For identity authentication purposes, multiple watermarks are embedded into the same medical image / multimedia objects simultaneously, which provides extra level of security with acceptable performance in terms of robustness and imperceptibility. In the embedding process, the cover image is decomposed into first level discrete wavelet transforms where the A (approximation/lower frequency sub-band) is transformed by DCT and SVD. The watermark image is also transformed by DWT, DCT and SVD. The S vector of watermark information is embedded in the S component of the cover image. The watermarked image is generated by inverse SVD on modified S vector and original U, V vectors followed by inverse DCT and inverse DWT. The watermark is extracted using an extraction algorithm. Furthermore, the text watermark is embedding at the second level of the D (diagonal sub-band) of the cover image. The security of the text watermark considered as EPR (Electronic Patient Record) data is enhanced by using encryption method before embedding into the cover. The results are obtained by varying the gain factor, size of the text watermark, and cover medical images. The method has been extensively tested and analyzed against known attacks and is found to be giving superior performance for robustness, capacity and reduced storage and bandwidth requirements compared to reported techniques suggested by other authors.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Awasthi M, Lodhi H (2013) Robust image watermarking based on discrete wavelet transform, discrete cosine transform & singular value decomposition. Adv Electron Electr Eng 3(8):971–976

    Google Scholar 

  2. Bender W, Gruhl D, Morimoto N, Lou A (1996) Techniques for data hiding. IBM Syst J 35(3&4):313–336

    Article  Google Scholar 

  3. Chellappa R, Theodoridis S (2014) Academic press library in signal processing: signal processing theory and machine learning. 1

  4. Craver S (1997) On public-key steganography. In: The Presence of an Active Warden Technical Report RC 20931, IBM

  5. NHS Executive (2001) Information for Health: An Information Strategy for the Modern NHS 1998–2005. Wetherby: Department of Health Publications; 1998 and NHS Executive. Building the Information Core - Implementing the NHS Plan. London: Department of Health

  6. Golshan F, Mohammadi K (2013) A hybrid intelligent SVD-based perceptual shaping of a digital image watermark in DCT and DWT domain. Imaging Sci J 61(1):35–46

    Article  Google Scholar 

  7. Gunjal BL, Mali SN (2012) Applications of digital image watermarking in industries. CSI Commun

  8. Harish NJ, Kumar SBB, Kusagur A (2013) Hybrid robust watermarking techniques based on DWT, DCT, and SVD. Int J Adv Electr Electron Eng 2(5):137–143

    Google Scholar 

  9. Hartung F, Ramme F (2000) Digital rights management and watermarking of multimedia content for m-commerce applications. IEEE Commun Mag 38(11)

  10. Horng S-J, Rosiyadi D, Fan P, Wang X, Khan MK (2014) An adaptive watermarking scheme for e-government document images. Multimedia Tools Appl 72(3):3085–3103

    Article  Google Scholar 

  11. Horng S-J, Rosiyadi D, Li T, Takao T, Guo M, Khan MK (2013) A blind image copyright protection scheme for e-government. J Vis Commun Image Represent 24(7):1099–1105

    Article  Google Scholar 

  12. Katzenbeisser S, Petitcolas FAP (2000) Information hiding techniques for steganography and digital watermarking. Artech House, London

    Google Scholar 

  13. Kelkar V, Shaikh H, Mohd. I K (2013) Analysis of robustness of hybrid digital image watermarking technique under various attacks. Int J Comput Sci Mob Comput 2(3):137–143

    Google Scholar 

  14. Khan MI, Rahman M, Sarker IH (2013) Digital watermarking for Image authentication based on combined DCT, DWT, and SVD Transformation. Int J Comput Sci Issues 10(5):223–230

    Google Scholar 

  15. Lai C-C, Tsai C-C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063

    Article  Google Scholar 

  16. Lin W-H, Horng S-J, Kao T-W, Fan P, Lee C-L, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimedia 10(5):746–757

    Article  Google Scholar 

  17. Lin W-H, Wang Y-R, Horng S-J, Kao T-W, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36(9):11509–11516

    Article  Google Scholar 

  18. Lin W-H, Wang Y-R, Horng S-J (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36(6):9869–9878

    Article  Google Scholar 

  19. Madhesiya S, Ahmed S (2013) Advanced technique of digital watermarking based on SVD-DWT-DCT and Arnold transform. Int J Adv Res Comput Eng Technol 2(5):1918–1923

    Google Scholar 

  20. Mallat SG (1989) The theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans Pattern Anal Mach Intell 11(7):693–654

    Article  MATH  Google Scholar 

  21. Mohanty SP (1999) Watermarking of digital images. M.S. Thesis, Indian Institute of Science, India

  22. Navas KA, Cheriyan AM, Lekshmi M, Tampy SA, Sasikumar M (2008) DWT-DCT-SVD based watermarking. Third International conference on Communication Systems Software and Middleware and Workshops, COMSWARE, pp. 271–274

  23. Nidhi HD, Jani NN (2012) Image watermarking algorithm using DCT, DWT and SVD. Int J Comput Appl, pp. 13–16

  24. Pal K, Ghosh G, Bhattacharya M (2012) Biomedical image watermarking in wavelet domain for data integrity using bit majority algorithm and multiple copies of hidden information. Am J Biomed Eng 2(2):29–37

    Article  Google Scholar 

  25. Rosiyadi D, Horng S-J, Fan P, Wang X (2012) Copyright protection for e-government document images. IEEE MultiMedia 19(3):62–73

    Article  Google Scholar 

  26. Rosiyadi D, Horng S-J, Suryana N, Masthurah N (2012) A comparison between the hybrid using genetic algorithm and the pure hybrid watermarking scheme. Int J Comput Theory Eng (IJCTE) 4(3):329–331

    Article  Google Scholar 

  27. Simmons GJ (1984) The prisoners’ problem and the subliminal channel. In: Advances in Cryptology, Proceedings of CRYPTO 83, Plenum Press, pp. 51–67

  28. Singh AK, Dave M, Mohan A. A Hybrid Algorithm for Image Watermarking against Signal Processing Attack. S. Ramanna et al. (Eds.) Proceedings of 7th Multi-Disciplinary International Workshop in Artificial Intelligence, Krabi-Thailand, December 9–11, 2013, Lecture Notes in Computer Science (LNCS) Vol. 8271, pp. 235–246, Springer

  29. Singh AK, Dave M, Mohan A (2014) Wavelet based image watermarking: futuristic concepts in information security. Proc Natl Acad Sci India Sect A Phys Sci 84(3):345–359. doi:10.1007/s40010-014-0140-x, Springer

    Article  Google Scholar 

  30. Singh AK, Dave M, Mohan A (2014) Hybrid technique for robust and imperceptible image watermarking in DWT- DCT-SVD domain. Natl Acad Sci Lett 37(4):351–358

    Article  Google Scholar 

  31. Singh AK, Dave M, Mohan A (2015) Hybrid technique for robust and imperceptible multiple watermarking using medical images. J Multimedia Tools Appl. doi:10.1007/s11042-015-2754-7

    Google Scholar 

  32. Singh AK, Dave M, Mohan A (2015) Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wirel Pers Commun Int J 83(3):2133–2150

    Article  Google Scholar 

  33. Singh A, Tayal A (2012) Choice of wavelet from wavelet families for DWT-DCT-SVD image watermarking. Int J Comput Appl 48(17):9–14

    Google Scholar 

  34. Srivastava A, Saxena P (2013) DWT-DCT-SVD based semiblind image watermarking using middle frequency band. IOSR J Comput Eng 12(2):63–66

    Article  Google Scholar 

  35. Terzija N, Repges M, Luck K, Geisselhardt W (2002) Digital image watermarking using DWT: performance comparision on error correcting codes. Vis Imaging Image Process Proc (364)

  36. Wang B, Ding J, Wen Q, Liao X, Liu C (2009) An image watermarking algorithm based on DWT DCT and SVD. IEEE International Conference on Network Infrastructure and Digital Content, Beijing, pp. 1034–1038

Download references

Acknowledgments

The Author’s are sincerely thankful to the potential/ anonymous reviewer’s for their critical comments and suggestions to improve the quality of the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Kumar Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, A.K. Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Appl 76, 8881–8900 (2017). https://doi.org/10.1007/s11042-016-3514-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3514-z

Keywords

Navigation