A reliable and secure image watermarking algorithm using homomorphic transform in DWT domain
Image watermarking is one of the reliable methods which easily retains integrity and confidentiality of images against illegitimate users thereby ensuring copyright protection. In this paper a new image watermarking technique is proposed which employs fusion of discrete wavelet transform (DWT), homo...
Saved in:
Published in | Multidimensional systems and signal processing Vol. 32; no. 1; pp. 131 - 160 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.01.2021
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Image watermarking is one of the reliable methods which easily retains integrity and confidentiality of images against illegitimate users thereby ensuring copyright protection. In this paper a new image watermarking technique is proposed which employs fusion of discrete wavelet transform (DWT), homomorphic transform (HT), singular value decomposition along with Arnold transform (AT). In this work first level DWT is performed on host image which results in various subbands (LL, HL, LH and HH). HL subband is chosen which is further transformed by HT to decompose it in illumination and reflectance components. The watermark is scrambled with AT in order to strengthen security towards malicious attacks. Scrambled watermark is now embedded into singular values of the reflectance component. As reflectance component contains prominent image features, hence embedding in this part provides better immunity against several attacks and imperceptibility is also attained as this component varies very rapidly. Thus, major aim for proposed watermarking technique is achieved. The proposed scheme is implemented with numerous wavelet families such as Haar, Coiflet, symlet and biorthogonal. The main idea for implementing with different wavelets is to judge which wavelet demonstrates good robustness against various attacks. Proposed scheme performance is also evaluated by examining comprehensively under several attacks such as rotation, sharpening. Results clearly prove high robustness for the proposed scheme. Superiority of proposed scheme is clearly indicated by comparing it with other commonly—used schemes as reported by other researchers. Benchmark attacks like “Checkmark” attacks are also verified for the proposed scheme. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 0923-6082 1573-0824 |
DOI: | 10.1007/s11045-020-00732-1 |