A Comparison of Non Blind Image Watermarking Using Transformation Domain

Etika Kartikadarma(1), Erika Devi Udayanti(2), Christy Atika Sari(3), Mohamed Doheir(4),


(1) Universitas Dian Nuswantoro
(2) Universitas Dian Nuswantoro
(3) Universitas Dian Nuswantoro
(4) Universiti Teknikal Malaysia Melaka

Abstract

Purpose: This study aims to know which of the algorithms had the better results for image processing by comparing these two algorithms for blind watermarking as the prevention of image plagiarism. Methods: The DCT and HWT algorithms used to get better results. Result: The results of this study indicate that HWT has better results for image processing, especially blind watermarking because the results with MSE, PSNR, and NC show that HWT has advantages in every aspect.  using 512x512 pixels grayscale image as cover image, the MSE result from HWT is 0.0004156 with PSNR 81.9440 better than MSE from DCT 0.003 with PSNR 73.2949. Novelty: Robustness aspect has been tested using NC. DCT has good NC than HWT only in JPEG compression attack with value is 1, while another attack has better NC in HWT that yield close to 1.

Keywords

Non Blind, Watermarking, DCT, HWT, Imperceptibility, Robustness

Full Text:

PDF

References

R. Verma and A. Tiwari, “Copyright Protection for Watermark Image Using LSB Algorithm in Colored Image,†Adv. Electron. Electr. Engiinering, vol. 4, no. 5, pp. 499–506, 2014.

N. Divecha and N. N. Jani, “Implementation And Performance Analysis Of DCT-DWT-SVD Based Watermarking Algorithms For Color Images,†2013 Int. Conf. Intell. Syst. Signal Process. ISSP, pp. 204–208, 2013.

D. R. I. M. Setiadi, T. Sutojo, E. H. Rachmawanto, and C. A. Sari, “Fast and efficient image watermarking algorithm using discrete tchebichef transform,†2017 5th Int. Conf. Cyber IT Serv. Manag. CITSM 2017,. IEEE, 2017.

A. Susanto, D. R. I. M. Setiadi, C. A. Sari, and E. H. Rachmawanto, “Hybrid method using HWT-DCT for image watermarking,†2017 5th Int. Conf. Cyber IT Serv. Manag. CITSM 2017., IEEE, 2017.

J. Wang and Z. Du, “A method of processing color image watermarking based on the Haar wavelet,†J. Vis. Commun. Image Represent., vol. 64, p. 102627, 2019.

L. Li, H. H. Xu, C. C. Chang, and Y. Y. Ma, “A novel image watermarking in redistributed invariant wavelet domain,†J. Syst. Softw., vol. 84, no. 6, pp. 923–929, 2011.

U. Sudibyo, F. Eranisa, E. H. Rachmawanto, D. R. I. M. Setiadi, and C. A. Sari, “A secure image watermarking using Chinese remainder theorem based on haar wavelet transform,†2017 4th Int. Conf. Inf. Technol. Comput. Electr. Eng. (ICITACEE)., 2017, pp. 208–212.

N. Kashyap and G. R. SINHA, “Image Watermarking Using 3-Level Discrete Wavelet Transform (DWT),†Int. J. Mod. Educ. Comput. Sci., vol. 4, no. 3, pp. 50–56, 2012.

A. Goswami and S. Khandelwal, “Hybrid DCT-DWT Digital Image Steganography,†Int. J. Adv. Res. Comput. Commun. Eng., vol. 5, no. 6, pp. 228–233, 2016.

J. Chandra and R. S. Wahono, “Integrasi Discrete Wavelet Transform dan Singular Value Decomposition pada Watermark ing Citra untuk Perlindungan Hak Cipta,†J. Intell. Syst., vol. 1, no. 2, pp. 127–135, 2015.

W. S. Sari and C. A. Sari, “A High Result in Wavelet Watermarking Using Singular Value Decomposition,†Kinet. Game Technol. Inf. Syst. Comput. Network, Comput. Electron. Control, vol. 4, no. 3, pp. 269–276, 2019.

S. Singh, V. S. Rathore, R. Singh, and M. K. Singh, “Hybrid semi-blind image watermarking in redundant wavelet domain,†Multimed. Tools Appl., vol. 76, no. 18, pp. 19113–19137, 2017.

X. Ding, Z. M. Lu, F. X. Yu, T. Y. Nie, and J. Sun, “A robust blind image watermarking scheme based on classified vector quantization,†J. Inf. Hiding Multimed. Signal Process., vol. 6, no. 1, pp. 74–80, 2015.

Y.-W. Chang, “A Blind Watermarking Algorithm,†Int. Res. J. Eng. Technol., vol. 4, no. 1, pp. 1–4, 2017.

A. Suheryadi, “Penerapan Digital Watermark Sebagai Validasi Keabsahan Gambar Digital Dengan Skema Blind Watermark,†JTT (Jurnal Teknol. Ter., vol. 3, no. 2, pp. 1–6, 2017.

M. R. Fadhilah, I. Santoso, and A. A. Zahra, “Optimasi Watermarking Pada Citra Biometrik Menggunakan Algoritma Genetika Metode,†TRANSIENT, vol. 6, no. 4, pp. 615–620, 2017.

C. A. Sari, T. S. Sukamto, and E. H. Rachmawanto, “Analisa Robustness Citra Digital Pada Watermarking DCT-DWT,†Pros. SNST, vol. 1, no. 1, pp. 121–124, 2018.

V. S. Member and P. A. Thangavelu, “DC Coefficients Based Watermarking Technique for color Images Using Singular Value Decomposition,†Int. J. Comput. Electr. Eng., vol. 3, no. 1, pp. 8–16, 2011.

V. Gupta and A. Barve, “A Review on Image Watermarking and its technique,†Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 4, no. 1, pp. 92–97, 2014.

A. K. Pal and S. Roy, “A robust and blind image watermarking scheme in DCT domain,†Int. J. Inf. Comput. Secur., vol. 10, no. 4, p. 321, 2018.

O. Hosam and N. Ben Halima, “A hybrid ROI-embedding based watermarking technique using DWT and DCT transforms,†J. Theor. Appl. Inf. Technol., vol. 81, no. 3, pp. 514–528, 2015.

A. Shahid, S. Badsha, M. R. Kabeer, J. Ahsan, and M. Mahmud, “A Non-Blind Watermarking Scheme for Gray Scale Images in Discrete Wavelet Transform Domain using Two Subbands,†IJCSI Int. J. Comput. Sci., vol. 9, no. 5, pp. 101–109, 2012.

P. Kulkarni, “Review of Digital Watermarking Techniques,†Int. J. Innov. Res. Comput. Commun. Eng., vol. 109, no. 16, pp. 40–44, 2015.

S. Agarwal, O. P. Singh, and D. Nagaria, “Analysis and comparison of wavelet transforms for denoising MRI image,†Biomed. Pharmacol. J., vol. 10, no. 2, pp. 831–836, 2017.

J. Wang and G. Wiederhold, “WaveMark: digital image watermarking using daubechies’ wavelets and error correcting coding,†Proc. SPIE, 1998, Spiedigitallibrary.

N. Ben Halima, M. A. Khan, and R. Kumar, “A Novel Approach of Digital Image Watermarking using HDWT-DCT,†2015 Glob. Summit Comput. Inf. Technol. (GSCIT), 2015, pp. 1–6, IEEE.

U. Sara, M. Akter, and M. S. Uddin, “Image Quality Assessment through FSIM, SSIM, MSE and PSNR—A Comparative Study,†J. Comput. Commun., vol. 7, no. 3, pp. 8–18, 2019.

C. A. Sari, E. H. Rachmawanto, and E. J. Kusuma, “Good Performance Image Encryption Using Selective Bit T-DES on Inverted LSB Steganography,†J. Ilmu Komput. dan Inf., vol. 12, no. 1, pp. 41–29, 2019.

Refbacks

  • There are currently no refbacks.




Scientific Journal of Informatics (SJI)
p-ISSN 2407-7658 | e-ISSN 2460-0040
Published By Department of Computer Science Universitas Negeri Semarang
Website: https://journal.unnes.ac.id/nju/index.php/sji
Email: [email protected]

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.