Performance Comparison of Single and Multiple Watermarking Techniques

Full Text (PDF, 298KB), PP.28-34

Views: 0 Downloads: 0

Author(s)

Mohananthini Natarajan 1,* Yamuna Govindarajan 1

1. Department of Electrical Engineering, Annamalai University, Tamilnadu, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2014.07.04

Received: 15 Sep. 2013 / Revised: 11 Jan. 2014 / Accepted: 16 Mar. 2014 / Published: 8 Jun. 2014

Index Terms

Watermarking, additive, multiplicative, hybrid, attacks, discrete wavelet transform

Abstract

The present work compares single and multiple watermarking by using discrete wavelet transform and different embedding methods. The different embedding methods are additive, multiplicative and hybrid watermarking with importance on its robustness versus the imperceptibility of the watermark. The objective quality metrics are demonstrated that, the additive embedding method achieves superior performance against watermark attacks on multiple watermarking technique.

Cite This Paper

Mohananthini Natarajan, Yamuna Govindarajan, "Performance Comparison of Single and Multiple Watermarking Techniques", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.7, pp.28-34, 2014. DOI:10.5815/ijcnis.2014.07.04

Reference

[1]S. Agreste and L. Puccio, “Wavelet-based watermarking algorithms: theory, applications and critical aspects,” International Journal of Computer Mathematics, Vol. 88, No. 9, 2011, pp. 1885-1895.
[2]Baisa L. Gunjal and Suresh N. Mali, “Strongly Robust and Highly Secured DWT-SVD Based Color Image Watermarking: Embedding Data in All Y, U, V Color Spaces,” International Journal of Information Technology and Computer Science, Vol. 3, 2012, pp. 1-7.
[3]Rosline Nesakumari. G, Vijayakumar . V and Ramana Reddy. B. V, “Generation of an Efficient Digital Watermark Key Based on Honey Comb Polynomial Interpolation Approach”, International Journal of Computer Network and Information Security, Vol. 3, 2013, pp. 47-55.
[4]R. Safabakhsh, S. Zaboli and A. Tabibiazar, “Digital watermarking on still images using Wavelet transform,” International Conference on Information Technology: Coding and Computing ITCC 2004, Las Vegas.
[5]Peter H. W. Wong, Oscar C. Au and Y. M. Yeung, “A Novel Blind Multiple Watermarking Technique for Images”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, 2003.
[6]Yuan Yuan, Decai Huang and Duanyang Liu, “An Integer Wavelet Based Multiple Logo-watermarking Scheme”, First International Multi-Symposiums on Computer and Computational Sciences, IMSCCS 2006, Hanzhou.
[7]Daniel Mark, Andreas Uhl and Hartmut Wernisch, “Experimental Study on Watermark Interference in Multiple Re-Watermarking, Security, Steganography and Watermarking of Multimedia Contents”, Proceedings of the SPIE, 2007, San Jose.
[8]Xi Chen and Shiguo Lian, “On the Collusion-Resistance of the Fingerprinting Algorithm Based on Additive Watermarking,” Journal of Multimedia, Vol. 6, No. 4, 2011, pp. 369-375.
[9]Antonis K. Mairgiotis, Nikolaos P. Galatsanos and Yongyi Yang, “New Additive Watermark Detectors Based on A Hierarchical Spatially Adaptive Image Model”, IEEE Transactions on Information Forensics and Security, Vol. 3, No. 1, 2008, pp. 29-37.
[10]Antonis Mairgiotis, George Stylios and Constantinos Constantinopoulos, “Blind transform-based multiplicative watermarking through a hierarchical prior”, Third International Conference on Circuits, Systems, Control Signals, CSCS 2012, Barcelona.
[11]R.G. Van Schyndel, A.Z. Tirkel and I. D. Svalbe, “A Multiplicative Colour Watermark”, IEEE-EURASIP Workshop on Nonlinear Signal and Image Processing, NSIP 1999, Antalya.
[12]Florent Autrusseau, Sylvain David, Vinod Pankajakshan and Patrizio Campisi, “A perceptually driven hybrid additive-multiplicative watermarking technique in the wavelet domain”, SPIE Media Watermarking, Security and Forensics III SPIE, 2011, California.
[13]S Ikeda, Suita, M Yoshida and T Fujiwara, “New hybrid additive-multiplicative watermarking with better trade off between image quality and detection accuracy”, International Symposium on Information Theory and its Applications, ISITA 2012, Honolulu.
[14]Mong-Shu Lee, Image compression and watermarking by wavelet localization,” International Journal of Computer Mathematics, Vol. 80, No. 4, 2010, pp. 401-412.
[15]Chirawat Temi, Somsak Choomchuay and Attasit Lasakul, “A Robust Image Watermarking Using Multiresolution Analysis of Wavelet”, International Symposium on Communications and Information Technology, ISCIT 2005, Beijing.
[16]Tapas Bandyopadhyay, B Bandyopadhyay and B N Chatterji, “Image security through SVD based robust watermarking and compression techniques,” International Journal of Emerging Trends & Technology in Computer Science, Vol. 1, No. 3, 2012, pp. 160-165.