Loading [MathJax]/extensions/MathMenu.js
Chaotic digital image watermarking scheme based on DWT and SVD | IEEE Conference Publication | IEEE Xplore

Chaotic digital image watermarking scheme based on DWT and SVD


Abstract:

In this study chaos based digital watermarking scheme together with Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) is proposed. In the proposed w...Show More

Abstract:

In this study chaos based digital watermarking scheme together with Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) is proposed. In the proposed watermarking scheme, the cover image is decomposed to its sub-bands (LL, LH, HL and HH) by a common used frequency domain transform: DWT. Then, the SVD is directly applied to the all sub-bands of the decomposed cover image. The watermark is shuffled with Arnold's Cat Map (ACM) to generate a chaotic watermark. By this way, the robustness and perceptual invisibility of the scheme is improved. In order to evaluate the robustness of the proposed scheme, several image processing and geometric attacks are applied to the scheme. The Normalized correlation (NC) and peak signal-to-noise ratio (PSNR) measures are used to show the performance of the proposed method in terms of robustness and perceptual invisibility. The proposed algorithm gives the promising results and meets the security requirements.
Date of Conference: 26-28 November 2015
Date Added to IEEE Xplore: 01 February 2016
Electronic ISBN:978-6-0501-0737-1
Conference Location: Bursa, Turkey

1. Introduction

In recent years digital watermarking has gained great deal of importance with the explosion of the digital media. Several digital watermarking techniques are developed to prevent the unpermitted data transmission and protect the data from the intentional and unintentional attacks. The goal of the digital image watermarking techniques is to embed a secret signal called as watermark to the cover image. The most common applications of the digital watermarking methods are copyright protection, broadcast monitoring, tamper detection, authentication and integrity verification, fingerprinting, content description and secure communication.

Contact IEEE to Subscribe

References

References is not available for this document.