Digital Image Watermarking in Discrete Fourier Transform domain
DOI:
https://doi.org/10.26438/ijcse/v6i5.1622Keywords:
Discrete Fourier Transform (DFT), CDMA Image Watermarking, Peak Signal to Noise Ratio (PSNR), Normalized Correlation (NC)Abstract
The rapid development of internet communication has increased the rate at which digital data is being shared wideley as the digital data can be flawlessly copied and distributed over the internet. A Digital watermarking is a process in which a bit of information is added to the digital data like image video and audio. A CDMA based image watermarking method in Discrete Fourier Transform (DFT) is proposed in this paper for protecting the copyright and authentication of the digital image. The original digital image is divided into a non-overlapping block of 8X8 and one bit of binary information is embedded in the block using two highly uncorrelated Pseudo-random sequences in the coefficient of the magnitude domain of DFT. For watermark extraction, the original image is not required. Based on the correlation values between magnitude coefficient and Pseudo-random sequences the watermark is extracted from the watermarked image. The scheme is tested using Stimark Benchmarking tools. The Experimental result suggested that the method is robust against numbers of digital watermarking attacks.
References
[1] Chandramouli, R., Memon, N., & Rabbani, M. (2002). Digital watermarking. Encyclopedia of Imaging Science and Technology.
[2] Mohanty, S. P., Sengupta, A., Guturu, P., & Kougianos, E. (2017). Everything You Want to Know About Watermarking: From Paper Marks to Hardware Protection: From paper marks to hardware protection. IEEE Consumer Electronics Magazine, 6(3), 83-91.
[3] Qidwai, U., & Chen, C. H. (2009). Digital image processing: an algorithmic approach with MATLAB. CRC press.
[4] Ruanaidh, J. J. K. O., Dowling, W. J., & Boland, F. M. (1996, September). Phase watermarking of digital images. In Image Processing, 1996. Proceedings., International Conference on(Vol. 3, pp. 239-242). IEEE.
[5] Voloshynovskiy, S., Pereira, S., Iquise, V., & Pun, T. (2001). Attack modelling: towards a second generation watermarking benchmark. Signal processing, 81(6), 1177-1214.
[6] Janthawongwilai, K., & Amornraksa, T. (2004, October). Improved performance of amplitude modulation based digital watermarking. In Communications and Information Technology, 2004. ISCIT 2004. IEEE International Symposium on (Vol. 1, pp. 318-323). IEEE.
[7] Na, W., Yunjin, W., & Xia, L. (2009, December). A novel robust watermarking algorithm based on DWT and DCT. In Computational Intelligence and Security, 2009. CIS'09. International Conference on (Vol. 1, pp. 437-441). IEEE.
[8] Fabien A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn. Attacks on copyright marking systems, in David Aucsmith (Ed), Information Hiding, Second International Workshop, IH’98, Portland, Oregon, U.S.A., April 15-17, 1998, Proceedings, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 219-239.
[9] Mazumder, J. A., & Hemachandran, K. (2014). Color Image Steganography Using Discrete Wavelet Transformation and Optimized Message Distribution Method. International Journal of Computer Sciences and Engineering, 2(7), 90-100.
[10] Dheeraj Sai D V L N, K N S Aneesh, (2015). Image Water Marking Using Cryptography. International Journal of Computer Sciences and Engineering, 3(7), 171-178.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
