A Blind Watermarking Algorithm Using DWT and DCT Techniques for Color Image

Article Preview

Abstract:

In this paper, a robust watermarking technique which combines features of Discrete Wavelet Transformation (DWT) and Discrete Cosine Transformation (DCT) is proposed. Firstly the original color image is converted from RGB space to Lab space. In this technique, DWT is used to decompose the luminance coefficients into various frequency and time scale. The block DCT is applied on DWT coefficients of middle frequency to provide high level of robustness. The encrypted watermark is embedded in it by comparison of the intermediate frequency coefficients. Then the color image is converted from Lab space to RGB space to get the watermarked image. Extracting the watermark does not need the original image and the original watermark, it is a blind watermarking method. Finally, the watermarked image is attacked. Peak signal-to-noise ratio (PSNR) value and the normalized correlation (NC) coefficient value are used to evaluate this technique. Simulation experiments show that the watermark is perceptually invisible, this method can achieve the highest possible robustness without losing the transparency.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

179-182

Citation:

Online since:

January 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] G.W. Guo: Computer Simulation Technology Vol. 26(2009), pp.137-140.

Google Scholar

[2] H.S. Chen. A Study on Forgery Prevention Algorithm of Digital Watermarking for Printing Image(Xi'an University of Technology, Xi'an2005).

Google Scholar

[3] L.K. Fei, W.L. Tang, Z.F. Ding: Journal of East China Jiaotong University Vol. 23(2006), pp.55-58.

Google Scholar

[4] B.Z. Wang, L.M. Cheng, K.J. Jia: Journal of HeBei University of Technology Vol. 36(2007), pp.50-56.

Google Scholar

[5] D. Yang: Graphics and image processing Vol. 03(2014), pp.53-57.

Google Scholar