On Secure Digital Image Watermarking Techniques
Manjit Thapa, Sandeep Kumar Sood
DOI: 10.4236/jis.2011.24017   PDF   HTML     7,767 Downloads   17,105 Views   Citations


Digital watermarking is used to hide the information inside a signal, which can not be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party. With a lot of information available on various search engines, to protect the ownership of information is a crucial area of research. In latest years, several digital watermarking techniques are presented based on discrete cosine transform (DCT), discrete wavelets transform (DWT) and discrete fourier transforms (DFT). In this paper, we propose an algorithm for digital image watermarking technique based on singular value decomposition; both of the L and U components are explored for watermarking algorithm. This technique refers to the watermark embedding algorithm and watermark extracting algorithm. The experimental results prove that the quality of the watermarked image is excellent and there is strong resistant against many geometrical attacks.

Share and Cite:

M. Thapa and S. Sood, "On Secure Digital Image Watermarking Techniques," Journal of Information Security, Vol. 2 No. 4, 2011, pp. 169-184. doi: 10.4236/jis.2011.24017.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] D. Kundur and D. Hatzinakos, “Digital Watermarking Using Multiresolution Wavelet Decomposition,” Speech and Signal Processing Proceedings, Acoustics, 1997, pp. 2969-2972.
[2] P. Zeng and C. Jin, “Image Adaptive Watermarking Using Visual Models”, IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, 1998, pp. 525-539. doi:10.1109/49.668975
[3] L. Rajab, T. Khatib and A. Haj, “Combined DWT-DCT Digital Image Watermarking,” Journal of Computer Science, Vol. 3, 2002, pp. 740-749.
[4] C. C. Chang and P. Tsai, “SVD-based Digital Image Watermarking Scheme,” Pattern Recognition Letters, Vol. 26, No. 10, 2005, pp. 1577-1586. doi:10.1016/j.patrec.2005.01.004
[5] T. V. Nguyen and J. C. Patra, “A Simple ICA Based Digital Image Watermarking Scheme,” Digital Signal Processing, Vol. 18, No. 5, 2007, pp. 762-776. doi:10.1016/j.dsp.2007.10.004
[6] A. H. Ali and M. Ahmad, “Digital Audio Watermarking Based on the Discrete Wavelets Transform and Singular Value Decomposition,” Europe Journal of Science Research, Vol. 39, No. 1, 2010, pp. 6-21.
[7] C. I. Podilchuk and E. J. Delp, “Digital Watermarking: Algorithms and Applications,” IEEE Signal Processing Magazine, Vol. 18, No. 4, 2001, pp. 33-46. doi:10.1109/79.939835
[8] B. Kim, J. G. Choi and D. Min, “Robust Digital Watermarking Method Against Geometric Attacks,” Real Time Imaging Processing, Vol. 9, No. 2, 2003, pp. 139-149. doi:10.1016/S1077-2014(03)00020-2
[9] H. Tina, W. Lu, R. prawn and Y. Ming, “A Fragile Watermarking Scheme for 3D meshes,” MM-SEC’05, ACM, pp. 117-123, 2008.
[10] W. Loo and X. Kingsbury, “Digital Watermarking using Complex Wavelets,” International Conference on Image Processing, Vol. 3, 1999, pp. 29-32.
[11] M. Jiansheng and L. Sukang, “A Digital Watermarking Algorithm Based on DCT and DWT,” International Sym- posium on Web Information System and Application (WISA), 2009, pp. 104-107.
[12] A. H. Ali and M. Ahmad, “Digital Audio Watermarking Based on the Discrete Wavelets Transform and Singular Value Decomposition,” Europe Journal of Science Research, Vol. 39, No. 1, 2010, pp. 6-21.
[13] W. Lu, H. Lu and F. L. Chung, “Feature Based Watermarking Using Watermark Template Match,” Applied Mathematics and Computation, Vol. 177, No. 1, 2011, pp. 886-893.
[14] Y. Lu, K. Uehira and K. Yanaka, “Practical Evaluation of Illumination Watermarking Technique Using Orthogonal Transforms,” Journal of Display Technology, Vol. 6, No. 9, 2010, pp. 351-358. doi:10.1109/JDT.2010.2049336

Copyright © 2022 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.