Int. J. of Intelligent Engineering Informatics   »   2011 Vol.1, No.3/4

 

 

Title: Multiple watermarking for copyright protection using DWT and dual-tree CWT

 

Authors: Sushila Kamble; Vikas Maheshkar; Suneeta Agarwal; Vinay Kumar Srivastava

 

Addresses:
Computer Science and Engineering Department, Motilal Nehru National Institute of Technology, Allahabad, 211004, India.
Computer Science and Engineering Department, Motilal Nehru National Institute of Technology, Allahabad, 211004, India.
Computer Science and Engineering Department, Motilal Nehru National Institute of Technology, Allahabad, 211004, India.
Electronics and Communication Engineering Department, Motilal Nehru National Institute of Technology, Allahabad, 211004, India

 

Abstract: This paper proposes two techniques for multiple image watermarking based on discrete wavelet transform (DWT) and dual-tree complex wavelet transform (DT-CWT) using spread transform. The proposed scheme embed two watermarks by spreading the orthogonal projection vectors into the cover vectors extracted from the first level decomposition discrete wavelet coefficients in first technique and dual tree CWT coefficients of the host image in the second technique. The spread transform disperse the watermark over a large number of frequencies providing robustness to geometric attacks like rotation, scaling, cropping, etc., as well as compression like JPEG. The multiple watermark signals are embedded in different orientations of projection vectors which increase the embedding capacity as compared to the single watermark embedding techniques. The experimental results show that the watermarked image by both the techniques has good visual quality in terms of PSNR. Thus the proposed scheme provides the balanced trade off between important parameters of watermarking, i.e., capacity, robustness and imperceptibility.

 

Keywords: discrete wavelet transform; DWT; dual tree CWT; complex wavelet transform; DT-CWT; multiple watermarking; spread transform; robustness; copyright protection; security; geometric attacks.

 

DOI: 10.1504/IJIEI.2011.044104

 

Int. J. of Intelligent Engineering Informatics, 2011 Vol.1, No.3/4, pp.348 - 369

 

Submission date: 28 Feb 2011
Date of acceptance: 18 Jul 2011
Available online: 09 Dec 2011

 

 

Editors Full text accessAccess for SubscribersPurchase this articleComment on this article