Title: Energy-based coefficient selection for digital watermarking in wavelet domain

Authors: Fouzia Jabeen; Zahoor Jan; Farhana Jahangir

Addresses: Department of Computer Science, Frontier Women University, Peshawar 25000, Pakistan ' Department of Computer Science, Abdul Wali Khan University, Noshera Mardan Road, Mardan 23200, Pakistan ' Frontier Women University, Naz Cinema Road, Opposite Qila Bala Hisar, Peshawar City 25000, Pakistan

Abstract: The massive spreading of broadband networks and new developments in digital technology has made ownership protection and authorisation of digital multimedia a very important issue. The reason is the availability of powerful tools for editing, lossless copying and transmission of digital multimedia such as images. Image watermarking is now an effective solution for the problem of authentication and protection of copyrighted image content. In this paper, discrete wavelet transform (DWT)-based watermarking technique is proposed in which mean energy of the each of 32 × 32 block in the CH and CV subbands is calculated and range of coefficients that exceed the mean energy of the block are selected for watermark embedding. Watson perceptual distortion control model is considered to keep the perceptual quality of the image and genetic programming (GP) is used to provide optimum watermarking level for the selected coefficients. The results show that there is almost no difference between original and watermarked image demonstrating key feature of imperceptibility. The technique has been tested and proves to be effective against a set of malicious attacks.

Keywords: discrete wavelet transform; DWT; genetic programming; perceptual mask; imperceptibility; robustness; luminance; contrast; noise visibility function; NVF; coefficient selection; digital watermarking; multimedia; image watermarking; image authentication; image protection; copyrighted images; perceptual distortion control; malicious attacks; image security.

DOI: 10.1504/IJICA.2013.052352

International Journal of Innovative Computing and Applications, 2013 Vol.5 No.1, pp.18 - 25

Available online: 28 Feb 2013 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article