Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

A DCT Fractional Bit Replacement Based Dual Watermarking Algorithm for Image Authentication

Author(s): Rahul Dixit, Amita Nandal*, Arvind Dhaka, Yohan Varghese Kuriakose and Vardan Agarwal

Volume 14, Issue 9, 2021

Published on: 18 August, 2020

Page: [2899 - 2919] Pages: 21

DOI: 10.2174/2666255813999200818203600

Price: $65

Abstract

Abstract: Watermarking is a process of embedding a message inside a digital signal like an image, video, or text. It is used for several key reasons such as authenticity verification, ownership recognition and hidden communication. In this paper, we discuss image watermarking, where secret messages are stored in images.

Introduction: We propose a dual watermarking approach, which is based on Discrete Cosine Transform, Discrete Wavelet Transform and Singular Value Decomposition methods. This paper considers one watermark as robust and another watermark as fragile.

Methods: The robust watermark is embedded in the Discrete Wavelet Transform- Singular Value Decomposition - domain and is used to transmit hidden messages. The fragile watermark is embedded in the Discrete Cosine Transform domain and is used for verification of the secret message of the robust watermark. The proposed algorithm is tested in the experimental results section and shows promising results against denoising, rotation, translation and cropping attacks.

Results: The results show that the performance of the proposed algorithm in terms of mean squared error, structural similarity and peak signal to noise ratio is S4considerable as compared with the existing methods.

Discussion: We present the comparison of results with the study by Himanshu et al., in Table 10, from which we can see that our method performs better with Gaussian noise and rotational attack only lacking with Salt and Pepper noise. Fig. 7 and Fig. 8, focusing on the resulting PSNR, show the variation in noise variance and degree of rotation. From the graphs, it is evident that our method performs better against Gaussian and rotational attacks.

Conclusion: In this paper, a dual watermarking method is proposed in which one watermark is fragile, which is called as authentication watermark, whereas the other watermark is robust and is called as the information watermark. The authentication watermark is embedded in the fractional part of the DCT domain in the cover image and the information watermark is embedded in the diagonal vector of the LL sub-band.

Keywords: Discrete cosine transform, discrete wavelet transform, dual watermarking, fragile watermark, noise attack, rotational attack singular value decomposition and translational attack.

Graphical Abstract


Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy