You are on page 1of 11

International Journal of Computer Applications (0975 – 8887)

Volume 51– No.9, August 2012

A Semi-Blind Reference Video Watermarking using


Hybrid Transforms for Copyright Protection
Satyanarayana Murty. P K. Venkatesh Rajesh Kumar. P
Research scholar UG student Associate Professor
Department of ECE Department of ECE Department of ECE
A.U. college of Engg(A) College of Engg, GIITS A.U. college of Engg(A)
Andhra University Andhra University
Vishakapatnam Vishakapatnam

ABSTRACT embed an invisible signal into multimedia data so as to attest


the owner identification of the data and discourage the
When network and storage devices become more popular, the unauthorized copying and distributing of digital information.
digital data more easily and more quickly will be In digital image watermarking the inserted watermark should
distributed. Can be easily pirated copy and did not limit a not degrade the visual perception of an original image.
large number of multimedia information (images, audio and This information of digital data can be extracted later for
ownership verification [1]. Digital watermarking can applied
video). Therefore, people are increasingly concerned about the
to a variety of fields like text, image, audio, video and
protection of intellectual property rights of software. A lot of techniques are available for protecting the
multimedia. Digital watermarking is a useful and the copyrighted material. The first method for hiding
development of the technology; it is direct information in the watermarking is by directly changing original cover-media.
original additional information embedded in the The advantages are simple and fast calculated but cannot
technology. Ideally, the digital watermark is added to the data protect itself from varied signal processing attacking [2, 3].
and the original data should be no visual difference, and the The most of watermarking techniques embed the information
data in the coefficients of transformation domain of the cover
digital watermark cannot be protected information not in the
image, such as Fourier transformation, discrete cosine
case of damage easily be removed or modified. In this paper transformation, wavelet transformation and singular value
we propose a three robust and semi-blind digital video water decomposition. Image watermarking algorithms using
marking algorithm. These algorithms are based on hybrid Discrete Cosine Transform (DCT) [4, 5, 6, 12, 13], Discrete
transforms using the combination of Discrete Cosine Wavelet Transform (DWT) [7, 8, 9, 10, 11], Singular Value
Transform (DCT) and Singular Value Decomposition (SVD), Decomposition (SVD) [14, 15] are available in the literature.
Domain transformation watermarking schemes, in general,
Discrete Wavelet Transform (DWT) and Singular Value
first use DCT and DWT and then transforms the image into
Decomposition (SVD) and Discrete Cosine Transform (DCT), the spatial domain. Watermarking schemes usually focus on
Discrete Wavelet Transform (DWT) and Singular Value watermarking black and white or grayscale images. The data
Decomposition (SVD).The original video is divided to hiding capacity is high in spatial domain and frequency
number of frames. On one frame we apply a correspond domain algorithms based on DCT, SVD. However, these
three hybrid transform algorithms. The process is repeated for algorithms are hardly robust against various attacks, prone to
all the reaming frames. The performance of the proposed tamper and degrade the quality of the watermarked image.
Hybrid domain transforms are also available in the literature
algorithms was evaluated with respect to imperceptibility and
DCT- SVD [16,17,18,19] and DWT-SVD
robustness. The results show that the proposed algorithms [20,21,22,23,24,25,26,27,28,29,30]. Now a day’s people are
give a good Peak Signal to Noise Ratio (PSNR), however looking to authenticate their video content [31, 32] also.
their performance varied with respect to robustness.
In this paper we proposed three semi - blind reference video
Keywords watermarking algorithms DCT- SVD, DWT-SVD and DWT-
DCT-SVD. The rest of the paper is organized as follows:
Network, Storage Devices, multimedia, watermarking, Section 2 describes related work, section 3 contains our
DCT, DWT, SVD, Robustness proposed algorithms, while Section 4 provides experimental
results and in section 5 conclusions and in Section 6
references.
1. INTRODUCTION
Due to the rapid and extensive growth of network technology, Spatial Frequency
digital information can now be distributed much faster and
Spatial frequency of an image can be used to know the
easier. However, according to the insufficient cognizance of
intellectual property, the condition of illegal copies and spread overall activity level in an image. For an image block of
of copyright reserved information are growing serious. To size M N, the spatial frequency is defined as:
protect the copyright of multimedia information and to
decrease the impulse to copy and spread copy right reserved √ ( )
multimedia information. There are immense technical
challenges in discouraging unauthorized copying and Where RF and CF are the row and column frequencies and are
distributing of digital information. Fortunately, digital defined as:
watermarking technique has been proposed as a method to

1
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012

Step 2: Convert every video frame from RGB to

√ ∑ ∑[ ( ) ( )] ( ) color matrix format.


Step 3: Compute the steps 4 to 11 for the Y matrix in each
frame of .
Step 4: The Y matrix is segmented into blocks of size p1 ×
√ ∑ ∑[ ( ) ( )] ( ) p2 via ZIG_ZAG sequence denoted by F l, where l is the
number of blocks.
Step 5: Find out the spatial frequency of all blocks, denoted
2. RELATED WORK by SFFl.
In this paper [33], the authors proposed two blind video Step 6: Significant blocks are found out based on their
watermarking algorithms based on Singular Value spatial frequency. Spatial frequencies of each block are stored
Decomposition transform. Initially the host video is divided in descending order. Then make a threshold on spatial
into frames and on each frame they applied SVD transform. frequency. Those blocks, which have spatial frequency less
They took the binary image as a watermark to be embedded in than or equal to threshold, are considered as significant blocks
and are used for making reference image, which is a size
host video frames. In the first algorithm they embed the
of m × n.
watermark in diagonal fashion. In the second algorithm bits
are inserted in a block-wise fashion. Here they consider the Step 7: Perform DCT on the reference image, which is
imperceptibility, robustness and payload of those algorithms. denoted by
Step 8: Perform SVD transform on both and
In this paper [34], the authors proposed a non-blind video
watermark image, denoted by .
watermarking algorithm. Here also the total video was
divided into frames and they selected randomly some frames ( )
based on some criteria. They applied Discrete Wavelet
Transform to those selected frames. Now the frame divided ( )
into four sub-bands , like LL, LH, HL and HH. They consider
the high frequency bands LH and Hl. A Discrete Cosine Step 9: Modify the single values of reference image with
transform has been applied to those high frequency sub-bands the singular values of watermark as
LH and HL. The mid frequency co-efficients of DCT ( ) ( )
transform were used to embed the watermark.
Where β give’s the watermark strength.
In this paper [35], the authors proposed a hybrid digital video Step 10: Perform inverse SVD,
watermarking using Discrete Wavelet transform and Principal ( )
Component Analysis. The video frames were decomposed Step 11: Perform inverse DCT to construct the modified
into four sub-bands. Then they applied PCA to those wavelet
reference image, denoted by . Again is segmented
sub-bands for watermark insertion. They used a binary image
into blocks of size p1 × p2 and mapped onto their original
as a watermark to embed into a host video.
positions for constructing the watermarked image, denoted
In this paper [36], the authors proposed a hybrid non-blind by
MPEG video watermark using wavelet transform and tensor Step 12: Convert the video frames from to RGB
algebra. They used the higher-order tensor singular value
color matrix.
decomposition and DWT. They used the technique scene
Step 13: Reconstruct frames into final watermarked video
change analysis to embed the watermark.
scene
3. PROPOSED ALGORITHM Watermark Extraction Procedure
The watermark embedding and extraction process has shown
The objective of the watermark extraction is to obtain the
in figure 1.
estimate of the watermark. For watermark extraction, original
reference and watermarked images, left and right singular
3.1 Algorithm using DCT-SVD vectors must be available at the receiver end.
Watermark Embedding Procedure
Step 1: Divide the watermarked video scene into frames ,
The objective of this procedure is to embedded the watermark
i = 1, 2, 3…………n.
into the cover or host video without degrading the original
host video. Step 2: Convert every watermarked video frame from

Step 1: Divide the video scene into frames , RGB to color matrix format.
i = 1, 2, 3…………n. Step 3: Compute the steps 4 to 8 for the Y matrix in each
frame of .

2
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012

Step 4: Using the positions of significant blocks, make the


reference image from the watermarked Y matrix, denoted by ( )

Step 8: Obtain the extracted watermark as:


Step 5: Perform DCT on both and original reference
( )
image, .
Step 6: Perform SVD transform on both DCT coefficients. Step 9: Construct the image watermark W by cascading
watermarks from all frames.
( ) ( )
Step 7: Extract the singular values of the watermark.

Apply
Watermark
DCT-SVD/
Frame f (YCbCr) Embedding
DWT-SVD/
Process
DWT-DCT-SVD
Original video
Video frames Inverse
SVD Transforms

Watermark Frame f
Image (RGB)

Extraction Apply
Process DCT-SVD/
Extracted DWT-SVD/ Video frames
Watermarked
Watermark DWT-DCT-SVD YCbCr
Watermarked Image
Image frames

Fig 1: Generalized watermark Embedding and Extraction process

Step 7: Perform DWT on the reference image. It divides


3.2 Algorithm using DWT-SVD the image into four sub bands, LL, LH, HL and HH. Select
Watermark Embedding Procedure the LL band , Which is denoted by .
Step 1: Divide the video scene into frames ,
Step 8: Perform SVD transform on both and watermark
i = 1, 2, 3…………n. image.
Step 2: Convert every video frame from RGB to
( )
color matrix format.
Step 3: Compute the steps 4 to 11 for the Y matrix in each ( )
frame . Step 9: Modify the single values of reference image with
the singular values of watermark as
Step 4: The Y matrix is segmented into blocks of size p1 ×
p2 via ZIG_ZAG sequence denoted by F l, where l is the
( ) ( )
number of blocks. Here β give’s the watermark strength.

Step 5: Find out the spatial frequency of all blocks, denoted Step 10: Perform inverse SVD,
by SFFl.
( )
Step 6: Significant blocks are found out based on their
spatial frequency. Spatial frequencies of each block are stored
Step 11: Perform inverse DWT to construct the modified
in descending order. Then make a threshold on spatial
frequency. Those blocks, which have spatial frequency less reference image, denoted by . Again is segmented
than or equal to threshold, are considered as significant blocks into blocks of size p1 × p2 and mapped onto their original
and are used for making reference image, which is a size positions for constructing the watermarked image.
of m × n.

3
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012

Step 12: Convert the video frames from to RGB Step 7: Perform DWT on the reference image. It divides
the image into four sub bands, LL, LH, HL and HH. Select
color matrix.
the LL band, which is denoted by . Perform DCT on the
Step 13: Reconstruct frames into final watermarked video
scene , which is denoted by .

Watermark Extraction Procedure Step 8: Perform SVD transform on both and watermark
image,W.
Step 1: Divide the watermarked video scene into frames ,
( )
i = 1, 2, 3…………n.
( )
Step 2: Convert every watermarked video frame from
Step 9: Modify the single values of reference image with
RGB to color matrix format. the singular values of watermark as

Step 3: Compute the steps 4 to 8 for the Y matrix in each


( ) ( )
frame . Where β give’s the watermark strength.
Step 10: Perform inverse SVD,
Step 4: Using the positions of significant blocks, makethe ( )
reference image from the watermarked Y matrix, .
Step 11: Perform inverse DCT denoted by . Now
Step 5: Perform DWT on both and original reference perform DWT on , which is denoted by and is
image, .
segmented into blocks of size p1 × p2 and mapped onto their
Step 6: Perform SVD transform on both and . original positions for constructing the watermarked image.

( ) ( ) Step 12: Convert the video frames from to RGB


Step 7: Extract the singular values of the watermark. color matrix.
Step 13: Reconstruct frames into final watermarked video
( ) scene .

Step 8: Obtain the extracted watermark as: Watermark Extraction Procedure


( ) Step 1: Divide the watermarked video scene into frames ,
Step 9: Construct the image watermark W by cascading where i = 1, 2, 3…………n.
watermarks from all frames.
Step 2: Convert every watermarked video frame from
3.3 Algorithm using DWT- DCT-SVD RGB to color matrix format.
Watermark Embedding Procedure
Step 3: Compute the steps 4 to 8 for the Y matrix in each
Step 1: Divide the video scene into frames , frame .
i = 1, 2, 3…………n. Step 4: Using the positions of significant blocks, make the
Step 2: Convert every video frame from RGB to reference image from the watermarked Y matrix ,
color matrix format.
Step 5: Perform DWT and DCT on both and original
Step 3: Compute the steps 4 to 11 for the Y matrix in each reference image, .
frame .
Step 6: Perform SVD transform on both DCT coefficients.
Step 4: The Y matrix is segmented into blocks of size p1 ×
p2 via ZIG_ZAG sequence denoted by F l, where l is the ( )
number of blocks.
Step 7: Extract the singular values of the watermark.
Step 5: Find out the spatial frequency of all blocks, denoted
by SFFl. ( )
Step 6: Significant blocks are found out based on their
Step 8: Obtain the extracted watermark as:
spatial frequency. Spatial frequencies of each block are stored
in descending order. Then make a threshold on spatial ( )
frequency. Those blocks, which have spatial frequency less
Step 9: Construct the image watermark W by cascading
than or equal to threshold, are considered as significant blocks
watermarks from all frames.
and are used for making reference image, which is a size
of m × n.

4
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012

4. EXPERIMENTAL RESULTS rotation, noise attacks (Gaussian and salt & pepper), cropping,
resize, histogram equalization, motion blur, average and
We evaluated the performance of proposed video median filtering.
watermarking algorithms with host video clips of size xxx.
The video clip is divided into number of frames. The
watermark used in our experiment was a gray scale image.
Snapshot from the video and the watermark are shown in
Figure 2 (a) and (b) respectively.

4.1 Imperceptibility Performance


Imperceptibility means that the perceived quality of the video
clip should not be distorted by the presence of the watermark
Fig 2: Original video snapshot Fig 3: Watermark
[37]. As a measure of the quality of a watermarked video, the
Image
peak signal to noise ratio (PSNR) is typically used has shown
in equation 26. In our work, the watermark was embedded in
the video according to the algorithms discussed in the section
3. For the algorithm DCT-SVD the embedding depth of
watermark was 0.02. The corresponding average PSNR for
the all frames of the watermarked video was 41.6962db. We
used the watermark depth for DWT-SVD and DWT-DCT-SVD
was 0.035. The corresponding PSNR values were 42,2704db
and 41.1233db respectively.

[ ( ) ( )]
√ ( )

Fig 4: watermarked video snapshot


( )

Is the Root Mean Square Error and is a comparison


between the host image and watermarked image.
f (i,j) and F (i,j) represent host and watermarked images
respectively. Size of the host image is N x N.

4.2 Robustness Performance


Robustness of a watermarking algorithm is a measure of the
immunity or resistance of the watermark against attempts to
remove or degrade it from the video frames by different types
of digital signal processing attacks [38]. The similarity
between the original watermark and the extracted watermark
from the attacked watermarked video frames was measured by
using the correlation factor , which is computed using the Fig 5: Extracted watermarked
following Equation:

∑ ̃ 4.3 ATTACKS
( ̃) ( )
√∑ √∑ ̃ 4.3.1 JPEG compression
Where N is the number of pixels in watermark, w and is the The watermarked video frames were compressed with different
original and extracted watermarks respectively. The quality factors. As shown in figure 6 the correlation values
indicate clearly the high robustness of the proposed algorithms.
correlation factor , may take values between -1 and 1. DWT-DCT-SVD method has shown high robustness when
compared with other two methods. But at 20 and 54
We evaluated robustness of the algorithm against the
compression ratios the DWT-SVD was showing good
following video attacks: JPEG compression, video frame robustness.

5
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012

DCT-SVD DWT-SVD DWT-DCT-SVD

0.95

0.9
NCC values

0.85

0.9691
0.9668
0.9196

0.9573
0.9554
0.9542

0.9537
0.9501
0.9445

0.9366
0.9193
0.9167

0.8973
0.8901
0.8

0.8682
0.8565
0.8374
0.8014

0.75

0.7
10 20 36 43 54 80
compression ratios

Fig 6: compression attack

4.3.2 Video Frame Rotation robustness of the algorithms against the video frames rotation.
The DCT-SVD algorithm has shown good robustness against
The watermarked video frames were rotated with different other two algorithms.
angles. As shown in figure 7. The correlation values indicate
.

DCT-SVD DWT-SVD DWT-DCT-SVD

1
0.8
0.6
0.77
0.8418
0.7471

0.7099
0.7033

0.6551
NCC values

0.4
0.5359
0.5249

0.3958

0.4129

0.2
0
-0.3924

-0.2992

-0.3007

-0.3299

-0.3049

-0.2
-0.4
-0.6
10 17 20 33 45
rotation degree values

Fig 7: Rotation attack

4.3.3 Additive Gaussian and Salt & Pepper generally indicate robustness of the proposed algorithms
against addition of Gaussian and Salt and Pepper noise. The
Two kinds of common attacks were Additive Gaussian, Salt & DWT - SVD algorithm has shown high robustness against
pepper noise. Each noise was tested separately with other two algorithms. But at 75% of Salt & Pepper noise the
varying intensities to the watermarked video frames. As DCT-SVD has shown good robustness.
shown in Figure8 and figure 9respectively. These results

6
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012

DCT-SVD DWT-SVD DWT-DCT-SVD

0.8

0.7

0.6
NCC values

0.5

0.7917
0.7625
0.7492
0.6284

0.7105
0.6578

0.6386
0.4

0.6119
0.5985
0.5793
0.5773
0.5655
0.5469

0.4531
0.3
0.3616

0.2

0.1
10% 33% 61% 75% 82%
Salt&pepper noise value

Fig 8: Salt & Pepper attack

Fig 9: Additive Gaussian Noise attack

4.3.4 Average filtering and Median mask values. This has sown in figure 10 and figure 11
respectively. We got good robustness values for these masks.
filtering
For average filtering and median filtering DWT-DCT-SVD
Other important attacks on video were average filtering and algorithm has good robustness values against other two
median filtering. We tried to mask the video by different algorithms.

7
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012

DCT-SVD DWT-SVD DWT-DCT-SVD

0.7
0.6
0.5
0.4

0.633
NCC values

0.4917
0.3

0.2515
0.3121

0.2

0.0645
0.1375

0.0687
0.1
0

-0.0362
-0.0128

-0.0961
-0.103
-0.035

-0.1371
-0.1689
-0.102
-0.1
-0.2
-0.3
3 x3 5 x5 7 x7 9 x9 11 x 11
average filter values

Fig 10: Average filtering attack

DCT-SVD DWT-SVD DWT-DCT-SVD

0.9
0.8
0.7
0.6
NCC values

0.5
0.8583
0.7974

0.4
0.5178
0.6028

0.3
0.4349

0.3225

0.2
0.2716
0.2431

0.1168

0.0777

0.249

0.2067
0.2102
0.213

0.057

0.1
0
3 x3 5 x5 7 x7 9 x9 11 x 11
Median Filter values

Fig 11: Median Filter attack

4.3.5 Cropping and resizing resizing. The resizing was performed from 512-> 128-> 512.
The DWT-DCT-SVD algorithm showed high robustness
Another important attack was cropping. Here we cropped the against other two algorithms. The robustness values of
video such that 25% area was reaming. It showed that DWT- cropping and resizing were shown in figure 12 (a) and figure
DCT-SVD algorithm was good robustness against other two 12 (b) respectively.
algorithms. The other prime image processing attack was

8
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012

DCT-SVD DWT-SVD DWT-DCT-SVD DCT-SVD DWT-SVD DWT-DCT-SVD

0.9 0.75
0.7
0.85
0.65
0.8 0.6
NCC values

NCC values
0.9179
0.55

0.7391
0.8921
0.75
0.5

0.6293
0.7 0.45

0.5036
0.4
0.704

0.65
0.35
0.6 0.3
Cropping (25% area remaining) Resizing (512 -> 128 -> 512)

(a) Cropping (b) Resizing


Fig 12: Cropping and resizing attacks

4.3.6 Histogram equalization and Motion robustness against these attacks. For both the attacks the
blur DWT-DCT-SVD algorithm provided good robustness than
other two algorithms.
Histogram equalization and motion blur attacks were shown
in figure 13. It showed that the proposed algorithms had high

DCT-SVD DWT-SVD DWT-DCT-SVD DCT-SVD DWT-SVD DWT-DCT-SVD

0.99
0.12
0.98
0.97 0.1
0.96 0.08
NCC values

NCC values

0.95
0.1199

0.06
0.9724

0.94
0.9617

0.93 0.04
0.9457

0.0319

0.92 0.02
0.91
0
0.9 Motion blur
Histogram equalization -0.02

Fig 12: Histogram Equalization and Motion Blur attacks

5. CONCLUSION Pepper noise, the algorithms DWT-SVD and DWT-DCT-


SVD were superior to the DCT-SVD algorithm. Out of these
In this paper we proposed three semi-blind reference algorithms, the hybrid algorithm DWT-DCT-SVD has
watermarking algorithms. Those algorithms were DCT-SVD, optimum good imperceptibility and robustness at various
DWT-SVD and DWT-DCT-SVD. The watermark was attacks. When we consider the payload of these algorithms
visually meaningful gray scale image. In these proposed the DCT-SVD has high payload or high capacity of
algorithms DWT-SVD has good imperceptibility. When watermark embedding.
considered the robustness of these algorithms the DWT-DCT-
SVD algorithm was good. Except one attack, ie Salt &

9
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012

6. REFERENCES issn 2070-3740 .

[1] V.Potdar, S. Han, and E. Chang, 2005. "A Survey of [15]. H. Andrews and C. Patterson, “Singular Value
Digital Image Watermarking Techniques", in decompositions and Digital Image Processing,” IEEE
Proceedings of the 2005 IEEE International Conference Transactions on Acoustics, Speech and Signal
on Industrial Informatics, pp. 709-716. Processing, vol. 24, no. 1, pp. 26-53, Feb. 1976.

[2] F. Hartung and M. Kutter, “Multimedia Watermarking [16]. Ke-feng He, “Watermarking for images using the
Techniques,” in Proceedings of the IEEE, vol. 87, no.7, HVSand SVD in the wavelet domain” Proceedings of
pp. 1079-1107, July 1999 IEEEInternational Conference on Mechatronics
andAutomation, pp. 2352- 2356, 2006.
[03]. Chi-Kwong Chan , L.M. Cheng “Hiding data in
images by simple LSB substitution “Pattern [17]. Liu Quan, and AI Qingsong “A combination of DCT
Recognition 37 (2004) 469– 474 , based and SVD based watermarking,” ICSPproceedings
ww.elsevier.com/locate/patcog of IEEE International conference on signalprocessing,
pp. 873-876, 2004.
[4]. Dr.M.A.Dorairangaswamy “A Robust Blind Image
Watermarking Scheme in Spatial Domain for [18]. Alexander Sverdlov, Scott Dexter, Ahmet M. Eskicioglu
Copyright Protection” International Journal of “Robust SVD DCT based watermarking for copyright
Engineering and Technology Vol. 1, No.3, August, 2009 protection“, IEEE Transactions on Image Processing,
, ISSN: 1793-8236 10(5), May 2001, pp. 724-735.

[5] I. Pitas,”A method for signature casting on digital [19]. Feng Liu, and Yangguang Liu, “A Watermarking
images,”Proceedings of IEEE International Conference Algorithm for Digital Image Based on DCT and
on Image Processing,” Vol. 3, pp.215-318 ,1996. SVD,”Congress on Image and Signal Processing, pp.
380-383, 2008.
[6]. R. Wolfgang and E. Delp, ” A watermark for digital
images,” Proceeding of IEEE International Conference [20]. Liu Liang and Sun Qi, “A new SVD-DWT composite
on Image Processing, Vol. 2, pp.319-222, 1996. watermarking,” ICSP proceedings of IEEE International
conference on signal processing, 2006.
[7]. Sanghyun Joo, Youngho Suh, Jaeho Shin, and Hisakazu
Kikuchi “A New Robust Watermark Embedding into [21]. Gaurav Bhatnagar and Balasubramanian Raman, “Anew
Wavelet DC Components ” ETRI Journal, Volume 24, robust reference watermarking scheme based onDWT-
Number 5, October 2002. SVD,” Computer Standards and Interfaces, vol.31, no. 5,
pp. 1002-1013, 2009.
[8]. Sadi Vural, Hiromi Tomii, Hironori Yamauchi “DWT
Based Robust Watermarking Embed Using CRC-32 [22]. E.Ganic and A.M. Eskiciogulu et.al., Robust embedding
Techniques” World Academy of Science, Engineering of Visual Watermarks using DWT-SVD Journal of
and Technology 5 2005. Electronic Imaging, October-December, 2005.

[9]. Kundur D., and Hatzinakos, D., ‘A Robust [23]. Q. Li, C. Yuan, and Y. Zhong, “Adaptive DWT-SVD
Digital Image Water- marking Scheme using Wavelet- Domain Image Watermarking Using Human Visual
Based fusion,’ Proc. IEEE Int. Conf. On Image Model,” proceedings of 9th international conference on
Processing, Santa Barbara, California, vol. 1, pp. 544- advanced communication Technology, vol. 3, pp. 1947-
547, October 1997. 1951, Feb.2007.

[10]. V. Padmanabha Reddy and Dr. S. Varadarajan “ An [24]. Ali Al-Haj, and T. Manasrah, “Non-Invertible Copyright
Effective Wavelet-Based Watermarking Scheme Using Protection of Digital Images Using DWTand SVD,”
Human Visual System for Protecting Copyrights of Proceedings of International Conference on Digital
Digital Images “International Journal of Computer and Information Management, vol. 1, pp. 448 – 453,2007.
Electrical Engineering, Vol. 2, No. 1, February, 2010 [25]. S. Rezazadeh, and M. Rahmati, “A robust watermarking
,pp1793-8163. scheme based on wavelet transform and block SVD,” 9th
[11]. X. Xia, C.G. Boncelet, and G.R. Arce, “A International Symposium on Signal Processing and Its
Multiresolution Watermark for Digital Images,” Proc. Applications, pp. 1-4, 2007.
Of IEEE ICIP, Santa Barbara, CA, USA, Oct. [26]. Swanirbhar Majumder, Madhusudhan Mishra, A.
1997, pp. 548-551. Dinamani Singh” A Hybrid SVD and Wavelet based
[12]. J.R. Kim and Y.S. Moon, “A Robust Wavelet- Watermarking “2nd National Conference Mathematical
Based Digital Watermarking Using evel-Adaptive Techniques: Emerging Paradigms for Electronics and IT
Thresholding,” Proc. Of IEEE ICIP, vol. 2, Kobe, Industries, September 26-28, 2008, pp. 197-205.
Japan, Oct. 1999, pp. 226-230. [27]. Humberto Ochoa , K.R. Rao “A Hybrid DWT-SVD
[13]. S. D. Lin and C.-F. Chen,“A Robust DCT-Based Image-Coding System (HDWTSVD) for Color Images
Watermarking for Copyright Protection,” IEEE “systemics, cybernetics and informatics volume 1 -
Transactions on Consumer Electronics, 46(3), August number 2, pp.64-70.
2000, pp. 415-421. [28]. T.Sridevi, Y.Ramadevi,V.Vijaya Kumar “SECURE
[14]. Gengming Zhu, and Nong Sang “Watermarking WATERMARKING BASED ON SVD AND
Algorithm Research and Implementation Based on DCT WAVELETS “ICGST-GVIP Journal, Volume 10, Issue
Block “ proceedings of world academy of science, 5, December 2010.
engineering and technology volume 35 november 2008 [29]. Satyanarayana Murty . P, M.Uday Bhaskar, P.Nanna

10
International Journal of Computer Applications (0975 – 8887)
Volume 51– No.9, August 2012

Babu, P. Rajesh Kumar “A Semi-Blind Reference [37]. Voloshynovskiy, S., S. Pereira, and T. Pun, 2001.
Watermarking Scheme Using DWT-SVD for Copyright “Attacks on Digital Watermarks:
Protection “The International Journal of Multimedia & Classification,Estimation-Based Attacks, and
Its Applications (IJMA) Vol.3, No.3,pp.61-70. Benchmarks”. Communications Magazine 39, pp.118-
126.
[30]. Saryanarayana Murty. P, Laxmi.V ,
Rajesh Kumar.P “Performance of Semi-Blind Reference [38]. Fabien A.P. Petitcolas, Ross J. Anderson, 1999.
Watermarking Scheme Using DWT-SVD for Copyright “Evaluation of Copyright Marking Systems”, IEEE
Protection” (IJCSIT) International Journal of Computer International Conference on Multimedia Computing and
Science and Information Technologies, Vol. 3 (2) , Systems (ICMCS'99) 1, pp. 574-579.
2012,3321-3327
[31]. Langelaar, G., I. Setyawan, and R. Lagendijk, 2000.
“Watermarking Digital Image and Video Data: A State- AUTHOR’S PROFILE
of-Art Overview”, IEEE Signal Processing Magazine 17,
pp. 20-46. P. Satyanarayana Murty is currently working as
[32]. D. Kundur, K. Su and D. Hatzinakos, 2004. “Digital Sr.Associate Professor in ECE Department, GIITS,
Video Watermarking: Techniques, Technology and Engineering College, Vishakapatnam, and Andhra Pradesh,
Trends”, in Intelligent Watermarking Techniques, India. He is working towards his Ph.D.at AU College of
Chapter 10, P. J.-S. Pan, H.-C. Huang and L. Jain, eds., Engineering, Vishakapatnam, India. He received his M.Tech
World Scientific Publishing Company. pp. 265-314. from Jawaharlal Nehru Technological University, Hyderabad,
India. He has fifteen years experience of teaching
[33]. Lama Rajab, Tahani Al-Khatib, Ali Al-Haj “Video undergraduate students and post graduate students. His
Watermarking Algorithms Using the SVD Transform” research interests are in the areas of image watermarking, and
European Journal of Scientific Research ISSN 1450- image compression
216X Vol.30 No.3 (2009), pp.389-401.
[34]. Aditi Agarwal , Ruchika Bhadana and Satishkumar Dr. P. Rajesh Kumar is currently Associate Professor in ECE
Chavan, “A Robust Video Watermarking Scheme using Department, AU College of Engineering, Vishakapatnam,
DWT and DCT” (IJCSIT) International Journal of India. He received his M.Tech and Ph.D. from
Computer Science and Information Technologies, Vol. 2 AndhraUniversity, Vishakapatnam, India. He has eleven years
(4) , 2011, 1711-1716. experience of teaching undergraduate and postgraduate
students and guided number of post-graduate theses. He has
[35]. Sanjana Sinha, Prajnat Bardhan, Swarnali Pramanick, published 10 research papers in National and International
“Digital Video Watermarking using Discrete Wavelet journals. Presently he is guiding six Ph.D students in the area
Transform and Principal Component Analysis” of digital signal processing and Image processing. His
International Journal of Wisdom Based Computing, Vol. research interests are in the areas of digital image processing
1 (2), August 2011. and digital signal processing.
[36]. Emad E. Abdallah , A. Ben Hamza , Prabir Bhattacharya
“Video watermarking using wavelet transform and tensor
algebra” Published online: 24 April 2009 © Springer-
Verlag London Limited 2009.

11

You might also like