QR Watermarking Technique for Protecting Digital Images

Alisha*, J. Nirmal Jothi**
*-** Department of Electronics and Communication Engineering, SCAD College of Engineering and Technology, Tirunelveli, Tamil Nadu, India.
Periodicity:October - December'2019
DOI : https://doi.org/10.26634/jdp.7.4.16282

Abstract

The rapid spread of the internet, along with the comprehensive development of digital technologies and easily reproduced digital media, has increased the popularity of media. Nowadays, exchange and transmission of digital images through internet is increasing and thus the protection of image is critical. This has initiated more researchers to develop efficient methods in digital image content protection. Digital watermarking is one of the ways to achieve protection in images. Digital watermarking is a process by which secret data is encrypted into the image without affecting the visual quality of the copyrighted image. This paper presents a block-based image watermarking technology using Discrete Wavelet Transformation (DWT) that does not affect the human visual system. The host images with digital watermark are exposed to cyber attacks when accessible through the open domain in the internet. The experimental results of this study shows that the proposed image watermarking method protects the invisibility of the watermark.

Keywords

Digital Image Watermarking, Discrete Wavelet Transform, Copyright Protection.

How to Cite this Article?

Alisha, and Jothi, J. N. (2019). QR Watermarking Technique for Protecting Digital Images. i-manager's Journal on Digital Signal Processing, 7(4), 15-21. https://doi.org/10.26634/jdp.7.4.16282

References

[1]. Makbol, N. M., Khoo, B. E., & Rassem, T. H. (2016). Blockbased discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Processing, 10(1), 34-52.https://doi.org/10.1049/iet-ipr.2014.0965
[2]. Sharma, S., & Kumar, V. (2016). A survey of blind & nonblind watermarking techniques. International Journal of Scientific & Engineering Research, 7(12), 1218-1223.
[3]. Rajput, U., & Tiwari, N. (2015, April). A novel technique for RGB invisible watermarking based on 2-DWT-DCT algorithm. In 2015 Global Conference on Communication Technologies (GCCT) (pp. 386-390). IEEE.
[4]. Gupta, V., & Barve, M. A. (2014). A review on image watermarking and its technique. International Journal of Mechanical Engineering and Information Technology, 2(01), 73-81.
[5]. Shoaib, S., & Mahajan, R. C. (2015, January). Authenticating using secret key in digital video watermarking using 3-level DWT. In 2015 International Conference on Communication, Information & Computing Technology (ICCICT), (pp. 1-5). IEEE.
[6]. Kamesh, S., Devi, K. D., & Raviteja, S. N. V. P. (2017). DWT based data hiding using video steganography. International Journal of Engineering Sciences & Research Technology, 6(4), 361-367.
[7]. Shete, S.A., Chavan, V. D., & Tivarekar, R. P. (2019). Multiwavelet transform-video encoding for content protection with secret key. Journal of Emerging Technologies and Innovative Research (JETIR), 6(5), 104-108.
[8]. Alilou, V.K. (2020). Finger Print Matching: A simple approach. GitHub. Retrieved from https://github.com/alil ou63/fingerprint
[9]. Jothibai, P.N. (2017). Optimized blind image watermarking method based on firefly algorithm in wavelet packet transform (WPT) domain. International Journal of Engineering Research in Electronics and Communication Engineering, 4(12), 53-58.
[10]. Moler, C. (2016). Householder Reflections and the QR Decomposition [Blog]. Cleve's Corner: Cleve Moler on Mathematics and Computing. Retrieved from https://bl ogs.mathworks.com/cleve/2016/10/03/householderreflections- and-the-qr-decomposition/
[11]. Kaur, M., & Attri, V. K. (2015). A survey on digital image watermarking and its techniques. International Journal of Signal Processing, Image Processing and Pattern Recognition, 8(5), 145-150.
[12]. Kowsalya, & Subanandhini. (2016). Performance analysis and design of an efficient biometric system by using watermarking with 3DWT. International Journal of Computer Science and Mobile Computing, 5(4), 92-99.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.