Robust blind image watermarking scheme using a modified embedding process based on differential method in DTCWT-DCT

This research paper presents a modified blind and robust image watermarking scheme that combines dual-tree complex wavelet transform (DTCWT) and discrete cosine transform (DCT) domains. A key challenge for researchers is to determine the optimal locations for embedding watermarks in the low-frequenc...

Full description

Saved in:
Bibliographic Details
Main Authors: Lebcir, Mohamed, Suryanti, Awang, Benziane, Ali
Format: Article
Language:English
English
Published: Springer US 2024
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/40256/1/Robust%20blind%20image%20watermarking%20scheme%20using%20a%20modified%20embedding%20process%20based%20on%20differential%20method%20in%20DTCWT-DCT%20%28Intro%29.pdf
http://umpir.ump.edu.my/id/eprint/40256/2/Robust%20blind%20image%20watermarking%20scheme%20using%20a%20modified%20embedding%20process%20based%20on%20differential%20method%20in%20DTCWT-DCT.pdf
http://umpir.ump.edu.my/id/eprint/40256/
https://doi.org/10.1007/s11042-024-18185-0
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:This research paper presents a modified blind and robust image watermarking scheme that combines dual-tree complex wavelet transform (DTCWT) and discrete cosine transform (DCT) domains. A key challenge for researchers is to determine the optimal locations for embedding watermarks in the low-frequency coefficients of the hybrid domains, ensuring both imperceptibility and security. To identify the most effective sequence for the watermark embedding process, a differential approach is implemented on two correlated DCT-transformed vectors derived from DTCWT wavelet low-frequency coefficients. The watermark data does not need to be extracted from the original image. The proposed scheme aims to assess the efficiency improvement against various image processing attacks. We utilized fifteen grayscale images from the UCI-sipi image database, each with a size of 512 × 512 pixels, to evaluate the proposed scheme. The experimental results demonstrate that our scheme outperforms existing schemes in common image attacks such as geometric attacks, compression, filtering, and noise addition.