Robust blind image watermarking scheme using a modified embedding process based on differential method in DTCWT-DCT
This research paper presents a modified blind and robust image watermarking scheme that combines dual-tree complex wavelet transform (DTCWT) and discrete cosine transform (DCT) domains. A key challenge for researchers is to determine the optimal locations for embedding watermarks in the low-frequenc...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
Springer US
2024
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/40256/1/Robust%20blind%20image%20watermarking%20scheme%20using%20a%20modified%20embedding%20process%20based%20on%20differential%20method%20in%20DTCWT-DCT%20%28Intro%29.pdf http://umpir.ump.edu.my/id/eprint/40256/2/Robust%20blind%20image%20watermarking%20scheme%20using%20a%20modified%20embedding%20process%20based%20on%20differential%20method%20in%20DTCWT-DCT.pdf http://umpir.ump.edu.my/id/eprint/40256/ https://doi.org/10.1007/s11042-024-18185-0 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | This research paper presents a modified blind and robust image watermarking scheme that combines dual-tree complex wavelet transform (DTCWT) and discrete cosine transform (DCT) domains. A key challenge for researchers is to determine the optimal locations for embedding watermarks in the low-frequency coefficients of the hybrid domains, ensuring both imperceptibility and security. To identify the most effective sequence for the watermark embedding process, a differential approach is implemented on two correlated DCT-transformed vectors derived from DTCWT wavelet low-frequency coefficients. The watermark data does not need to be extracted from the original image. The proposed scheme aims to assess the efficiency improvement against various image processing attacks. We utilized fifteen grayscale images from the UCI-sipi image database, each with a size of 512 × 512 pixels, to evaluate the proposed scheme. The experimental results demonstrate that our scheme outperforms existing schemes in common image attacks such as geometric attacks, compression, filtering, and noise addition. |
---|