Performance Evaluation of Spatial and Frequency Domain Techniques under Various Attacks

Internet is very feasible and an excellent distribution system. One way to protect multimedia data against risk of illegal recording and malicious retransmission is to embed a signal, called watermark that authenticates the owner of the data. Watermark is an image or text to be embedded into the documents that needs protection. A good watermarking scheme is the one which can offer resistance against attacks and is imperceptible to hackers. Robustness measures the withstanding capability of watermark against various attacks. This paper is an effort to study different watermarking techniques on the basis of given parameters. For the purpose of implementation, MATLAB is used and comparison is done on the basis of various performance metrics such as PSNR, MSE, Time Complexity, Correlation Co-efficient and robustness against various attacks like cropping, Gaussian noise, salt and pepper noise etc. The result shows that frequency domain techniques are comparatively more robust with DWT being the most robust one.

[1]  Roshan Koju,et al.  An Improved DWT-SVD Based Robust Digital Image Watermarking for Color Image , 2017 .

[2]  Tieniu Tan,et al.  An SVD-based watermarking scheme for protecting rightful ownership , 2002, IEEE Trans. Multim..

[3]  Abdullah Bamatraf,et al.  Digital watermarking algorithm using LSB , 2010, 2010 International Conference on Computer Applications and Industrial Electronics.

[4]  Yanhui Xiao,et al.  Robust watermarking of mobile video resistant against barrel distortion , 2016, China Communications.

[5]  D. Y. Patil,et al.  A Review of Different Techniques on Digital Image Watermarking Scheme , 2016 .

[6]  Na Zhang,et al.  Digital watermarking algorithm based on scale-invariant feature regions in non-subsampled contourlet transform domain , 2015 .

[7]  Jonathan N. Bradley,et al.  Data embedding method , 1996, Other Conferences.

[8]  Xiangjian He,et al.  A Review Study on Digital Watermarking , 2005, 2005 International Conference on Information and Communication Technologies.

[9]  Neha Tayal A Robust Hybrid Steganography Mechanism for Security in Data Communication Networks , 2016 .

[10]  Md Rashedul Islam,et al.  An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography , 2014, 2014 International Conference on Informatics, Electronics & Vision (ICIEV).

[11]  Po-Yueh Chen,et al.  A DWT Based Approach for Image Steganography , 2006 .

[12]  Hitesh Gupta,et al.  Survey of Digital Image Watermarking Techniques to achieve Robustness , 2012 .

[13]  Saeed Mozaffari,et al.  Watermarking in binary document images using fractal codes , 2014, Pattern Recognit. Lett..

[14]  Taha H. Rassem,et al.  Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics , 2016, IET Image Process..

[15]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[16]  Cheng Wang,et al.  Novel zero-watermarking scheme based on DWT-DCT , 2016, China Communications.

[17]  Mostafa Rahmani,et al.  Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm , 2012 .

[18]  R. Sheth,et al.  Secured digital image watermarking with discrete cosine transform and discrete wavelet transform method , 2016, 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring).

[19]  Samir Kumar Bandyopadhyay,et al.  A DWT Method for Image Steganography , 2013 .

[20]  S. Han,et al.  A survey of digital image watermarking techniques , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..

[21]  Rajeev Kumar Singh,et al.  A Survey: Digital Image Watermarking Techniques , 2014 .

[22]  Yixian Yang,et al.  Compressive Sensing-Based Audio Semi-fragile Zero-Watermarking Algorithm , 2015 .

[23]  D. N. Vizireanu,et al.  Watermarking-based image authentication robust to JPEG compression , 2015 .