Computationally Efficient, Robust Watermarking Using Fast Walsh Hadamard Transform

Nowadays, anonymous manipulation of digital data with malicious intention is increasing at an enormous rate. With the advent of various technologies, multimedia signal can easily be downloaded, copied and manipulated at any point of time without much effort. Watermark is the pattern of bits added to the multimedia signals, such as audio, video or images, such that this can be extracted and used to check the authenticity of the received signal. The field of watermarking is growing at a fast pace. Watermarking techniques can be used for a variety of applications such as authentication, video indexing, copyright protection and access control. In this paper, CDMA based robust watermarking algorithm using Discrete Cosine Transform is modified for more robust and computationally efficient applications using Walsh Hadamard Transform. Performed a detailed simulation of both the techniques and compared the results. Compared to the existing technique the proposed technique is proved to be more resistant to attacks, computationally and cost wise more efficient. The new technique results in a good quality extracted watermark even at a low embedding gain even though the information hiding capacity is comparatively less.

[1]  Sayyid Samir Al-Busaidi,et al.  Computing and Listing of Number of Possible m-Sequence Generators of Order n , 2013 .

[2]  Malay Kumar Kundu,et al.  A blind CDMA image watermarking scheme in wavelet domain , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[3]  Alekhika Mohanty Study and Implementation of Watermarking Algorithms , 2006 .

[4]  Muhammad Kashif Samee Robust watermarking and its applications to communication problems , 2012 .

[5]  Nidal F. Shilbayeh,et al.  Combined DWT-CT Blind Digital Image Watermarking Algorithm , 2013 .

[6]  Ali Mohammad Al-Haj,et al.  Advanced Techniques in Multimedia Watermarking: Image, Video and Audio Applications , 2010 .

[7]  Sayyid Samir Al-Busaidi,et al.  Adding Pseudo-Random Test Sequence Generator in the Test Simulator for DFT Approach , 2012 .

[8]  Wen-Yuan Chen,et al.  Digital Watermarking Using DCT Transformation , 2000 .

[9]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[10]  Md. Iqbal Hasan Sarker,et al.  An Efficient Image Watermarking Scheme Using BFS Technique Based on Hadamard Transform , 2013, Smart Comput. Rev..

[11]  Afaq Ahmad,et al.  Design of a Pseudo-Random Binary Code Generator via a Developed Simulation Model , 2012 .

[12]  Kusuma Kumari A Survey of Digital Watermarking Techniques and its Applications , 2013 .

[13]  Tariq Jamil,et al.  An investigation into the application of linear feedback shift registers for steganography , 2002, Proceedings IEEE SoutheastCon 2002 (Cat. No.02CH37283).

[14]  Shanq-Jang Ruan,et al.  DS-CDMA-BASED WATERMARKING : A LOW-POWER , HIGH-SECURITY ALGORITHM FOR EMBEDDED SYSTEMS , 2011 .

[15]  Franklin Rajkumar. v Entropy based Robust Watermarking Scheme using Hadamard Transformation Technique , 2011 .

[16]  Vishal Shrivastava,et al.  A Survey of Digital Watermarking Techniques and its Applications , 2014, ArXiv.

[17]  Paresh Rawat,et al.  A Robust Watermarking Approach using DCT-DWT , 2012 .

[18]  Afaq Ahmad,et al.  An efficient method to determine linear feedback connections in shift registers that generate maximal length pseudo-random up and down binary sequences , 1997 .

[19]  Afaq Ahmad,et al.  Better PN Generators for CDMA Application - A Verilog-HDL Implementation Approach , 2012 .

[20]  Vandana,et al.  Modified Algorithm for Digital Image Watermarking Using Combined DCT and DWT , 2013 .