A Comparison of Buyer-Seller Watermarking Protocol (BSWP) Based on Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT)

Buyer-Seller watermarking protocol (BSWT) is used to preserve the rights for the buyer and the seller. Frequency domain watermarking embedding that is DCT and DWT can affect the robustness and imperceptibility of watermarking algorithm. This paper studies the comparison of both domain which is DCT and DWT and concludes which one is better on the bases of some parameters. Digital watermarking is a key technology to embed information as unperceivable signals in digital contents. Buyer-seller watermarking protocols based on Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) integrate digital watermarking algorithm and cryptography techniques for copyright protection. In this paper we have shown the comparison of these two, buyer-seller watermarking protocol based on Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). These two protocols use Public Key Infrastructure (PKI), arbitrator and watermarking certificate authority (WCA) for better security. This paper shows results of watermark image quality based on peak signal-to-noise ratio (PSNR) mean square error (MSE) and similarity factor (SF).

[1]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[2]  Chin-Laung Lei,et al.  An efficient and anonymous buyer-seller watermarking protocol , 2004, IEEE Transactions on Image Processing.

[3]  Yogesh Chaba,et al.  Computer Networks and Information Technologies , 2011 .

[4]  Y. Rangsanseri,et al.  Genetic Watermarking with Block-Based DCT Clustering , 2008, 2008 International Symposium on Communications and Information Technologies.

[5]  Naim Dahnoun,et al.  Studies in Computational Intelligence , 2013 .

[6]  Adeel Mumtaz,et al.  Digital Image Watermarking in the Wavelet Transform Domain , 2008 .

[7]  Bart Preneel,et al.  Anonymous Buyer-Seller Watermarking Protocol wth Additive Homomorphism , 2008, SIGMAP.

[8]  Karbhari V. Kale Advances in Computer Vision and Information Technology , 2008 .

[9]  Ashwani Kumar,et al.  A New Buyer-Seller Watermarking Protocol with Discrete Cosine Transform , 2011 .

[10]  Sushil K. Bhattacharjee,et al.  Towards second generation watermarking schemes , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[11]  Jelena Kovacevic,et al.  Wavelets and Subband Coding , 2013, Prentice Hall Signal Processing Series.

[12]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[13]  Lakhmi C. Jain,et al.  Information Hiding and Applications , 2009 .

[14]  Kouichi Sakurai,et al.  Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party , 2003, ACNS.

[15]  Jun Zhang,et al.  Secure buyer-seller watermarking protocol , 2006 .

[16]  Frank Y. Shih,et al.  Information Hiding by Digital Watermarking , 2009 .

[17]  Jeng-Shyang Pan,et al.  Genetic watermarking based on transform-domain techniques , 2004, Pattern Recognit..

[18]  Gordon W. Braudaway,et al.  If one watermark is good, are more better? , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[19]  Chae Hoon Lim,et al.  Information Security and Cryptology — ICISC 2002 , 2003, Lecture Notes in Computer Science.

[20]  Dong Hoon Lee,et al.  An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control , 2002, ICISC.

[21]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[22]  Bart Preneel,et al.  On Secure and Anonymous Buyer-Seller Watermarking Protocol , 2008, 2008 Third International Conference on Internet and Web Applications and Services.

[23]  Ashwani Kumar,et al.  A Practical BuyerSeller Watermarking Protocol based on Discrete Wavelet Transform , 2011 .

[24]  Klara Nahrstedt,et al.  Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights , 1998, J. Vis. Commun. Image Represent..

[25]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[26]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 2001, IEEE Trans. Image Process..