A Robust Watermarking Method Based on RDWT-DCT-SVD in the YCbCr Color Space
DOI:
https://doi.org/10.54654/isj.v3i23.1054Keywords:
RDWT, DCT, SVD, Bhattacharyya distance, WatermarkingTóm tắt
In digital copyright protection, watermarking plays a crucial role, particularly in ensuring the watermark remains imperceptible, robust against attacks, and has a high embedding capacity. The new method proposed in this paper utilizes Redundant Discrete Wavelet Transform (RDWT), Discrete Cosine Transform (DCT), and Singular Value Decomposition (SVD) to embed the watermark into a color image. Instead of using traditional methods, this approach calculates the Bhattacharyya distance between the original image and the watermark to determine the embedding factor automatically. The watermark is hidden in the Cb channel of the YCbCr color space, which minimizes the impact on the original image quality and enhances both the imperceptibility and robustness of the watermark. Experimental results show that this method not only preserves the original image quality but also withstands various types of attacks, ensuring the watermark retains its integrity and high recoverability.
Downloads
References
P. Khare and V. K. Srivastava, “Robust digital image watermarking scheme based on rdwt-dct-svd,” in 2018 5th international conference on signal processing and integrated networks (SPIN). IEEE, pp. 88–93, 2018.
A. Bajaj, “Robust and reversible digital image watermarking technique based on rdwt-dct-svd,” in 2014 International Conference on Advances in Engineering & Technology Research (ICAETR-2014). IEEE, 2014, pp. 1-5.
E. Choi and C. Lee, “Feature extraction based on the bhattacharyya distance,” Pattern Recognition, vol. 36, no. 8, pp. 1703–1709, 2003.
S. Roy and A. K. Pal, “A hybrid domain color image watermarking based on dwt–svd,” Iranian Journal of Science and Technology, Transactions of Electrical Engineering, vol. 43, pp. 201–217, 2019.
D. Rajani and P. Rajesh Kumar, “Hybrid blind water- marking using rdwt-dct in singular value decomposition domain,” in International Conference on Computing, Communication, Electrical and Biomedical Systems. Springer, pp. 573–584, 2022.
A. K. Singh, M. Dave, and A. Mohan, “Hybrid tech- nique for robust and imperceptible image watermarking in dwt–dct–svd domain,” National Academy Science Letters, vol. 37, pp. 351–358, 2014.
A. Zear, A. K. Singh, and P. Kumar, “A proposed secure multiple watermarking technique based on dwt, dct and svd for application in medicine,” Multimedia tools and applications, vol. 77, pp. 4863–4882, 2018.
Y. Dong, R. Yan, Q. Zhang, and X. Wu, “A hybrid domain color image watermarking scheme based on hyperchaotic mapping,” Mathematics, vol. 12, no. 12, p. 1859, 2024.
S. Gaur and V. K. Srivastava, “A hybrid rdwt-dct and svd based digital image watermarking scheme using arnold transform,” in 2017 4th International Confer- ence on Signal Processing and Integrated Networks (SPIN). IEEE, pp. 399–404, 2017.
S. Roy and A. K. Pal, “An svd based location specific robust color image watermarking scheme using rdwt and arnold scrambling,” Wireless Personal Communi- cations, vol. 98, pp. 2223–2250, 2018.
P. Singh, “Rdwt-dct-svd” in International Journal of Latest Technology in Engineering & Management (IJLTEM), vol. 1, pp. 33–41, 2016.
M. Jamal, F. S. Mahmood, and S. Mudassar, “Improved robustness of rgb image content watermarking using rdwt-svd domain,” in Proceedings of 15th international conference on statistical sciences, pp. 73–82, 2017.
D. Awasthi and V. K. Srivastava, "Dual image watermarking using hessenberg decomposition and rdwt-dct- svd in ycbcr color space," in 2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). IEEE, pp. 1-6, 2022.
S. M. Arora et al., “A dwt-svd based robust digital watermarking for digital images,” Procedia computer science, vol. 132, pp. 1441–1448, 2018.
USC University of Southern Califonia, “Usc-sipi dataset”, Access time: 10/11/2024, https://sipi.usc.edu/database/.
Universidad de Granada, “Cvg-ugr dataset”, 13-03-2014, access time: 10/11/2024, https://ccia.ugr.es/cvg/dbimagenes/g256.php.
X.-b. Kang, G.-f. Lin, Y.-j. Chen, F. Zhao, E.-h. Zhang, and C.-n. Jing, “Robust and secure zero-watermarking algorithm for color images based on majority vot- ing pattern and hyper-chaotic encryption,” Multimedia Tools and Applications, vol. 79, pp. 1169–1202, 2020.
A. Kozachok, S. Kopylov. “Robust text watermarking based on line shifting”. Journal of Science and Technology on Information Security, vol.1, no. 7, pp 3-13, Sep. 2020. doi: https://doi.org/10.54654/isj.v7i1.50.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).