Robust and secure watermarking method through BEMD, SVD and Arnold transform in wavelet domain

被引:2
|
作者
Singh, Laxmanika [1 ]
Singh, Pradeep Kumar [2 ]
Sidhu, Jagpreet [1 ]
机构
[1] Jaypee Univ Informat Technol, Dept Comp Sci & Engn, Solan, HP, India
[2] Delhi NCR, Dept Comp Sci, KIET Grp Inst, Ghaziabad, UP, India
关键词
Image watermarking; DWT; Arnold transform; Encryption; BEMD; Watermarking; DWT;
D O I
10.1007/s13198-022-01732-z
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper, an enhanced watermarking technique through discrete wavelet transform (DWT), singular value decomposition (SVD) and Bi- dimensional empirical mode decomposition (BEMD) is presented. During the embedding process, the first level of DWT has applied to decompose an original image into distinct sub-bands (LL, LH, HH, HL). Further, BEMD decomposition is applied to divide sub-bands of DWT according to the robust and least fragile bands. SVD is employed to compute the singular coefficient on a certain band for an embedding process. The proposed technique is implemented with haar wavelet. Further, an inverse process of IDWT, ISVD and IBEMD is applied to this method to get the watermarked image. Moreover, watermark images can be extracted by the extraction process. BEMD is used to get the multiple range representation in the form IMFs. Also, it is used to improve the visual quality of an image. Moreover, the fusion of SVD, DWT and arnold transform is employed to increase the security, robustness and imperceptibility of an image against various attack. Finally, the subjective measure is used to assess the visual quality of the watermarked image. The proposed method provides better imperceptibility, security and robustness against numerous geometrical and non- geometrical attacks such as salt & pepper, Gaussian attack, JPEG compression, median filter, shearing.
引用
收藏
页码:1361 / 1373
页数:13
相关论文
共 50 条
  • [1] Robust and secure watermarking method through BEMD, SVD and Arnold transform in wavelet domain
    Laxmanika Singh
    Pradeep Kumar Singh
    Jagpreet Sidhu
    International Journal of System Assurance Engineering and Management, 2024, 15 : 1361 - 1373
  • [2] SECURE AND ROBUST IMAGE WATERMARKING SCHEME USING HOMOMORPHIC TRANSFORM, SVD AND ARNOLD TRANSFORM IN RDWT DOMAIN
    Khare, Priyank
    Srivastava, Vinay Kumar
    ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2019, 17 (03) : 343 - 351
  • [3] Robust and imperceptible image watermarking technique based on SVD, DCT, BEMD and PSO in wavelet domain
    Pradeep Kumar Laxmanika
    Multimedia Tools and Applications, 2022, 81 : 22001 - 22026
  • [4] Robust and imperceptible image watermarking technique based on SVD, DCT, BEMD and PSO in wavelet domain
    Laxmanika
    Singh, Pradeep Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (16) : 22001 - 22026
  • [5] Robust and Secure Multiple Watermarking in Wavelet Domain
    Singh, Amit Kumar
    Dave, Mayank
    Mohan, Anand
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2015, 5 (02) : 406 - 414
  • [6] A robust watermarking scheme based on wavelet transform and block SVD
    Rezazadeh, Soroosh
    Rahmati, Mohammad
    2007 9TH INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND ITS APPLICATIONS, VOLS 1-3, 2007, : 628 - +
  • [7] A robust and secure watermarking algorithm based on DWT and SVD in the fractional order fourier transform domain
    Tang, Ming
    Zhou, Fuken
    ARRAY, 2022, 15
  • [8] Research of Digital Watermarking Algorithm in Wavelet Domain Based on Arnold Transformation and SVD
    Sheng Tan
    Zhao Xiuping
    ADVANCES IN PRINTING AND PACKAGING TECHNOLOGIES, 2013, 262 : 143 - 146
  • [9] Secure and Robust Image Watermarking using Discrete Wavelet and Arnold Transforms
    Panyavaraporn, Jantana
    Horkaew, Paramate
    2022 37TH INTERNATIONAL TECHNICAL CONFERENCE ON CIRCUITS/SYSTEMS, COMPUTERS AND COMMUNICATIONS (ITC-CSCC 2022), 2022, : 262 - 265
  • [10] Image watermarking approach using Arnold transform in stationary wavelet domain
    Zhang, Changjiang
    Liu, Yufeng
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2007, 14 : 323 - 327