Skip to main content
Top

2015 | OriginalPaper | Chapter

A Robust and Secure DWT-SVD Digital Image Watermarking Using Encrypted Watermark for Copyright Protection of Cheque Image

Authors : Sudhanshu Suhas Gonge, Ashok Ghatol

Published in: Security in Computing and Communications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Digital watermarking is a process of embedding a data/additional information into exiting data. This additional data/information are used for embedding called as watermark. With this watermark, if the file or data get copied, this is then used to identify the originality of data. As, Digital communication facilitates transfer of digital data such as text, audio, image, video, etc. The un-authorized user can copy this data & can use anywhere they want. However, this creates the problem of security, ownership and copyright protection. To overcome this problem, digital watermarking is used. During transmission of data, there are many attacks occurring either intentionally or non-intentionally on digital watermarked image. These results into degradation of image quality and watermark may get destroyed. To provide security to watermark private key encryption and decryption is used. This encrypted watermark is used further for digital watermarking process using combined DWT-SVD transform. In this Paper, it is going to discuss “A Robust and Secure DWT-SVD Digital Image Watermarking Using Encrypted Watermark for Copyright Protection of Cheque Image.” Digital Watermarking Technique is used to provide ownership & copyright protection for cheque image and private key encryption & decryption technique used for security of bank watermark.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Data Communication and Networking, Fourth Edition by-Forouzan Copyright © the McGraw-Hill Companies, Inc Data Communication and Networking, Fourth Edition by-Forouzan Copyright © the McGraw-Hill Companies, Inc
2.
go back to reference Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Pearson Education, New Delhi (2006) Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Pearson Education, New Delhi (2006)
3.
go back to reference Stallings, W.: Cryptography and Network Security. Prentice Hall, Saddle River (2003) Stallings, W.: Cryptography and Network Security. Prentice Hall, Saddle River (2003)
4.
go back to reference Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Pearson Education, New Delhi (2004) Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Pearson Education, New Delhi (2004)
6.
go back to reference Rao, R.M., Bopardikar, A.S.: Wavelet Transforms: Introduction to Theory and Applications. Addison-Wesley, New York (1998)MATH Rao, R.M., Bopardikar, A.S.: Wavelet Transforms: Introduction to Theory and Applications. Addison-Wesley, New York (1998)MATH
7.
go back to reference Gonge, S.S., Ghatol, A.A.: Combination of encryption and digital watermarking techniques used for security and copyright protection of still image. In: IEEE International Conference on Recent Advanced and Innovations in Engineering (ICRAIE-2014), Jaipur, 09–11 May 2014 Gonge, S.S., Ghatol, A.A.: Combination of encryption and digital watermarking techniques used for security and copyright protection of still image. In: IEEE International Conference on Recent Advanced and Innovations in Engineering (ICRAIE-2014), Jaipur, 09–11 May 2014
8.
go back to reference Yin, C.-q., Li, L., Lv, A.-q., Qu, L.: Color image watermarking algorithm based on DWT-SVD. In: Proceedings of the IEEE International Conference on Automation and Logistics, Jinan, 18–21 August 2007 Yin, C.-q., Li, L., Lv, A.-q., Qu, L.: Color image watermarking algorithm based on DWT-SVD. In: Proceedings of the IEEE International Conference on Automation and Logistics, Jinan, 18–21 August 2007
9.
go back to reference Gonge, S.S., Ghatol, A.A.: Combined DWT-DCT digital watermarking technique software used for CTS of bank. In: 2014 IEEE Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT-2014), Ghaziabad, 7th and 8th February 2014 Gonge, S.S., Ghatol, A.A.: Combined DWT-DCT digital watermarking technique software used for CTS of bank. In: 2014 IEEE Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT-2014), Ghaziabad, 7th and 8th February 2014
10.
go back to reference Kundur, D., Hatzinakos, D.: A Robust Digital Image Watermarking Method Using Wavelet-Based Fusion Kundur, D., Hatzinakos, D.: A Robust Digital Image Watermarking Method Using Wavelet-Based Fusion
11.
go back to reference Luo, T.: Mutual information based watermarking detection in wavelet domain for copyright protection. In: IEEE. School of Computer Science and Technology(HUST) Luo, T.: Mutual information based watermarking detection in wavelet domain for copyright protection. In: IEEE. School of Computer Science and Technology(HUST)
12.
go back to reference Shnayderman, A., Gusev, A., Eskicioglu, A.M.: An SVD-Based gray scale image quality measure for local and global assessment. IEEE Trans. Image process. 15(2), 422–429 (2006)CrossRef Shnayderman, A., Gusev, A., Eskicioglu, A.M.: An SVD-Based gray scale image quality measure for local and global assessment. IEEE Trans. Image process. 15(2), 422–429 (2006)CrossRef
13.
go back to reference Chung, K.-L., Yang, W.-N., Huang, Y.-H., Wu, S.-T., Hsu, Y.-C.: On SVD-based watermarking algorithm. Appl. Math. Comput. 188(1), 54–57 (2007)MathSciNetCrossRefMATH Chung, K.-L., Yang, W.-N., Huang, Y.-H., Wu, S.-T., Hsu, Y.-C.: On SVD-based watermarking algorithm. Appl. Math. Comput. 188(1), 54–57 (2007)MathSciNetCrossRefMATH
14.
go back to reference Kaladharan, N.: Unique key using encryption and decryption of image. Int. J. Adv. Res. Comput. Commun. Eng. 3(10) (2014). ISSN: 2278-1021, 2319-5940 Kaladharan, N.: Unique key using encryption and decryption of image. Int. J. Adv. Res. Comput. Commun. Eng. 3(10) (2014). ISSN: 2278-1021, 2319-5940
15.
go back to reference Liu, R., Tan, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 4, 121–128 (2002)CrossRef Liu, R., Tan, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 4, 121–128 (2002)CrossRef
16.
go back to reference Wen-ge, F., Lei, L.: SVD and DWT zero-bit watermarking algorithm. In: 2nd International Asia Conference on Informatics in Control, Automation and Robotics, 2010, 2nd March 2011 Wen-ge, F., Lei, L.: SVD and DWT zero-bit watermarking algorithm. In: 2nd International Asia Conference on Informatics in Control, Automation and Robotics, 2010, 2nd March 2011
17.
go back to reference Golub, G.H., Van Loan, C.F.: Matrix Computations, 3rd edn. John Hopkins University Press, Baltimore (1996)MATH Golub, G.H., Van Loan, C.F.: Matrix Computations, 3rd edn. John Hopkins University Press, Baltimore (1996)MATH
18.
go back to reference Golub, G., Kahan, W.: Calculating the singular values and pseudo-inverse of a matrix. SIAM J. Numer. Anal. 2(2), 205–224 (1965)MathSciNetMATH Golub, G., Kahan, W.: Calculating the singular values and pseudo-inverse of a matrix. SIAM J. Numer. Anal. 2(2), 205–224 (1965)MathSciNetMATH
Metadata
Title
A Robust and Secure DWT-SVD Digital Image Watermarking Using Encrypted Watermark for Copyright Protection of Cheque Image
Authors
Sudhanshu Suhas Gonge
Ashok Ghatol
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-22915-7_28

Premium Partner