Search in Medwell
Journal of Engineering and Applied Sciences
Year: 2018 | Volume: 13 | Issue: 11 | Page No.: 4001-4008
DOI: 10.36478/jeasci.2018.4001.4008  
Using Discrete Wavelet Transformation Algorithm for Authentication Digital Image Watermark
Zahraa Jabbar Hussein
Abstract: Watermarking is one of the methods to hide secret information in multimedia contents. The main concept of watermarking is a pattern of bits placed into an image. Watermarking is also a type of steganography field in which some of the useful information can be hidden inside another innocent image. In this study, the watermarking is utilized for solving the authentication issue. In addition to utilizing Discrete Wavelet Transform (DWT) algorithm to develop image security by hiding the watermark image inside the original image to prove owner image. DWT can combine more than one image by using mathematical techniques and used to embed and extract the watermark image and low bit-rate transmission. Different type of attacks can be used in order to steal the ownership or destroy it such as rotation, dithering and cropping attack. This study expected to conclude a technique that is able to hide the secret information (message) inside the image by utilizing DWT to avoid all the different types of attacks and finally extract the secret data from the image. Two techniques have been used to achieve imperceptibility and robustness of the watermark against certain geometric and non-geometric attacks. DWT is the solo technique showed good imperceptibility with 80.128 value of PSNR while DWT-DCT showed greater improvement with 96.73 of the PSNR value. The proposed technique gave impressing performance against different attacks such as Gaussian noise, dithering and cropping. On the other hand, DWT-DCT experiences difficulties against compression and rotation techniques due to the nature of the attacks.
How to cite this article:
Zahraa Jabbar Hussein , 2018. Using Discrete Wavelet Transformation Algorithm for Authentication Digital Image Watermark. Journal of Engineering and Applied Sciences, 13: 4001-4008.
DOI: 10.36478/jeasci.2018.4001.4008