<fmt:message key='jsp.layout.header-default.alt'/>  

DSpace@UM >
Faculty of Computer Science and Information Technology >
PhD Theses : Computer Science >

Please use this identifier to cite or link to this item: http://hdl.handle.net/1812/916

Title: Design and analysis of digital image watermarking using wavelet transform
Authors: Wan Azizun Wan Adnan
Keywords: digital watermarking
Wavelet transform
Watermarking algorithms
Issue Date: Dec-2009
Publisher: University of Malaya
Abstract: Digital watermarking is a process of embedding data called watermark into a multimedia object such that it can be detected or extracted later to make an assertion about the object. It has been used in numerous applications and on a variety of host signals. The applications include authentication, fingerprinting, broadcast monitoring, copy protection and meta-data tagging. The host signals include images, audio signals, video, printed documents, maps, computer programs, animation parameters and 3-D models. Of the various watermarking algorithms, some outperform others in terms of basic watermarking requirements like robustness, invisibility, processing, costs and security. In this thesis, we designed and analyzed a new image watermarking system in the wavelet domain for single and dual watermark embedding. A meaningful and recognizable image has been used as the watermark which immediately provides strong authentication information instead of using the random number generator to create the watermark. In addition, to achieve the security aspect of the watermark, the bits of the watermark image are randomly permuted so that only those who have the key can reconstruct the watermark. To further enhance the security of the watermarking algorithm, we propose the watermark be divided into small pieces and these different pieces are embedded in different locations of the cover image. Each piece needs a separate key to generate PN sequence which is used to encode the watermark bits. This provides secrecy of the watermark against public extraction and detection since without all the right keys, it will be impossible to decode the watermark. For single watermark embedding, three different techniques of wavelet transform, namely, Discrete Wavelet, Wavelet Packet and shuffled wavelet coefficients are proposed. Dual watermark embedding is developed based on the single wavelet embedding to embed two watermarks simultaneously in the same image space. Six combinations based on the three different techniques of wavelet transform proposed in single embedding have been experimented. The proposed technique of hiding dual watermarks can simultaneously achieve source authentication and fingerprinting, where one watermark determines the sender and the other watermark determines the original recipient. It may also be used to resolve deadlock copyright protection problems as outline by Swanson et al.(1999). As opposed to the existing techniques where the watermark is directly embedded into the wavelet coefficients, our proposed single embedding method requires the wavelet coefficients of the host image to be shuffled before embedding the watermark. Hence, a higher security is achieved from our proposed technique since a secret key is needed to shuffle the wavelet coefficients. As for our dual proposed watermark embedding, the watermarks are embedded at different sub-bands of wavelet transform using different techniques as compared to published works where both the watermarks use the same embedding technique(Lie et al.,2003; Tao & Eskicioglu, 2004) or using different domain(Chaw-Seng et al.,2005). Our experimental results show that embedding location, gain factor, wavelet function and detection threshold strongly influence the quality of the watermarked image and the extracted watermark. The proposed single watermark and dual watermark based embedding methods fulfilled the requirements of a watermarking system in terms of imperceptibility, robustness, verifiability of the extracted watermark and security.
Description: Thesis (PhD) -- Faculty of Computer Science & Information Technology, University of Malaya, 2009.
URI: http://dspace.fsktm.um.edu.my/handle/1812/916
Appears in Collections:PhD Theses : Computer Science

Files in This Item:

File Description SizeFormat
CHAPTER 2.pdfChapter 2176.49 kBAdobe PDFView/Open
APPENDIX A.pdfAppendix A751.79 kBAdobe PDFView/Open
CHAPTER 3.pdfChapter 3216.99 kBAdobe PDFView/Open
LIST OF TABLE.pdfList of Table60.2 kBAdobe PDFView/Open
ABSTRACT.pdfAbstract 55.41 kBAdobe PDFView/Open
REFERENCES.pdfReferences 199.69 kBAdobe PDFView/Open
LIST OF ABBREVIATIONS.pdfList of Abbreviations43.69 kBAdobe PDFView/Open
CHAPTER 5.pdfChapter 5122.96 kBAdobe PDFView/Open
APPENDIX B.pdfAppendix B60.06 kBAdobe PDFView/Open
CHAPTER 6.pdfChapter 6404.96 kBAdobe PDFView/Open
front page PhD.pdfFront page42.32 kBAdobe PDFView/Open
TABLE OF CONTENT.pdfTable of Content78.14 kBAdobe PDFView/Open
CHAPTER 4.pdfChapter 41.07 MBAdobe PDFView/Open
CHAPTER 1.pdfChapter 185.54 kBAdobe PDFView/Open
CHAPTER 7.pdfChapter 785.35 kBAdobe PDFView/Open
Declaration.pdfDeclaration52.25 kBAdobe PDFView/Open

This item is protected by original copyright

Your Tags:


  © Copyright 2008 DSpace Faculty of Computer Science and Information Technology, University of Malaya . All Rights Reserved.
DSpace@UM is powered by MIT - Hawlett-Packard. More information and software credits. Feedback