Your browser does not support JavaScript!

Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics

Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Image Processing — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Digital watermarking has been suggested as a way to achieve digital protection. The aim of digital watermarking is to insert the secret data into the image without significantly affecting the visual quality. This study presents a robust block-based image watermarking scheme based on the singular value decomposition (SVD) and human visual system in the discrete wavelet transform (DWT) domain. The proposed method is considered to be a block-based scheme that utilises the entropy and edge entropy as HVS characteristics for the selection of significant blocks to embed the watermark, which is a binary watermark logo. The blocks of the lowest entropy values and edge entropy values are selected as the best regions to insert the watermark. After the first level of DWT decomposition, the SVD is performed on the low-low sub-band to modify several elements in its U matrix according to predefined conditions. The experimental results of the proposed scheme showed high imperceptibility and high robustness against all image processing attacks and several geometrical attacks using examples of standard and real images. Furthermore, the proposed scheme outperformed several previous schemes in terms of imperceptibility and robustness. The security issue is improved by encrypting a portion of the important information using Advanced Standard Encryption a key size of 192-bits (AES-192).


    1. 1)
    2. 2)
    3. 3)
    4. 4)
    5. 5)
    6. 6)
    7. 7)
      • 24. Liu, L.: ‘A survey of digital watermarking technologies’. Tech. Rep., Stoney Brook University, USA, 2005.
    8. 8)
    9. 9)
    10. 10)
    11. 11)
      • 25. Padmanabha Reddy, , Varadarajan, S.: ‘Human visual system sentient imperceptible and efficient wavelet-based watermarking scheme for copyright protection of digital images’, IJCSNS Int. J. Comput. Sci. Netw. Sec., 2009, 9, (4), pp. 255264.
    12. 12)
    13. 13)
    14. 14)
    15. 15)
    16. 16)
    17. 17)
    18. 18)
      • 23. Serdean, C.V., Tomlinson, M., Wade, J.G, Ambroze, M.: ‘Protecting intellectual rights: Digital watermaking in the wavelet domain’. Proc. IEEE Int. Workshop Trends and Recent Achievements in Information Technology, 2002.
    19. 19)
    20. 20)
      • 22. Rathi, S., Inamdar, V.: ‘Medical images authentication through watermarking preserving ROI’, Healthcare Inf., Int. J. (HIIJ), 2012, 1, (1), pp. 2742.
    21. 21)
    22. 22)
      • 5. de Vugt, F.: ‘Quantization-watermarking methods for digital audio’, 2001.
    23. 23)
    24. 24)
    25. 25)
      • 30. Rassem, T.H.: ‘New histogram-based interest point detectors, and new appearance and texture image descriptors for object class recognition’. Ph.D. thesis, School of Electrical and Electronic Engineering, Universiti Sains Malaysia (USM), 2014.
    26. 26)
    27. 27)
      • 6. Ruanaidh, J., Pun, T.: ‘Rotation, scale and translation invariant digital image watermarking’. Proc. IEEE Int. Conf. Image Processing, 1997, pp. 536539.
    28. 28)
    29. 29)
    30. 30)
    31. 31)

Related content

This is a required field
Please enter a valid email address