Copyright Protection for Digital Certificate using Blind Watermarking Technique

Abstract = 1158 times | PDF = 494 times

Main Article Content

Harith Raad Hasan


This paper proposes a copyright protection system for digital certificate image using blind watermarking technique by applying discrete wavelet transform algorithm (DWT). The proposed technique utilizes three interrelated watermarks namely, Red watermark (RW), Green-watermark (GW) and Blue-watermark (BW). Firstly, RGB cover and RGB watermark image are divided for three color space R,G,B. Then the R component is chosen for embedding (RW), the B component is selected for embedding the (BW) and the G component is selected for embedding the (GW), R,G and B of the cover image are converted into the transform domain using DWT, and is subsequently decomposed into three levels viz.  LH1, LL2 and LL3 sub-bands. RW, GW and BW are then embedded onto LL3. Experimental results show that the performance of the proposed technique is very encouraging with average PSNR of 44 db, and NCC value of more than 0.99 for extracted watermarks after performing several types of attacks.


Digital Copyright Protection, Blind Watermarking Systems, Transform domain, Robustness, Discrete Wavelet transform (DWT).


Download data is not yet available.

Article Details


[1] Y.Chang “A Blind Watermarking Algorithm” International Research Journal Of Engineering And Technology (IRJET), Volume: 04 Issue: 01 | Jan -2017.
[2] M. CEDILLO-HERNANDEZ, A. CEDILLO-HERNANDEZ, F. GARCIA-UGALDE” Digital Color Images Ownership Authentication Via Efficient And Robust Watermarking In A Hybrid Domain” RADIOENGINEERING, VOL. 26, NO. 2, JUNE 2017.
[3] R. Thanki And Vedvyas Dwivedi “A Watermarking Algorithm For Multiple Watermarks Protection Using RDWT-SVD And Compressive Sensing” Informatica 41 (2017) 479–493 479.
[4] C. Cox And M. Miller,(1997), A Review Of Watermarking And The Importance Of Perceptual Modeling, Proceedings Of Proc. SPIE, Vol. 3016, Pp. 92.
[5] M.S. Emami, Ghazali Bin Sulong, Jasni Mohamad Zain, 2011.“ A New Performance Trade-Off Measurement Technique For Evaluating Image Watermarking Schemes”, Communications In Computer And Information Science, Springer.
[6] R. G. V. Schyndel, A. Z. Tirke And C.F. Osborne, 1994.“A Digital Watermark”,Proc, Proceeding Of The 1st IEEE Image Processing Conference, Nov. 15-17, RMIT, Houston TX., Pp: 86-90.
[7] P. Taoa And A. M. Eskicioglub, 2004 “A Robust Multiple Watermarking Scheme In The Discrete Wavelet Transform Domain”, SPIE, Internet Multimedia Management Systems V, Vol. 5601, 133, Philadelphia, PA, USA.
[8] G. Bin Sulong, Harith Hasan, Ali Selamat, Mohammed Ibrahim And Saparudin, 2012. “A New Color Image Watermarking Technique Using Hybrid Domain”, IJCSI International Journal Of Computer Science Issues, Vol. 9, Issue 6, No 1.
[9] M. H. Al-Otum And N. A. Samara, 2010.“A Robust Blind Color Image Watermarking Based On Wavelet-Tree Bit Host Difference Selection.Pdf”, Signal Processing, Elsevier, Vol :90, PP 2498-2512.
[10] I. N. Wu, And M. Hwang, 2007. “Data Hiding: Current Status And Key Issues”, Ternational Journal Of Network Security, Vol.4, No.1, PP.1–9.
[11] Y. Dejun, Y. Rijing, Y. Yuhai And X. Huijie, 2009. “Blind Digital Image Watermarking Technique Based On Intermediate Significant Bit And Discrete Wavelet Transform”, Proc, International Conference On Computational Intelligence And Software Engineering, IEEE Computer Society.
[12] D. Zhang, J. Xu, H. Li And H. Li, 2009. “A Novel Image Watermarking Algorithm With Fast Processing Speed”, International Conference On Information Engineering And Computer Science, IEEE Computer Society.
[13] M. Ozturk, A. Akan And Y. Cekic, 2010. “A Robust Image Processing In The Joint Time-Frequency Domain”, EURASIP Journal On Advances In Signal Processing, Hindawi Publishing Corporation.
[14] S.Voloshynovskiy, F. Deguillaume, S. Pereira, And T. Pun, 2001. “Optimal Adaptive Diversity Watermarking With Channe State Estimation”, Proc, SPIE: Security And Watermarking Of Multimedia Contents.
[15] L. Li, B. Guo And J. Pan, 2008. ” Robust Image Watermarking Using Feature Based Local Invariant Regions”, International Journal Of Innovative Computing, Information And Control, Vol. 4, No. 8, PP. 1977-1986.
[16] M. S. Perumal And V.Vijayakumar, 2011. “A Wavelet Based Digital Watermarking Method Using Thresholds On Intermediate Bit Values” International Journal Of Computer Applications,Vol. 15, No.3.
[17] C. Chang, C. Lin And Y. Hu, 2007. “An SVD Oriented Watermark Embedding Scheme With High Qualities For The Restored Images”, International Journal Of Innovative Computing, Information And Control, Vol. 3, No. 3, PP. 609-620.
[18] M. Barni, F. Bartoloni, V. Cappellini, And A. Piva, 1998. “A DCT-Domain System For Robust Image Image Watermarking”, Signal Processing, Elsevier, Vol:66(3), PP 357-372.
[19] J. Bennour, Dugelay, J, And Matta, F, 2007. “Watermarking Attack (BOWS Contest”, Security, Steganography, And Watermarking Of Multimedia Contents, Proceedings Of SPIE-IS&T Electronic Imaging, Vol. 6505, Pp. 650518-1 - 650518-6, SPIE-IS&T.
[20] J. O’Ruanaidh, And T. Pun, 1997. “Rotation Scale And Translation Invariant Digital Watermarking”, Proc, IEEE Int’ Conf. On Image Processing, IEEE Computer Society, PP 536-538.
[21] G. Depovere, T. Kalker, And J. Linnartz, 1998. “Improved Watermark Detection Using Filtering Before Correlation”, International Conference On Image Processing, Vol. 1, Pp. 430,
[22] A. A. Mohammed, & Haval Sidqi, 2011.” Robust Image Watermarking Scheme Based On Wavelet Technique”. International Journal Of Computer Science And Security (IJCSS), 5.
[23] M. S. Emami, Ghazali And Salbiah 2012. A Novel Multiple Semi-Blind Enhanced ISB Watermarking Algorithm Using Watermark Bit-Pattern Histogram For Copyright Protection. International Journal Of Innovative Computing, Information And Control. 8(3.), 1665-1687.
[24] M.Khalili 2003. “A Comparison Between Digital Images Watermarking in Tow Different Color Spaces Using DWT ”. National Academy of Science of Armenia Yerevan, Armenia.
[25] C. Kung, S. Chao, Y. Tu, Y. Yan and C. Kung, 2009. “A Robust Watermarking and Image Authentication Scheme used for Digital Content Application”, Journal of Multimedia, Vol. 4, No. 3.
[26] K. Deb, S. Agrawal, A. Pratab, T. Meyarivan, “A Fast Elitist Non-dominated Sorting Genetic Algorithms for Multiobjective Optimization: NSGA II,” KanGAL report 200001, Indian Institute of Technology, Kanpur, India, 2000. (technical report style)
[27] J. Geralds, "Sega Ends Production of Dreamcast,", para. 2, Jan. 31, 2001. [Online]. Available: [Accessed: Sept. 12, 2004]. (General Internet site).