A Novel Approach of Kurtosis based Watermarking by Using Wavelet Transformation

Full Text (PDF, 1250KB), PP.42-50

Views: 0 Downloads: 0


Khaza Mizbahuddin Quadry 1,* A Govardhan 2 Mohammed Misbahuddin 3

1. JNTUK, Kakinada, A.P., India

2. JNTUH, Hyderabad, T.S., India

3. C-DAC, Bangalore, Karnataka, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2018.07.05

Received: 12 Apr. 2018 / Revised: 27 Apr. 2018 / Accepted: 15 May 2018 / Published: 8 Jul. 2018

Index Terms

Band, window, watermark and performance measure


The authentication is used to ensure the authentication of the owner of the data. Currently, the data is available in multimedia format viz., audio, video, image and text. The present paper focuses on the image authentication. The watermarking methods are used for the image authentication. The present paper proposes a novel method of Kurtosis based Watermarking by using Wavelet Transformation (KWWT). The proposed method uses wavelet transformation. Further, the bands or the coefficients are divided into various non overlapped windows. For each of the approximation band windows, the kurtosis value will be estimated. Then the windows in all bands will be selected based on their kurtosis value. Then, the watermark image will be embedded into the selected windows of the bands. Finally, inverse wavelet transformation will be applied to get the resultant watermarked image. The proposed KWWT method is evaluated with 14 input images and 3 watermark images. Various performance measures are estimated and the results show the efficacy of the proposed method.

Cite This Paper

Khaza Mizbahuddin Quadry, A. Govardhan, Mohammed Misbahuddin, " A Novel Approach of Kurtosis based Watermarking by Using Wavelet Transformation  ", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.10, No.7, pp. 42-50, 2018. DOI: 10.5815/ijigsp.2018.07.05


[1]Mohammad Abdullatif ; Akram M. Zeki, Jalel Chebil, Teddy Surya Gunawan, “Properties of digital image watermarking,” IEEE 9th International Colloquium on Signal Processing and its Applications (CSPA), 8-10 March 2013.

[2]Zhi-Yong Meng,Ping-Ping Yu, Guo-Qing Yu, “Copyright protection for digital image based on joint DWT-DCT transformation,” International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR), 15-17 July 2012. 

[3]Mohammad Moosazadeh, Azam Andalib, “A new robust color digital image watermarking algorithm in DCT domain using genetic algorithm and coefficients exchange approach,” Second International Conference on Web Research (ICWR),  27-28 April 2016.

[4]Anita, Archana Parmar, “Image security using watermarking based on DWT-SVD and Fuzzy Logic,”  4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), 2-4 Sept. 2015.

[5]Ahmed Al-Gindy, Amaia Mendez Zorrilla, Bassam Beyrouti, “DCT Watermarking Technique Using Image Normalization” International Conference on Developments of E-Systems Engineering (DeSE), 13-14 Dec. 2015.

[6]Hsin-Lung Wu, Jen-Chun Chang, Te-Chih Chou, Wei-Ming Lai, “A New Scheme for Data Hiding on Halftone Images,” Fifth International Conference on Genetic and Evolutionary Computing (ICGEC), 29th Aug.-1 Sept. 2011. 

[7]M.El Hajji, H. Douzi, D. Mammass, R. Harba, “A robust wavelet-based watermarking algorithm using mixed scales,” International Conference on Multimedia Computing and Systems (ICMCS), 7-9 April 2011.

[8]Jitendra Saturwar, D.N. Chaudhari, “Secure visual secret sharing scheme for color images using visual cryptography and digital watermarking,” Second International Conference on Electrical, Computer and Communication Technologies (ICECCT), 22-24 Feb. 2017.

[9]Amir Anees, Adil Masood Siddiqui, “A technique for digital watermarking in combined spatial and transform domains using chaotic maps,” 2nd National Conference on Information Assurance (NCIA), 11-12 Dec. 2013.

[10]Saurabh Maheshwari, Reena Gunjan, Vijay Laxmi, Manoj S. Gaur, “Robust multi-modal watermarking using visually encrypted watermark,” 19th International Conference on Systems, Signals and Image Processing (IWSSIP), 11-13 April 2012.

[11]Kazuki Yamato, Madoka Hasegawa, Yuichi Tanaka, Shigeo Kato, “Digital image watermarking method using between-class variance,” 19th IEEE International Conference on Image Processing (ICIP), 30 Sept.-3 Oct. 2012.

[12]R. Mothi, M. Karthikeyan, “A wavelet packet and fuzzy based digital image watermarking,” IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 26-28 Dec. 2013.

[13]Meeta Malonia, Surendra Kumar Agarwal, “Digital Image Watermarking using Discrete Wavelet Transform and Arithmetic Progression technique,” IEEE Students' Conference on Electrical, Electronics and Computer Science (SCEECS), 5-6 March 2016.

[14]Yanxia Zhao, Zenghui Zhou, “Multipurpose Blind Watermarking Algorithm for Color Image Based on DWT and DCT,” 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), 21-23 Sept. 2012.

[15]Rohit M. Thanki, Komal R. Borisagar, “Compressive Sensing Based Multiple Watermarking Technique for Biometric Template Protection,” IJIGSP Vol.7, No.1, Dec. 2014a, 53-60.

[16]Ruisong Ye,Leyi Zhuang, “Baker Map's Itinerary Based Image Scrambling Method and Its Watermarking Application in DWT Domain,” IJIGSP Vol.4, No.1, Feb. 2012, 12-20.

[17]Shubhendu Banerjee, Sayan Chakraborty, Nilanjan Dey, Arijit Kumar Pal, Ruben Ray, “High Payload Watermarking using Residue Number System ,” IJIGSP Vol.7, No.3, Feb. 2015, 1-8.