International Science Index


Lifting Wavelet Transform and Singular Values Decomposition for Secure Image Watermarking

Abstract:In this paper, we present a technique of secure watermarking of grayscale and color images. This technique consists in applying the Singular Value Decomposition (SVD) in LWT (Lifting Wavelet Transform) domain in order to insert the watermark image (grayscale) in the host image (grayscale or color image). It also uses signature in the embedding and extraction steps. The technique is applied on a number of grayscale and color images. The performance of this technique is proved by the PSNR (Pick Signal to Noise Ratio), the MSE (Mean Square Error) and the SSIM (structural similarity) computations.
[1] Akshya Kumar Gupta∗ and Mehul S Raval, ‘‘A robust and secure watermarking scheme based on singular values replacement,’’ Sadhana¯ Vol. 37, Part 4, August 2012, pp. 425–440. © Indian Academy of Sciences.
[2] Katzenbeisser Stefan and Petitcolas Fabien A 2000 Information hiding techniques for steganography and digital watermarking. Norwood, MA, USA: Artech House, Inc.
[3] Lee Sin-Joo and Jung Sung-Hwan 2001 A survey of watermarking techniques applied to multimedia. Industrial electronics. Proceedings. ISIE 2001. IEEE International Symposium pp.272–277.
[4] Podilchuk C I and Delp E J 2001 Digital watermarking: Algorithms and applications. Signal Process. Mag. IEEE. 18(4): 33–46.
[5] Pooya Monshizadeh Naini (2011). Digital Watermarking Using MATLAB, Engineering Education and Research Using MATLAB, Dr. Ali Assi (Ed.), ISBN: 978-953-307-656-0, Intech, Available from:
[6] Cox, J.; Miller, M. L.; Bloom, J. A.; Fridrich J. & Kalker T. (2008). Digital Watermarking and Steganography, Morgan Kaufmann Pub., Elsevier Inc.
[7] Mourad Talbi, Siraa Ben Ftima, Adnen Cherif, ‘‘Image watermarking using data compression,’’ Computer Networks and Information Security (WSCNIS), 2015 World Symposium on 19-21 Sept. 2015
[8] R. Dhanalakshmi, K. Thaiyalnayaki, “Dual Watermarking Scheme with Encryption,” International Journal of Computer Science and Information Security, Vol. 7, No. 1, pp.248-253,Jan. 2010.
[9],, Vol. 37, Part 4, August 2012, pp. 425–440. §c Indian Academy of Sciences.
[10] Wang, Z.; Bovik, A. C.; Sheikh, H. R. & Simoncelli E. P. (2004).Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Processing, vol. 13, no. 4, pp. 600-612.