Skip to main content

Realization and Simulation of Watermarking Algorithm Based on Spread Spectrum and DFT

  • Conference paper
  • First Online:
Cognitive Radio Oriented Wireless Networks and Wireless Internet (CROWNCOM 2021, WiCON 2021)

Abstract

In order to protect image copyright and anti-counterfeit authentication, digital watermarking technology arises at the historic moment. The contradiction between robustness and invisibility affects the development of watermarking technology. To solve this problem, a watermarking algorithm based on spread spectrum and DFT is proposed. The main work of this paper is as follows: firstly, image embedding watermarking: the original image is segmented into two-dimensional discrete Fourier transform, then the watermark information through sequence even spread spectrum is superimposed, and finally the image with watermark is obtained by the inverse discrete Fourier transform. Secondly, extracting watermark information: the discrete Fourier transform is applied to the blocks of the original image and the image with watermark, the spread spectrum watermark information is extracted by comparing the amplitude and the original watermark is obtained by the final solution and expansion. Finally, the simulation results show that the proposed algorithm has good performance in robustness and invisibility.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tirkel, A., Rankin, G.: Electronic watermark. ResearchGate 40(4), 222–223 (1993)

    Google Scholar 

  2. Milad, A., Jasper, R.S., Bryan, T.B., Mark, A.F.: High-speed all-optical Haar wavelet transform for real-time image compression. Opt. Express 25(9), 9802–9811 (2017)

    Article  Google Scholar 

  3. Somwanshi, D., Chhipa, I., Singhal, T., Yadav, A.: Modified Least significant bit algorithm of digital watermarking for information security. In: Pant, M., Ray, K., Sharma, T., Rawat, S., Bandyopadhyay, A. (eds) Soft Computing: Theories and Applications, Advances in Intelligent Systems and Computing, vol. 584. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-5699-4_44

  4. Narawade, N.S.: Robust reversible watermarking using integration of histogram shifting and patchwork algorithm to improve quality and capacity. In: IEEE International Conference on Information Processing, 2016, pp.625–630 (2016)

    Google Scholar 

  5. Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image process. 6(12), 1673–1687 (1997)

    Article  Google Scholar 

  6. Ruanaidh J.J.K.O., Dowling W.J., Boland F.M.: Phase watermarking of digital images. In: Proceedings of 3rd IEEE International Conference on Image Processing, 1996, pp.239–242 (2016)

    Google Scholar 

  7. Saini, L.K., Shrivastava, V.: Analysis of attacks on hybrid DWT-DCT algorithm for digital image watermarking with MATLAB. Int. J. Comput. Sci. Trends Technol. 2(3), 123–125 (2014)

    Google Scholar 

  8. Zhou, Z., Zhu, J., Su, Y., Wang, M., Sun, X.: Geometric correction code-based robust image watermarking. IET Image Proc. 2021, 1–10 (2021)

    Google Scholar 

  9. Veni, M., Meyyappan, T.: Digital image watermark embedding and extraction using oppositional fruit fly algorithm. Multimedia Tools Appl. 78(19), 27491–27510 (2019). https://doi.org/10.1007/s11042-019-7650-0

    Article  Google Scholar 

  10. Dong, Z., Hu, N.: A method for the detection of long pseudo-random code DSSS signals based on the processing of delay-multiply (II) - the estimation of the information symbol period and the pseudo-random code sequence. In: 2008 11th IEEE International Conference on Communication Technology, 2008, pp. 233–236 (2008)

    Google Scholar 

  11. Moosazadeh, M., Ekbatanifard, G.: A new DCT-based robust image watermarking method using teaching-learning-Based optimization. J. Inf. Security Appl. 47, 28–38 (2019)

    Google Scholar 

  12. Roy, S., Pal, A.K.: A blind DCT based color watermarking algorithm for embedding multiple watermarks. AEU Int. J. Electr. Commun. 72, 149–161 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wanming Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wen, T., Liu, W., Du, R., Xie, J. (2022). Realization and Simulation of Watermarking Algorithm Based on Spread Spectrum and DFT. In: Jin, H., Liu, C., Pathan, AS.K., Fadlullah, Z.M., Choudhury, S. (eds) Cognitive Radio Oriented Wireless Networks and Wireless Internet. CROWNCOM WiCON 2021 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 427. Springer, Cham. https://doi.org/10.1007/978-3-030-98002-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-98002-3_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-98001-6

  • Online ISBN: 978-3-030-98002-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics