Document Type : Original Research Paper


1 School of Information Science and Engineering, Rizhao Campus, Qufu Normal University, Rizhao City, Shandong Province, 276826, China

2 School of Information Science and Engineering, Rizhao Campus, Qufu Normal University Rizhao City, Shandong Province 276826, China

3 School of Information Science and Engineering Rizhao Campus, Qufu Normal University Rizhao City, Shandong Province 276826, China


In this paper, a color image watermarking algorithm based on Redundant Discrete Wavelet Transform (RDWT) and Singular Value Decomposition (SVD) is proposed. The new algorithm selects blue component of a color image to carry the watermark information since the Human Visual System (HVS) is least sensitive to it. To increase the robustness especially towards affine attacks, RDWT is adopted for its excellent shift in-variance. In addition, the SVD technique can also ensure the robustness due to the eminent properties of singular values. It is worth mentioning that the watermark information is not processed by SVD in embedding procedure, which prevents the occurrence of false positive detection. Meanwhile, to acquire a balance between imperceptibility and robustness, various scaling factor values are used towards different sub-bands. Experimental results show that the proposed algorithm has outstanding security, imperceptibility and robustness.


[1]      B. U. Rani, B. Praveena B., and K. Ramanjaneyulu, “Literature review on digital image Watermarking,” in Proc. Int. Conf. on Advanced Research in Computer Science Engineering & Technology, ACM, pp. 43, 2015.

[2]      X. P. Zhang and K. Li “Comments on: An SVD-based watermarking scheme for protecting rightful Ownership,” IEEE Trans. Multimedia, vol. 7, no. 3, pp. 593-594, 2005.

[3]      K. Loukhaoukha, A. Refaey, and K. Zebbiche, “Comments on "A robust color image watermarking with singular value decomposition method," Adv. Eng. Software, vol. 42, pp. 44-46, 2016.

[4]      N. M. Makbol and B. E. Khoo, “Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition,” AEU-International Journal of Electronics and Communications, vol. 67, no. 2, pp. 102-112, 2013.

[5]      A. Z. Tirkel, G. Rankin, R. Van Schyndel, W. Ho, N. Mee, and C.F. Osborne, “Electronic watermark,” Digital Image Computing, Technology and Applications (DICTA’93), pp. 666-673, 1993.

[6]      M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless generalized-LSB data embedding,” IEEE Trans. Image Process., vol. 14, no. 2, pp. 253-266, 2005.

[7]      W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3.4, pp. 313-336, 1996.

[8]      B. P. Kumari and V. S. Rallabandi, “Modified patchwork-based watermarking scheme for satellite imagery,” Signal Processing, vol. 88, no. 4, pp. 891-904, 2008.

[9]      P. Campisi, D. Kundur, and A. Neri, “Robust digital watermarking in the ridgelet domain,” IEEE signal processing letters, vol. 11, no. 10, pp. 826-830, 2004.

[10]   I.-H. Pan, P.S. Huang, and T.-J. Chang, “DCT-based watermarking for color images via two-dimensional linear discriminant analysis,” Information Technology Convergence, vol. 253, pp. 57-65, 2013.

[11]   M. Urvoy, D. Goudia, and F. Autrusseau, “Perceptual DFT watermarking with improved detection and robustness to geometrical distortions,” IEEE Trans. Inf. Forens.. Security, vol. 9, no. 7, pp. 1108-1119, 2014.

[12]   C.-C. Lai and C.-C. Tsai, “Digital image watermarking using discrete wavelet transform and singular value decomposition,” IEEE Trans. Instrum. Meas., vol. 59, no. 11, pp. 3060-3063, 2010.

[13]   S. Lagzian, M. Soryani, and M. Fathy, “A new robust watermarking scheme based on RDWT-SVD,” International Journal of Intelligent Information Processing, vol. 2, no. 1.3, pp. 22-29, 2011.

[14]   E. Ganic and A.M. Eskicioglu, “Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition,” Journal of Electronic Imaging, vol. 14, no. 4, pp. 043004-043009, 2005.

[15]   J. George, S. Varma, and M. Chatterjee, “Color image watermarking using DWT-SVD and Arnold transform,” in Proc. IEEE Annual India Conf., pp. 1-6, Pune, India, 2014.

 [16]   T.D. Hien, Z. Nakao, and Y.-W. Chen, “Robust multi-logo watermarking by RDWT and ICA,” Signal Processing, vol. 86, pp. 2981-2993, 2006.

[17]   A.K. Gupta and M.S. Raval, “A robust and secure watermarking scheme based on singular values replacement,” Sadhana, pp. 1-16, 2012.


Journal of Electrical and Computer Engineering Innovations (JECEI) welcomes letters to the editor for the post-publication discussions and corrections which allows debate post publication on its site, through the Letters to Editor. Letters pertaining to manuscript published in JECEI should be sent to the editorial office of JECEI within three months of either online publication or before printed publication, except for critiques of original research. Following points are to be considering before sending the letters (comments) to the editor.

[1] Letters that include statements of statistics, facts, research, or theories should include appropriate references, although more than three are discouraged.

[2] Letters that are personal attacks on an author rather than thoughtful criticism of the author’s ideas will not be considered for publication.

[3] Letters can be no more than 300 words in length.

[4] Letter writers should include a statement at the beginning of the letter stating that it is being submitted either for publication or not.

[5] Anonymous letters will not be considered.

[6] Letter writers must include their city and state of residence or work.

[7] Letters will be edited for clarity and length.