Syntax Literate: Jurnal Ilmiah Indonesia p–ISSN: 2541-0849 e-ISSN: 2548-1398

Vol. 9, No. 4, April 2024

 

IMPROVED WATERMARKING PERFORMANCE IN COLOR IMAGES THROUGH A HYBRID OF DWT-DCT INTEGRATION FOR COPYRIGHT PROTECTION

 

Gagas Pandusarani1, Abba Suganda Girsang2

BINUS Graduate Program, Jakarta, Indonesia1,2

Email: [email protected]1, [email protected]2

 


Abstract

The era of big data has changed the view of data, data can now be considered as data assets. The definition of data assets is data that has rights (exploration rights, use rights, and ownership rights). Some experts believe that data assets have value at their core, the value contained can be in the form of information owned by data assets. Sharing digital data is growing every day as more people access the Internet quickly. Unauthorized individuals can easily access multimedia, such as text, images, video and audio. This research focuses on digital image watermarking to ensure security and copyright protection. This scheme uses a watermarking technique based on the hybrid of the two transformation domains (frequency domain), Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT). The digital image is processed into several parts by the DWT, then the watermark is embedded into one of the parts in the frequency domain using the DCT transformation, then the parts are combined again in the DWT. The experimental results show that the watermarked images achieve the highest PSNR result was 45.2719 dB, and the lowest was 43.3194 dB. an average PSNR value of 44.1254 dB, by testing ten color image datasets sourced from the SIPI-USC image database.

Keywords: Index TermsCopyright Protection, Digital Images, Discrete Wavelet Transform, Discrete Cosine Transform, Watermarking.

 

Introduction

The internet is a large network that can connect all or several computer from government organizations, businesses organizations, non-business organizations, and schools from all over the world directly and quickly (Turban et al., 2007). The growth of internet users in the world, for the last twelve years from 2012 to 2023 has recently increased very rapidly. According to wearesocial.com internet users numbered 5.18 billion people and already exceeded half of the world's population by 64.6 percent in April 2023, with an annual growth rate of below 3 percent, while in the past year until April 2023 it was noted that the growth was almost close to 147 million user (Kemp, 2022). Internet users in the world are dominated by users who use mobile phones or smartphones and are also dominated by active use of social media. The world's most used social media platforms Facebook, YouTube, WhatsApp, and Instagram (Kemp, 2022).

Along with the increase in internet users who are dominated by smartphone users and are active on social media, it is undeniable that the amount of data circulating on the internet will increase rapidly. Data is a record of a concept, fact, and instructions that are stored in a repository and then the data can be processed automatically, so that it becomes easy to understand information (Inmon, 2005). Many have predicted an increase in the amount of data circulating on the internet, but no one can provide the amount, according to the International Data Corporation and Statista which have the same prediction, by 2025 there will be 175 ZB (Zettabytes) (Andre, 53 C.E.). The era of big data has changed the view of data, data can now be considered as data assets. The definition of data assets is data that has rights (exploration rights, use rights, and ownership rights), a collection of valuable data on the internet and can be measured and legible (Yanlin & Haijun, 2020). Some experts believe that data assets have value at their core, the value contained can be in the form of information owned by data assets (Yanlin & Haijun, 2020). There are many types of data on the internet, but this research will focus on image data or digital images. Currently, can we know with certainty the number of digital images circulating on the internet and the number of digital images created or uploaded to social media. Especially digital images, there are several billion digital images that are produced every day and shared through social media on the internet (Kwon et al., 2018). To solve this problem, researchers have developed an invisible watermark to protect intellectual property rights for ownership (Rahardi et al., 2022).

The focus of this research is digital image copyright on the internet. There are many problems that occur with digital images circulating on the internet, such as manipulation, authentication, and illegal distribution which causes the loss of valuable digital images for their owners (Ernawan et al., 2021). All internet users can share data, especially digital images. therefore, it is necessary to have a protection for digital image data in order to save the intellectual property rights of digital images (Ernawan et al., 2021).

One of the innovations that has been adapted by many industrial sectors to protect digital images is digital watermarking. The digital image is embedded by a watermark image and the watermark image can be visible or invisible (Fares et al., 2020). There are two domains that are commonly used in embedding watermarks. First, the spatial domain in this domain, the value of pixels can be easily manipulated because the complexity is very simple and second is the frequency domain is able to withstand all types of attacks because it has a more complicated complexity [10]. The most common frequency domain techniques are Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Discrete Fourier Transform (DFT), Lifting Wavelet Transform (LWT), Singular Value Decomposition (SVD), and Karhunen-Loeve Transform (KLT) (Singh et al., 2021).

This paper proposes a watermarking scheme by hybrid two transforms from frequency domain, Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). The purpose of hybrid the two techniques is to be used to protect copyright from digital images, because a single transformation cannot fulfill all the basic components. To fulfill all these basic components such as imperceptibility, robustness, security, and payload capacity. This research uses a hybrid transform. The first thing to do is to pre-processing the watermark image that will be embedded into a digital image with DWT technique to obtain a more stable image and have good accuracy. The second thing to do is to divide the digital image into small blocks, the processed digital image is then divided into 8x8 blocks. Then the blocks are converted into the frequency domain using the DCT technique. In the third process is the insertion of a secret message, the watermark image that will be inserted into the digital image is then converted into a bitstream and inserted into the DCT coefficients. In the fourth process, after the watermark image has been successfully inserted into the digital image, the image blocks are then converted back into spatial domains using the inverse DCT technique. In the fifth process, a digital image that already contains a secret watermark image is then converted back into a spatial domain using the inverse DWT technique. The final process is the extraction of the watermark image.

Watermark images that have been embedded in digital images can be extracted by taking the modified DCT coefficients on the digital image blocks. After that, the message is converted back to a bitstream and converted to the original message. Digital images that have been inserted with watermarks in the form of watermark images can be distributed safely via the internet. Then digital images that have been watermarked will be tested by calculating the Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE).

Hung-Jui Ko et al. (2021) Conducted research on a robust and transparent watermarking method with a Discrete Cosine Transform (DCT) based scheme with an 8x8 block size. In general, the proposed scheme is based on the correlation of DCT coefficients between blocks, where the same position differences of two adjacent DCT blocks are exploited and the amount of coefficient modification is determined by the watermark bit. The scheme is modifying the block-based DCT coefficients. The difference in the DCT coefficients of the two blocks is calculated and modified based on the watermark bits to fit this difference to a predefined range. The first coefficient in the top left corner of the base array function is known as the direct current (DC) coefficient, while the remainder includes the alternating current (AC) coefficient. The degree of modification of the DCT coefficients depends on the DC coefficients and the median of the AC coefficients which are sorted in zig-zag order. In Experiments, there are also various attacks against watermarked images, such as cropping attacks, salt and pepper, rotation, etc. However, the results of the watermarked images before the attack were unsatisfactory. If, only the test results before the attack have a higher result, then after the attack will also get a higher value.

Jun Wang et al. (2020) Conducted research on digital image watermarking schemes, with new colors in the Discrete Cosine Transform (DCT) domain based on Just Noticeable Distortion (JND). JND is reliable in measuring the power of perception in digital image watermarking. In general, this scheme changes the digital image from RGB to YCbCr, then is divided into 2 components Y and CB. The Y component was chosen to embed the watermark and was divided into 8×8 blocks, while the CB component was used to guarantee the robustness of the scheme. Then, the new JND model combined with the proposed contrast masking and color complexity is applied to the watermarking scheme. the final stage returns YCbCr to RGB. The research results show good test results, and can withstand various attacks. however, sizes for digital images are defined.

Zear et al. (2022) Researched uses a hybrid method of Local Wavelet Transform (LWT), Discrete Cosine Transform (DCT), and Singular Value Decomposition (SVD) to insert two watermarks into a color image. The main goal is to provide high security, resistance to attack, and good-quality of reconstruction. The results of this experiment showed quite good results. However, the tests in this study did not use images commonly used in image testing.

Nguyen Chi Sy et al. (2020) Researched a new scheme based on a combine of Discrete Wavelet Transform (DWT) and Convulutional Neural Network (CNN) techniques. The way this scheme works is that digital images are processed by dwt up to 4 levels, then the low-frequency sub-band of the first level and the high-frequency sub-band of the fourth level are used as input data and output target data to train the CNN model to embed and extract watermarks. The experimental results show that this scheme has very good performance against various types of attacks on watermarked images. However, this study only tested grayscale digital images.

Narima Zermi et al. (2020) researched watermarks with a hybird approach of Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) for medical image protection. The digital image is modified into the frequency domain using DWT, and then the LL sub-band is modified using SVD. The watermarked image is then embedded into the SVD coefficient matrix. the watermarked image is formatted into a sequence of binary data and hashed using the MD5 function. The results show that the scheme can maintain the imperceptibility of the watermarked image. However, the scheme is limited to use for medical images only. Research with this scheme can be further developed to support various types of digital images.

Mahbuba Begum et al. [(2022)A robust watermark must have basic components such as imperceptibility, robustness, security, and payload capacity. This research aims to hybrid three transform methods between Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), and Singular Value Decomposition (SVD). Because a single transformation cannot fulfill all the basic components. To fulfill all these components, this research uses a hybrid transform. In the first stage, the Arnold map is used to encrypt the watermarked images. DCT is applied to the watermarked image and to the digital image followed by DWT and then SVD. In the final stage, the watermarked image is produced by inserting the watermarked image into the digital image. Research results with this scheme show high results in achieving resistance from multiple attacks. However, using a hybrid transform with all three techniques creates high complexity in terms of costs and resources. besides that, there are color limitations in digital images which are only greyscaled. This scheme can be further developed by experimenting with digital RGB images while maintaining resistance to various attacks.

Yi Xie et al. (2020) In his research using a hybrid transform method between Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and Singular Value Decomposition (SVD) with the addition of a suitable algorithm between Double-Scrambling Procedure and Pseudo Magic Square Transform. The hybrid of transforms with the Double-scrambling algorithm results in high computational complexity and requires a high-order matrix transformation. The hybrid of transformation with the double-scrambling algorithm results in high computational complexity and requires a high-order matrix transformation. Meanwhile, the Pseudo Magic Square Transform algorithm produces an easy-to-use transformation. however, it is very vulnerable to attack because its periodic characteristics are too simplistic. The results of this experiment show that each algorithm can meet the basic characteristics and depends on the purpose of its use. However, This Research on testing in this method uses only one color image dataset.

Mohamed Lebcir et al. (2020) In his research, he proposed a robust watermarking technique that does not require original information or blind watermarking for fingerprint images. This technique uses a hybrid of Dual-Tree Complex Wavelet Transform (DTCWT) and Discrete Cosine Transform (DCT) to achieve resistance to geometric attacks that may occur in fingerprint images. The results of his research show that the DTCWT-DCT hybrid is specifically designed to have resistance to geometric attacks. however, the DTCWT-DCT hybrid may involve complex calculations in the watermark insertion and extraction process. This can affect execution times and computational resource requirements, especially if the technique is to be implemented on a large scale or in real time.

Sandeep Mellimi et al. (2021) based on his research suggests a new fast and efficient image watermarking scheme based on Deep Neural Network (DNN) with Lifting Wavelet Transform (LWT). The purpose of this research is to develop a method that can insert and extract watermarks quickly and with a high degree of reliability. The insertion process is carried out by utilizing DNN capabilities in extracting important features from images. Watermarks are inserted adaptively based on the features generated by DNN, thereby ensuring the strength and high quality of watermarks. In addition, this method also has a high level of speed. The process of inserting and extracting watermarks is done quickly using parallel processing techniques from DNN. This allows the method to be used efficiently on large images in less time. Experimental results show that this method can provide a good level of watermark resistance against attacks such as compression, cropping, and filtering, while still maintaining the high visual quality of the image. and stand out in terms of speed and efficiency. However, this study only tested greyscale digital images. This research focuses on digital image watermarking to ensure security and copyright protection,

 

Research Methods

The digital images that will be used in this study consist of eight digital images, each digital image having a size of 512×512 pixels. These digital images were used as the dataset for this study obtained from the SIPI-USC image database. The University of Southern California (USC) provided these images for research purposes in image processing and many researchers have used these images to experiment in the field of image watermarking (Rahardi et al., 2022). The images are shown in Figure 1.

 

(a)

(b)

(c)

(d)

(e)

(f)

(g)

(h)

(i)

 

 

 

(j)

 

Figure 1. The Digital Image (Host) (a) Lena (b) Airplane (c) Baboon (d) Peppers (e) Sailboat (f) House (g) Splash (h) Tiffany (i) Woodland Hills (j) Earth From Space.

 

Results and Discussion

Watermark Embedding

Watermark Embedding is the process of inserting additional information called a watermark into digital content, such as images, audio, or video for identification purposes (Tao et al., 2014). Schematic of embedding a watermark image into a digital image. Each digital image depicted in Figure 1 will undergo a watermark insertion process scheme, as illustrated in Figure 2.

 

Figure 2. DWT-DCT Watermark Embedding Process.

 

Based on Figure 2, the process of embedding a watermark starts with the digital image being broken down into different subbands using a wavelet filter (DWT). the subbands consist of cA1 (LL), cH1 (LH), cV1 (HL), and cD1 (HH). the cA1 (Approximation) subband contains a low component (low frequency), the cH1 (Horizontal High Frequency) subband contains a horizontal high component, the cV1 (Vertical High Frequency) subband contains a vertical high component, and the cD1 (Diagonal High Frequency) subband contains the diagonal height component of the cover image.

Furthermore, in the cH1 and cV1 subbands, the DCT process was carried out. DCT converts the blocks in the subband into DCT coefficients. The DCT coefficient describes the frequency component of the blocks. The watermark image is stored in a black and white binary image with a size of 64×64 pixels and the watermark image itself is taken from the logo of the Indonesian Ministry of Public Works and Public Housing.

After that, the message to be inserted is prepared. This message is then inserted into the cH1 and cV1 subband blocks. This process is done by modifying some DCT coefficients in these blocks using PN sequence_zero or PN sequence_one, depending on the message bits to be inserted. PN sequence_zero and PN sequence_one are pseudo-random number sequences used to secure message insertion. After all the message bits are inserted, the inversion process is carried out. First, the modified DCT coefficients are returned to spatial form using Inverse DCT in each block in the cH1 and cV1 subbands. This returns the blocks to their initial spatial domain.

Next, the unmodified cA1 (Approximation) subband was coupled to the reconstructed cH1, cV1, and cD1 subbands. Then, the Inverse DWT process is applied to the combined subbands to produce a watermarked image. This image is the initial image that has been inserted with the message. The process combines the power of DWT to separate image information in the frequency domain with the power of DCT to convert frequency information into a form of modifiable coefficients. Thus, the message can be embedded into the DCT coefficients in the cH1 and cV1 subbands, which can then be reconstructed into the resulting watermarked image.

 

Watermark Extraction

Figure 3. DWT-DCT Extraction Process

 

After the watermark has been successfully inserted into a digital image, the image with the watermark can be safely distributed via the internet. If the image is modified or misused by unauthorized parties, the actual owner can use the extraction process to reveal the watermark data. The extraction process is explained in Fig. 3. During the Extraction Process, the watermark extraction process should be defined as the reverse process based on the embedding process (Wazirali et al., 2021). It is used to recover original digital images and watermarks without losing any information (Meng et al., 2021). Thus the extraction process is very important because it relates to the ownership of the digital image (Le Merrer et al., 2020).

 

Performance Evaluation

Imperceptibility is the property of a system or technique which indicates that changes or additions to certain information cannot be easily detected by the user or recipient. In the context of watermarking, imperceptibility refers to the ability of retaining the perceptual features of the cover image after being distorted by watermarking (Ray & Roy, 2020). The less visible or invisible watermark on the digital image is an important judging criterion (Zhou et al., 2021).

To measure the imperceptibility resistance of digital images embedded with watermarks, the scheme calculates using the Peak Signal to Noise Ratio (PSNR) of digital images with watermarks. In most of the literature, PSNR is standardized as one of the metrics to calculate the evaluation of imperceptibility (Lisbeth et al., 2013; Ray & Roy, 2020). A high PSNR value proves that the differences between digital images before embedding and after embedding do not show significant differences or less distortions (Krivenko et al., 2020). The PSNR defined by:

 

          (1)

 

 

                              (2)

 

The simple explanation is that p is a digital image and q is a digital image that has been embedded with a watermark. i and j are the coordinates of the pixels. PSNR values are measured in decibels (dB). Usually, an acceptable PSNR value is at least above 30 dB (Setiadi, 2021), or better above 40 dB (Cheddad et al., 2010; Rahardi et al., 2022).

 

Result and Analysis

The experiment in this research is evaluated using a laptop with a 1.8 GHz octa-core Intel(R) Core (TM) i7-8565U processor, 16 GB memory, and a Windows 11 Home Single 64-bit operating system. This experiment uses MATLAB R2022a as the programming language.

After the host image is transformed by DWT into parts, the watermark image is integrated into the DCT transformation domain during the watermark embedding procedure. As a result, when compared with the digital image, the watermarked image shows undetected distortion. Figure 4 displays Splash's host image along with a watermarked version.

(a)

(b)

(c)

Figure 4. The Splash Image (a) The Digital Image (Host) (b) The Watermark Image (c) The Watermarked Image

 

As can be seen in Figure 4(c), the scheme successfully embeds the watermark into the host image. Additionally, the host image and the watermark image cannot be distinguished by the human visual system, and the watermark image cannot be seen visually from the host image. By using PSNR, the watermark image is evaluated. A higher PSNR value indicates that the watermarked image has less distortion than the original image.. A lower PSNR value, on the other hand, indicates that the watermarked image shows significant error distortion in comparison to the host image. Table I displays comparisons of imperceptibility.

 

Table 1. The Imperceptibility Comparison of DWT-DCT Between Images

Image

PSNR (dB)

Lena

44.2229

Airplane

43.6164

Baboon

44.2292

Peppers

43.7612

Sailboat

44.2156

House

44.2164

Splash

44.1816

Tiffany

45.2719

Woodland Hills

44.2191

Earth From Space

43.3194

Average

44.1254

 

Table 2. The Imperceptibility Comparison with Related Work

Method

PSNR (dB)

Jui Ko et al. (DCT-Inter Blok Coefficient Corelation)

41.41XX

Zear et al. (LWT-DCT-SVD)

30.84XX

Xie et al. (DWT-DCT-SVD-New Scrambling)

43.2552

Proposed DWT-DCT

44.1254

 

Based on Table II, DWT-DCT outperforms the previous method in terms of imperceptibility under PSNR metric calculations. The PSNR value here is taken from the average value of the test results in each research conducted on the dataset. In terms of the watermark, there are also no changes to the visuals of the watermark after the process of extraction the digital image that has been embedded, shown in Fig. 5.

 

(a) The Watermark

(b) The Watermark After Extraction

Figure 5. Comparison After Extraction

 

Conclusion

This paper presents a proven method for color image watermarking based on DWT-DCT for copyright protection. The DWT performs a transformation on the digital image and then each image block has been converted into a transformation domain using DCT, this is where the embedding process occurs. The results of the experiments carried out in this research show that the watermark image achieves the highest PSNR value of 45.2719 dB in the tiffany image shown in Fig. 1(h) and the lowest in the Earth from Space image is shown in Fig. 1(j) with a PSNR value of 43.3194. With the average value of ten experiments using this method, the PSNR value is 44.1254. In the future, DWT-DCT will be tested for its resistance to various attacks and will be improved by implementing several algorithms that can improve the results of PSNR and resistance to attacks against digital image tampering.

Acknowledgment

This paper was prepared in order to complete the postgraduate program and was supported by Bina Nusantara University. The authors sincerely thank those who contributed to the work on this paper and hopefully generate many new research or other great new projects in the future.

 

BIBLIOGRAFI

 

Andre, L. (53 C.E.). Important Statistics About How Much Data Is Created Every Day. Pobrane z: Https://Financesonline. Com/How-Much-Data-Is-Created-Every-Day/(20.05. 2022).

Begum, M., Ferdush, J., & Uddin, M. S. (2022). A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition. Journal of King Saud University-Computer and Information Sciences, 34(8), 5856–5867.

Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752.

Ernawan, F., Ariatmanto, D., & Firdaus, A. (2021). An improved image watermarking by modifying selected DWT-DCT coefficients. IEEE Access, 9, 45474–45485.

Fares, K., Amine, K., & Salah, E. (2020). A robust blind color image watermarking based on Fourier transform domain. Optik, 208, 164562.

Inmon, W. H. (2005). Building the data warehouse. John wiley & sons.

Kemp, S. (2022). Fraud reporting in Catalonia in the Internet era: Determinants and motives. European Journal of Criminology, 19(5), 994–1015.

Krivenko, S., Demchenko, D., Dyogtev, I., & Lukin, V. (2020). A two-step approach to providing a desired quality of lossy compressed images. Integrated Computer Technologies in Mechanical Engineering: Synergetic Engineering, 482–491.

Kwon, O.-J., Choi, S., & Lee, B. (2018). A watermark-based scheme for authenticating JPEG image integrity. IEEE Access, 6, 46194–46205.

Le Merrer, E., Perez, P., & Trédan, G. (2020). Adversarial frontier stitching for remote neural network watermarking. Neural Computing and Applications, 32(13), 9233–9244.

Lebcir, M., Awang, S., & Benziane, A. (2020). Robust blind watermarking technique against geometric attacks for fingerprint image using DTCWT-DCT. Iraqi Journal of Science, 2715–2739.

Lisbeth, M., Consuelo, P., Glenda, C., Elena, C., Carlos, R. J., Alejandro, R., & Maria, G.-Y. (2013). Evaluation of the effect of nimodipine od (extended release) vs nimodipine tid in the treatment of peripheral vertigo. Current Drug Delivery, 10(3), 343–347.

Mellimi, S., Rajput, V., Ansari, I. A., & Ahn, C. W. (2021). A fast and efficient image watermarking scheme based on deep neural network. Pattern Recognition Letters, 151, 222–228.

Meng, L., Liu, L., Tian, G., & Wang, X. (2021). An adaptive reversible watermarking in IWT domain. Multimedia Tools and Applications, 80, 711–735.

Rahardi, M., Abdulloh, F. F., & Putra, W. S. (2022). A Blind Robust Image Watermarking on Selected DCT Coefficients for Copyright Protection. International Journal of Advanced Computer Science and Applications, 13(7).

Ray, A., & Roy, S. (2020). Recent trends in image watermarking techniques for copyright protection: a survey. International Journal of Multimedia Information Retrieval, 9(4), 249–270.

Setiadi, D. R. I. M. (2021). PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimedia Tools and Applications, 80(6), 8423–8444.

Singh, O. P., Singh, A. K., Srivastava, G., & Kumar, N. (2021). Image watermarking using soft computing techniques: A comprehensive survey. Multimedia Tools and Applications, 80(20), 30367–30398.

Sy, N. C., Kha, H. H., & Hoang, N. M. (2020). An efficient robust blind watermarking method based on convolution neural networks in wavelet transform domain. Int. J. Mach. Learn. Comput, 10, 675–684.

Tao, H., Chongmin, L., Zain, J. M., & Abdalla, A. N. (2014). Robust image watermarking theories and techniques: A review. Journal of Applied Research and Technology, 12(1), 122–138.

Turban, E., Rainer, K. R., & Potter, R. E. (2007). Introduction to information system. New York: Jhon Wiley and Sons, Inc.

Wang, J., Wan, W. B., Li, X. X., De Sun, J., & Zhang, H. X. (2020). Color image watermarking based on orientation diversity and color complexity. Expert Systems with Applications, 140, 112868.

Wazirali, R., Ahmad, R., Al-Amayreh, A., Al-Madi, M., & Khalifeh, A. (2021). Secure watermarking schemes and their approaches in the IoT technology: an overview. Electronics, 10(14), 1744.

Xie, Y., Wang, Y., & Ma, M. (2020). Design of a hybrid digital watermarking algorithm with high robustness. Journal of Web Engineering, 19(5–6), 725–746.

Yanlin, W., & Haijun, Z. (2020). Data asset value assessment literature review and prospect. Journal of Physics: Conference Series, 1550(3), 32133.

Zear, A., & Singh, P. K. (2022). Secure and robust color image dual watermarking based on LWT-DCT-SVD. Multimedia Tools and Applications, 81(19), 26721–26738.

Zhou, X., Ma, Y., Zhang, Q., Mohammed, M. A., & Damaševičius, R. (2021). A reversible watermarking system for medical color images: balancing capacity, imperceptibility, and robustness. Electronics, 10(9), 1024.

 

Copyright holder:

Gagas Pandusarani, Abba Suganda Girsang (2024)

 

First publication right:

Syntax Literate: Jurnal Ilmiah Indonesia

 

This article is licensed under: