Main Article Content

C Thanh Vo
Hung Phuoc Vo
Son Thai Nguyen


Nowadays, with the rapid development of the Internet, the transmission of digital data such as images, videos and texts through the Internet becomes more convenient. Therefore, how to protect the integrity and copyright of digital data has become an urgent issue. This paper presents a watermarking method that based on Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) in order to protect copyright of digital images. The experimental results show that the quality of watermarked images are maintained good with high robustness against  various attacks and watermark can be extracted from embedded image without original image.


Download data is not yet available.

Article Details

How to Cite
Vo, C., Vo, H. and Nguyen, S. (2019) “APPLYING WATERMARKING IN DIGITAL IMAGE COPYRIGHT PROTECTION”, The Scientific Journal of Tra Vinh University, 1(1), pp. 1-8. doi: 10.35382/18594816.1.1.2019.80.


[1] V. S. Verma and R. K. Jha, “An Overview of Robust Digital Image Watermarking,” IETE Technical
Review, Jun. 2015.
[2] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker,
Digital Watermarking and Steganography. Morgan
Kaufmann Publishers Inc., 2007.
[3] A. Khan, A. Siddiqa, S. Munib, and S. A. Malik,
“A recent survey of reversible watermarking techniques,” Information Sciences, vol. 279, pp. 251–272,
Sep. 2014.
[4] A. Bamatraf, R. Ibrahim, and M. N. B. M. Salleh,
“Digital watermarking algorithm using LSB,” in
2010 International Conference on Computer Applications and Industrial Electronics, 2010, pp. 155–159.
[5] F. Ernawan and M. N. Kabir, “A Robust Image
Watermarking Technique With an Optimal DCTPsychovisual Threshold,” IEEE Access, vol. 6, pp.
20464–20480, 2018.
[6] W.-L. Lyu, C.-C. Chang, N. T.S, and C.-C. Lin, “Image Watermarking Scheme Based on Scale-Invariant
Feature Transform,” KSII Transactions on Internet
and Information Systems, vol. 8, no. 10, Oct. 2014.
[7] V. Aslantas, “An optimal robust digital image watermarking based on SVD using differential evolution
algorithm,” Optics Communications, vol. 282, no. 5,
pp. 769–777, Mar. 2009.
[8] Liu. Ruizhen and Tieniu Tan, “An SVD-based watermarking scheme for protecting rightful ownership,”
IEEE Transactions on Multimedia, vol. 4, no. 1, pp.
121–128, Mar. 2002.
[9] Q. Su, Y. Niu, H. Zou, and X. Liu, “A blind dual
color images watermarking based on singular value
decomposition,” Applied Mathematics and Computation, vol. 219, no. 16, pp. 8455–8466, Apr. 2013.
[10] S. Roy and A. K. Pal, “A robust blind hybrid image
watermarking scheme in RDWT-DCT domain using
Arnold scrambling,” Multimedia Tools and Applications, vol. 76, no. 3, pp. 3577–3616, Feb. 2017.
[11] A. Mishra, C. Agarwal, A. Sharma, and P. Bedi,
“Optimized gray-scale image watermarking using
DWT–SVD and Firefly Algorithm,” Expert Systems
with Applications, vol. 41, no. 17, pp. 7858–7867,
Dec. 2014.
[12] C.-C. Lai and C.-C. Tsai, “Digital Image Watermarking Using Discrete Wavelet Transform and Singular
Value Decomposition,” IEEE Transactions on Instrumentation and Measurement, vol. 59, no. 11, pp.
3060–3063, Nov. 2010.
[13] D. Singh and S. K. Singh, “DWT-SVD and DCT
based robust and blind watermarking scheme for
copyright protection,” Multimed Tools Appl, vol. 76,
no. 11, pp. 13001–13024, Jun. 2017.
[14] S. Fazli and M. Moeini, “A robust image watermarking method based on DWT, DCT, and SVD using
a new technique for correction of main geometric
attacks,” Optik, vol. 127, no. 2, pp. 964–972, Jan.
[15] A. K. Singh, M. Dave, and A. Mohan, “Hybrid
Technique for Robust and Imperceptible Image Watermarking in DWT–DCT–SVD Domain,” National
Academy Science Letters, vol. 37, no. 4, pp. 351–358,
Aug. 2014.
[16] X. Zhou, H. Zhang, and C. Wang, “A Robust Image
Watermarking Technique Based on DWT, APDCBT,
and SVD,” Symmetry, vol. 10, no. 3, p. 77, Mar. 2018.
[17] D. G. Lowe, “Distinctive Image Features from ScaleInvariant Keypoints,” International Journal of Computer Vision, vol. 60, no. 2, pp. 91–110, Nov. 2004.

Most read articles by the same author(s)