ISSN ONLINE(2278-8875) PRINT (2320-3765)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Performance Evaluation of Watermarking Technique using Full, Column and Row DCT Wavelet Transform

Dr. H. B. Kekre1, Dr.Tanuja Sarode2, Shachi Natu3
  1. Senior Professor, Department of Computer Engineering, MPSTME, NMIMS University, Mumbai, India
  2. Associate Professor, Department of Computer Engineering, TSEC, Mumbai, India
  3. Ph. D. Research Scholar, MPSTME, & Assistant Professor, Department of Information Technology, TSEC, Mumbai, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering

Abstract

A watermarking technique using full, column and row DCT wavelet is proposed in this paper. Perceptual imperceptibility of watermarked images is improved by embedding compressed watermark. Further, this compressed watermark is normalized and scaled by suitable scaling factor to improve the robustness of proposed scheme. Performances of full, column and row DCT wavelets are compared against various attacks. In all, it has been noticed that column and row transform significantly reduces computational cost of the technique. Also, for attacks like JPEG compression, compression using various transforms, binary and Gaussian distributed run length noise attack, resizing attack where full DCT wavelet fails to give robustness, column and row DCT wavelet transforms show strong robustness at less computational cost.

Keywords

Watermarking, DCT wavelet, column transform, row transform, binary distribution, Gaussian distribution, run lengthnoise

INTRODUCTION

Internet and high speed computer networks have explored new ways of transmitting and receiving digital data for various purposes and in different forms. It has also led to ease of alteration and duplication of digital contents sent over the network. To protect digital contents from such duplications and manipulations has created opportunities for research in the domain of digital data security or protection. Digital watermarking is one of such popular technique of copyright protection. It hides certain details of owner of digital data in the data itself. These details can be hidden in the form of digital image, audio signals, video signals or text which determines the nature of digital watermarking. If the secret information is hidden in the form of digital image into another image, it is termed as digital image watermarking. Digital image watermarking can be performed in two domains, spatial domain and frequency domain. When directly pixel values of image are altered in order to hide the secret information, it is spatial domain watermarking. When image is converted into frequency components and these frequency components are used to hide the secret information, it is frequency domain watermarking. Though spatial domain watermarking is easy to perform, it is more vulnerable to malicious attacks and hence less robust than frequency domain watermarking. In contrast, frequency domain watermarking is more robust at the cost of its computational complexity. Computational cost is definitely acceptable instead of sacrificing the robustness or security of watermarking. In recent years, lot of work has been carried out in frequency domain watermarking using transforms like DCT, DWT, DFT and SVD and it is still going on. A good watermarking technique is expected to have following characteristics
 Robustness- robustness refers to the ability of recovering embedded watermark even after performing intentional or non-intentional processing of watermarked image.
 Imperceptibility- imperceptibility refers to the perceptual similarity between host image and watermarked image
 Security- security refers to protection of embedded watermark against various attacks which try to eliminate the watermark.
 Capacity- capacity refers to the amount of information embedded in the host image as a watermark for protection of copyright of an image
Though they are desirable characteristics, they are contradictory sometimes. Achieving robustness may lead to compromising imperceptibility. Whereas, increasing capacity may lead to less robustness in watermarking. While using Discrete Wavelet Transform, selection of appropriate frequency band plays an important role as it affects robustness and imperceptibility. Low frequency bands are normally major information contents of an image. Any modification to low frequency components therefore causes degradation into host image which is easily perceptible to Human Visual System. However, in literature there are many methods of watermarking have been proposed which embed watermark in lower frequency components without losing imperceptibility of watermarked image. High frequency components in an image carry minimal information contents but they are responsible for edges in image. Since they carry minimum information about an image, alteration of these components due to embedding watermark is not easily sensed by human visual system. But it leads to high susceptibilityto attacks like lossy image compression which eliminates high frequency components from image. However it may prove more robust to other image processing attacks. To eliminate drawbacks of altering low frequency and high frequency components and to achieve benefits in terms of imperceptibility, selection of mid-frequency components is getting more attention in watermark embedding.
In this paper, a blind watermarking for digital images is proposed using DCT wavelet transform. DCT wavelet transform matrix of desired size NxN can be generated from DCT matrices of sizes PxP and QxQ where P and Q are factors of N and N is power of 2 using Kekre‟s algorithm for generating wavelet transform from orthogonal transform proposed in [1]. Simulation work is conducted by applying DCT wavelet for embedding and extracting watermark in three different ways: full DCT wavelet transform, Column DCT wavelet transform and Row DCT wavelet transform. Embedding is performed in mid frequency components. Instead of embedding all frequency coefficients of watermark, high frequency coefficients are eliminated from watermark. Embedding of such compressed watermark causes less visual degradation in watermarked image. Performance of three approaches is compared against various attacks like cropping, compression, resizing and noise attacks.
Remaining paper is organized as follows: section II briefly covers related work done so far in digital image watermarking. Section III gives short description about DCT wavelet transform, row and column transform. Section IV describes the proposed method of watermarking. Section V gives the analysis of results obtained using full, column and row DCT wavelet transforms. Section VI gives conclusion of the simulation work conducted.

RELATED WORK

SangeetaJadhav in [2] has introduced a watermarking system for color images using Blind Source Separation. The system is implemented in hybrid domain: for host it is in wavelet domain and for watermark it is in spatial domain. Texture analysis of host image is carried out based on its energy contents which make it image adaptive. Textured region block is selected based on its energy and its wavelet transform is obtained. LL1 band is used for further processing if it is single level wavelet decomposition. For higher level decomposition, corresponding LL frequency bands are selected. Spatial domain watermark is hidden in textured region by obtaining mixing matrix through Quasi- Newton algorithm(add reference). Performance of the system is evaluated for various color spaces like YIQ, HSI andYCbCr.Better results are obtained for Y channel in YIQ space. An efficient digital image watermarking algorithm was presented by HumingGao, LiyuanJia, Meiling Liu in [3]. Color image is first separated into color channels R G and B. These color components are then subjected to two level wavelet decomposition. Embedding positions for watermark are determined by comparing energy values in low frequency sub-bands in green and blue channels. Watermark is encrypted using Arnold transform and then is embedded into appropriate positions obtained. Pooja Malhotra, MeenakshiMoza, JyotiVerma proposed a DWT-SVD based watermarking scheme in [4]. Host image is divided into four frequency bands using wavelet transform. Singular values of HL and HH sub-band are obtained. Watermark is divided into two halves. Each of them is embedded into HL and HH bands by modifying their singular values by appropriate scaling factor. Image normalization based robust watermarking technique is proposed by Ibrahim Alsonosi Nasir, Ahmed b. Abdurrman in [5,]. Watermark is embedded in Luminance component i.e. Y channel or blue channel if RGB color space is used. Circular image is obtained from blue channel and then it is rotation normalized. A square sub image is obtained from rotation normalized image and decomposed till L levels using DWT. Watermark is embedded in highest level of wavelet decomposition excluding the coarsest LL sub band. Image normalization technique reduces the effect ofsynchronization errors caused by geometric attacks such asrotation.A. Umaamaheshvari and K. Thanushkodi in [6] proposed a watermarking method which is mix of feature based and transform based method. Harris Laplacian detector is used to extract primary features from cover image which are suitable for watermark embedding. To enhance the resistance, set of auxiliary features are used to embed watermark. These auxiliary features are obtained using Knapsack algorithm. DCT is used to extract embedded watermark.An easy way to comply with the conference paper formatting requirements is to use this document as a template and simply type your text into it.
K.Chaitanya, E. Sreenivasa Reddy, K.Gangadhara Rao proposed DWT- DCT based method for watermarking of color images in [7]. Host and watermark images are separated into R, G and B channels. Two-level DWT is applied to blue channel of host. HL2 sub-band obtained through this decomposition is divided into 8x8 blocks. DCT is taken of each block. DCT is applied to each channel of watermark. One pixel from every channel of watermark is embedded into each block of HL2. Reverse procedure is followed to extract the watermark. In [8], Shahin Shaikh, ManjushaDeshmukh proposed a DCT based digital image watermarking technique for grayscale images. Both host and watermark image are divided into 8x8 blocks. DCT of each block is computed. For each block of host, texture, edge, luminance and corner information is computed. DCT of each block of watermark image is computed. All DCT coefficients of host image blocks are replaced by using DCT coefficients of watermark and JND mask.YashovardhanKelkar, Heena Shaikh, Mohd.Imran Khan proposed a DWT-DCT-SVD based hybrid digital image watermarking technique for color images in [9]. In their proposed technique, host image is decomposed into LL, LH, HL and HH frequency bands. DCT is applied to the frequency band selected for watermark embedding. Singular value decomposition of DCT transformed sub-band is obtained. Similar procedure is followed for watermark image. Singular values of host are then replaced by singular values of watermark. Four sub-bands can be used to embed same watermark or four different watermarks.In[10], Gursharanjeet Singh Kalra, Rajneesh Talwar, Harsh Sadawarti proposed DWT and DCT based watermarking technique. In their proposed technique, original image is decomposed up to third level of wavelet decomposition. HL3 band is selected for embedding watermark. HL3 band is further decomposed into 8x8 blocks and DCT of these blocks is computed. Watermark which is chosen to be a binary image is subjected to Arnold transformation followed by chaos transformation. Each bit of watermark is embedded into DCT coefficients of original image by using standard deviation of original image and depth of watermark. The technique is found to be robust enough to handle the attacks like JPEG, filtering, and different types of noise attacks.RoshanJahan has introduced a watermarking scheme using DWT-SVD and chaotic encryption based on optimized genetic algorithm in [11]. First host image is decomposed into LL, LH, HL and HH frequency bands using DWT. Singular values of LH and HL band are obtained. These singular values are replaced by scaled singular values of watermark. Before embedding, Watermark is encrypted using chaotic encryption and genetic algorithm which adds to the security and robustness of their proposed scheme. In [12] Ambika Agarwal, Neha bora and Nitin Arora proposed a DWT-SVD based algorithm for watermarking. Here host image is decomposed into two levels of wavelet decomposition. However, instead of LL band, HL band is used for next level decomposition. Singular values of second level decomposed HL band are replaced with scaled watermark image.
Mohd Rizal Mohd Isa and Salem Aljareh proposed a DCT based watermarking scheme in [13] to protect the biometric images especially for face recognition. Addition of watermarking scheme does not highly affect the recognition rate and better recognition rate is observed by authors under various attacks on biometric images.Jagdish C. Patra, Jiliang E. Phua and DeepuRajan in [14] presented a novel Chinese Remainder Theorem (CRT) based watermarking scheme that works in the Discrete Cosine Transform (DCT) domain. Host image is divided into 8x8 blocks and DCT is applied to them. To embed watermark bits appropriate co-prime values are selected in CRT algorithm.DongyangTeng, Renghui Shi, Xiaoqun Zhao proposed the DCT image watermarking technique based on the mix of time-domain in [15]. Host image is divided into blocks and mixed with orthogonal matrices in time domain. A host image mixed in the time domain is subjected to DCT and watermark is embedded in frequency domain. Combination of pre-transformation in time-domain with DCT, disperse the noise and make the recovered watermarking image clearer. B.L. Gunjal and R.R.Manthalkar in [16] presented strongly robust digital image watermarking scheme based on „Discrete Wavelet Transform, by embedding scrambled watermark in middle frequency sub band. The security levels are increased by generating PN sequence depending on periodicity of watermark image. The image scrambling is applied by Arnold Transform. The decomposition is done with Haar which is simple, symmetric and orthogonal wavelet and the direct weighting factor is used in watermark embedding and extraction process.Gerardo Pineda Betancourth in [17] presented a fragile watermarking scheme for image authentication. It has the ability to localize the tampered regions. In their proposed scheme, only few number of wavelet coefficients are watermarked but all are implicitly protected. This reduces embedding distortion. Other key features of this method are that it is key dependent, content based and nondeterministic neighborhood-dependent method. Hence it can resist attacks like transplantation attacks and vector quantization attacks.
In [18], Ezz El-Din Hemdan, Nawal El-Fishaw, GamalAttiya, and FathiAbd El-Samii proposed hybrid watermarking technique which is based on DWT and SVD. Before embedding, two watermarks primary and secondary are fused using wavelet fusion algorithm. This fused watermark is embedded into singular values of one level wavelet decomposed cover image using appropriate scaling factor. This technique improved both the capacity of the embedded information and robustness without affecting the perceptual quality of the original image. In [19], Nagaraj V. Dharwadkar, B. B. Amberker&AvijeetGorai proposed a non-blind watermarking scheme for color images. In their proposed scheme, watermark is embedded in blue channel of cover image. Blue channel of cover image is subjected to wavelet decomposition and then singular values of each sub band are obtained. Singular values of watermark are embedded in these singular values of blue channel. Embedding watermark in all four sub bands makes it very difficult to remove. M.A. Dorairangaswamy proposed a blind watermarking scheme in [20]. Their research work presents a robust and blind watermarking scheme for copyright protection against piracy of digital images. It makes use of a binary image as watermark data for protecting the copyrights of the digital image. Here, for every pixel of the host image, a binary watermark image pixel is embedded on the basis of the gain factor and the generated random matrix. The embedded binary watermark is extracted from the watermarked image using watermark image size and the correlation coefficient. K.C. Liu, C.H. Chou proposed a robust and transparent watermarking scheme for color images in [21]. Watermark is embedded in perceptually significant sub bands of luminance and chrominance components of color image in wavelet domain. The higher perceptual redundancy in each color component of the color image indicates that the great strength of the watermark can be embedded into the color image for higher robustness without resulting in visible distortion. Robust watermarking scheme is proposed by Yasunori Ishikawa, KazutakeUehira and Kazuhisa Yanaka in [22]. In their proposed technique of optical watermarking in which size of pixel blocks is varied by a trade-off in the efficiency of embedded watermarking. 4x4, 8x8, and 16x16 pixels were used in one block to embed one bit of watermark. A detection accuracy of 100% was obtained by using a block with 16x16 pixels. H. B. Kekre, TanujaSarode, ShachiNatu presented a DWT-DCT-SVD based hybrid watermarking method for color images in [23]. In their method, robustness is achieved by applying DCT to specific wavelet sub-bands and then factorizing each quadrant of frequency sub-band using singular value decomposition. Watermark is embedded in host image by modifying singular values of host image. Performance of this technique is then compared by replacing DCT by Walsh in above combination. Walsh results in computationally faster method and acceptable performance. Imperceptibility of method is tested by embedding watermark in HL2, HH2 and HH1 frequency sub-bands. Embedding watermark in HH1 proves to be more robust and imperceptible than using HL2 and HH2 sub-bands. In [24] and [25] Kekre, Sarode, and Natu presented DCT wavelet and Walsh wavelet based watermarking techniques. In [24], DCT wavelet transform of size 256*256 is generated using existing well known orthogonal transform DCT of dimension 128*128 and 2*2. This DCT Wavelet transform is used in combination with the orthogonal transform DCT and SVD to increase the robustness of watermarking. HL2 sub-band is selected for watermark embedding. Performance of this proposed watermarking scheme is evaluated against various image processing attacks like contrast stretching, image cropping, resizing, histogram equalization and Gaussian noise. DCT wavelet transform performs better than thier previously proposed DWT-DCT-SVD based watermarking scheme in [23] where Haar functions are used as basis functions for wavelet transform. In [25] Walsh wavelet transform is used that is derived from orthogonal Walsh transform matrices of different sizes. 256*256 Walsh wavelet is generated using 128*128 and 2*2 Walsh transform matrix and then using 64*64 and 4*4Walsh matrix which depicts the resolution of host image taken into consideration. It is supported by DCT and SVD to increase the robustness. Walsh wavelet based technique is then compared with DCT wavelet based method given in [24]. Performance of three techniques is compared against various attacks and they are found to be almost equivalent. However, computationally Walsh wavelet was found preferable over DCT wavelet. Also Walsh wavelet obtained by64*64 and 4*4 is preferable over DCT wavelet and Walsh wavelet obtained from corresponding orthogonal transformmatrix of size 128*128 and 2*2. In [26], other wavelet transforms like Hartley wavelet, Slant wavelet, Real Fourier wavelet and Kekre wavelet were explored by H. B. Kekre, TanujaSarode and ShachiNatu. Performance of Slant wavelet and Real Fourier wavelet were proved better for histogram Equalization and Resizing attack than DCT wavelet based watermarking [24] and Walsh wavelet based watermarking presented in [25].

DCT WAVELET TRANSFORM, COLUMN TRANSFORM AND ROW TRANSFORM

DCT wavelet transform matrix is generated from orthogonal DCT transform using algorithm proposed in [1]. In the proposed method, host images of size 256x256 and watermark of size 128x128 have been used. Hence we require DCT wavelet matrix of size 256x256 and 128x128. These matrices can be generated using various combinations of component orthogonal DCT matrix. In the presented work, 256x256 size DCT wavelet matrix is generated using two 16x16 DCT matrices and 128x128 size DCT wavelet matrix is generated using 16x16 and 8x8 size DCT matrices. For an image f, transform of image is given by
image

PROPOSED TECHNIQUE

Proposed technique is experimented on ten host images using five watermarks in Matlab R2012. Host images and watermark images used in experimental work are shown in Figure 1 and Figure 2.
image
Figure 1: Host images used for experimental work
image
Figure 2: Watermarks used for experimental work
Proposed technique is divided into two phases namely watermark embedding and watermark extraction. In watermark embedding phase, host image is separated into R, G and B channel and column DCT wavelet of each channel is taken. This results into energy compaction of image towards upper rows. Column DCT wavelet of each channel of watermark is also obtained. Watermark is compressed with compression ratio 2.67 and is embedded in mid frequency components of host image. Before embedding watermark coefficients are normalized and the normalization coefficient is saved. Then it is scaled by appropriate factor such that it will strengthen the watermark and also embedment of watermark will be visually imperceptible. In the proposed technique, this scaling factor selected is 25. Compression ratio for watermark is selected by trial and error method to give good visual quality of watermark to be embedded without significant loss of information from it. Scaling factor is also chosen by trial and error method so that embedding will result into good imperceptibility of embedded watermark into host image. Figure 3 andFigure 4 below show the embedding and extraction procedures respectively. These steps are repeated for row transform and full DCT wavelet transform for comparison.
image
Figure 4: Watermark extraction procedure

RESULTS AND DISCUSSION

image
Figure 5: Original host and watermark images, compressed watermark and watermarked images and extracted watermarks using Full, column and row DCT wavelet
Various types of attacks performed on watermarked images are cropping, compression, resizing and noise attack.
A. Cropping
Watermarked images are subjected to three types of cropping attacks- cropping squares of 16x16 size at four corners, cropping squares of 32x32 size at four corners and cropping 32x32 square at the centre of an image. Result images for these attacks are shown in following figure 6.
image
Figure 6: Result images for 16x16, 32x32 cropping at corners and 32x32 cropping at centre using Full DCT wavelet, column DCT wavelet and Row DCT wavelet
MAE values between embedded and extracted watermarks for cropping 16x16 attack using Full, Column and Row transform are compared in the following Figure 7.
image
Figure 7: comparison of MAE values between embedded and extracted watermark for cropping 16x16 square at corners using Full, Column andRow DCT wavelet
From Figure 7 it can be easily observed that, for full transform, MAE values between embedded and extracted watermarks are nearly four times higher than in case of column and row transform. For row transform these values are slightly higher than column transform for all host images. So for 16x16 cropping done at corners of an image, Column DCT wavelet transform gives best performance. However, for 32x32 cropping done at the corners of an image, row transform gives best robustness among the three as shown in Figure 8. Figure 8 indicates that MAE values between embedded and extracted watermarks for full transform are 1.22 times higher than column transform values and 1.5 times higher than row transform values. Also MAE values obtained from column transform are 1.22 times higher than in case of row transform.
image
Figure 8: comparison of MAE values between embedded and extracted watermark for cropping 32x32 square at corners using Full, Column and Row DCT wavelet
Performance comparison for robustness against cropping 32x32 square at the centre of an image using full, column and row transform are shown in following Figure 9. Row transform proves the most robust approach for this type of cropping attack also. Another important thing that can be observed from Figure 7, Figure 8 and Figure 9 is that for cropping done at the centre of an image, least MAE is observed between embedded and extracted watermark for all three types of applying DCT wavelet transform.
image
Figure 9: Comparison of MAE values between embedded and extracted watermark for cropping 32x32 square at centre using Full, Column and Row DCT wavelet
B. Compression
Watermarked images are compressed using DCT wavelet transform for compression ratio 1.95 and using DCT, DST and Walsh for compression ratio 1.14.
image
Figure 10: Result images for compression using DCT wavelet, DCT, DST and Walsh using Full DCT wavelet, column DCT wavelet and Row DCT wavelet.
From above Figure 10, it can be observed that when the transform used for watermark embedding and compression is same, the proposed technique is more robust. Robustness level gets degraded when any other transform is used for compression. For JPEG compression, full DCT wavelet transform does not withstand but column and row DCT wavelet show better robustness.
Following Figures Figure 11 to Figure 14 show performance of full, column and row DCT wavelet transform against compression using DCT wavelet, DCT, DST and Walsh. Column and row transform are found to be more robust than full transform in all the cases. For DCT wavelet, row DCT wavelet transform shows slightly less robustness than column DCT wavelet transform. MAE values obtained by column transform are 15 times less and obtained by row transform are 13.5 times less than that of full transform.
image
Figure 11: Comparison of Full, Column and Row DCT wavelet for compression attack using DCT wavelet
image
Figure 12: Comparison of Full, Column andRow DCT wavelet for compression attack using DCT
image Figure 13: Comparison of Full, Column and Row DCT wavelet for compression attack using DST
image
Figure 14: Comparison of Full, Column and Row DCT wavelet for compression attack using Walsh
From Figure 12, 13 and 14, it can be seen that on an average column DCT wavelet gives more robustness than row DCT wavelet when watermarked images are compressed by using DCT, DST and Walsh
C. Resizing
Watermarked images are resized using bicubic interpolation. First its size is increased by four times and then reduced back to its original size. Another way of performing resizing attack is watermarked image size is doubled and then reduced back to original size. Result images for resizing attack are shown in Figure 15.
image
Figure 15: Result images for resizing attack using bicubic interpolation using Full DCT wavelet, column DCT wavelet and Row DCT wavelet.
Figure 16 and Figure 17 show performance comparison of full, column and row DCT wavelet for original-four times-original resizing and original-double-original resizing attack respectively in terms of MAE between embedded and extracted watermark. Full transform gives much higher values of MAE than column and row transform. Among column and row transform, column transform shows better robustness i.e. less MAE values.
image
Figure 16: Comparison of Full, Column and Row DCT wavelet for resizing attack
image
Figure 17: Comparison of Full, Column and RowDCT wavelet for resizing attack
D. Noise attack
Binary distributed run length noise is generated having magnitude -1 or 1 and random run length between 1 to 10, 5 to 50 (in multiples of 5) and 10 to 100 (in multiples of 10). This noise is added to watermarked image. Gaussian distributed run length noise is generated with magnitude ranging between -2 to 2 and random run. Results are shown in following Figure 18.
image
Figure 18: Result images for binary distributed run length noise with run 1 to 10, 5 to 50 in multiple of 5 and 10 to 100 in multiple of 10 and Gaussian distributed run length noise attack using Full DCT wavelet, column DCT wavelet and Row DCT wavelet.
Figure 18 above indicates that for binary distributed run length noise, as length of run is increased, extracted watermark is closer to embedded one in case of row DCT wavelet transform. However, for full and column DCT wavelet transforms, there is no change in MAE values. Figure 19 below shows the performance comparison of full, column and row DCT wavelet transform for Gaussian distributed run length noise attack.
image
Figure 19: Performance comparison for Gaussian distributed run length noise attack using Full DCT wavelet, column DCT wavelet and Row DCT wavelet.
From Figure 19 it can be concluded that, column transform when used for embedding and extracting watermark, performs best under Gaussian distributed run length noise attack. It gives MAE values nearly 10 times less than full transform and 13 times less than row transform. Row DCT wavelet fails to provide better robustness than full DCT wavelet.

CONCLUSION

Column DCT wavelet transform and Row DCT wavelet transform are computationally efficient than full DCT wavelet transform. While embedding watermark in host image, on an average, column DCT wavelet causes less perceptual quality degradation than full and row transform. However, in all three cases, extracted watermark is very close to the embedded one with MAE value close to zero. For majority of attacks tested in the proposed work, column and row DCT wavelet transforms give significantly better robustness than Full DCT wavelet transform.
For 32x32 cropping attack, row transform gives best performance. For 16x16 cropping attack, row transform shows slightly higher MAE values for extracted watermark.
For Gaussian distributed run length noise attack, column DCT wavelet is observed to give outstanding robustness. Also for resizing attack, column transform performs better than full and row transform.
Full DCT wavelet transform cannot sustain binary distributed run length noise attack and JPEG compression attack. Whereas, for binary distributed run length noise attack, column DCT wavelet constantly outperforms irrespective of the run length of noise. For row DCT wavelet transform, change in run length of binary distributed noise affects the robustness. As length of run is increased, row DCT wavelet improves in robustness.
For compression attack using DCT wavelet, DCT, DST and Walsh, Column and row transform are found to be more robust than full transform in all the cases. MAE values obtained by column transform are 15 times less and obtained by row transform are 13.5 times less than that of full transform in compression using DCT wavelet.
For resizing attack, column DCT wavelet is more robust than row DCT wavelet transform. Full DCT wavelet transform does not give sustainable performance against resizing attack.
In all different attacks, it is observed that column and row transforms give far better performance as compare to full DCT wavelet transform. Among row and column DCT wavelet transform, column DCT wavelet transform is better.

References