Information Technology Journal1812-56381812-5646Asian Network for Scientific Information10.3923/itj.2010.460.466AbdulfetahAhmed A. SunXingming YangHengfu MohammadNur 3201093In this study, two image adaptive invisible digital watermarking algorithms based on DWT and DCT are proposed for copyright protection. The first proposed algorithm utilizes Watson’s visual model (JND) to determine the watermarking strength necessary to invisibly embed the watermark in the DCT block coefficients of the cover image by controlling the power of strength of JND. The second proposed technique embeds the watermark by modifying coefficients of the vertical and the horizontal detail sub-bands of wavelet sub-blocks, chosen with a secret key. The visual model is designed to generate a Just Noticeable Difference mask (JND) by analyzing image characteristics such as textures and luminance of the cover image in the DWT based domain. Since, the secret key is required for both embedding and extraction of watermark, it is not possible for an unauthorized user to extract the embedded watermark. The proposed schemes are robust to common image processing distortions like filtering, JPEG compression and noise. Experimental results show that the proposed schemes are efficient, imperceptible and the quality of watermarked image is very well and robust for various image processing distortions.]]>Mukherjee, D.P., S. Maitra and S.T. Acton,2004Wong, P.H.W., O.C. Au and Y.M. Yeung,2003Dong, P., J.G. Brankov, N.P. Galatsanos, Y. Yang and F. Davoine2005Kay, S. and E. Izquierdo,2001Joo, S., Y. Suh, J. Shin, H. Kikuchi and S.J. Cho,2002Zhang, X.D., J. Feng and K.T. Lo,2003Wang, S.H. and Y.P. Lin,2004Podilchuk, C.I. and W. Zeng,1998Wong, H.W., Y.M. Yeung and C. Au,2003Seo, H., J.S. Sohan, B.I.K. Kim, T.G. Lee, S.L.K. Lee and D.G. Kim,2008Reddy, V.P. and D.S. Varadarajan,2009Peterson, H.A., A.J. Ahumada Jr. and A.B. Watson, 1993Yang, H.F. and X.M. Sun, 2007