Research Article | Open Access | Download PDF
Volume 5 | Number 1 | Year 2013 | Article Id. IJCTT-V5N3P126 | DOI : https://doi.org/10.14445/22312803/IJCTT-V5N3P126
An Optimization Technique for Image Watermarking Scheme
S.Veeramani , Y.Rakesh
Citation :
S.Veeramani , Y.Rakesh, "An Optimization Technique for Image Watermarking Scheme," International Journal of Computer Trends and Technology (IJCTT), vol. 5, no. 1, pp. 139-144, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V5N3P126
Abstract
In this paper, a robust watermarking scheme using optimization watermarking technique is proposed. In the proposed scheme, the watermark image is to embed in the SCS transform domain. The advantage is that they are able to detect malicious tampering while being robust against content-preserving processes such as compression, filtering and Salt and pepper noise, and we plotted graphs for average payload versus bitplanes to show the image quality for higher resolutions and studied PSNR, MSE for images.
Keywords
Digital watermarking, RC4, DWT.
References
[1] CI Podilchuk, EJ Delp, Digital watermarking: algorithms and applications. IEEE Signal Process. Mag. 18(4), 33–46 (2001)
[2] R. Singh. (2001, Jan.) Emerging technologies that will c hange the world: Digital rights management. MIT Technology Review.[Online].Available:http://www.technology review.com/InfoTech/12264/
[3] Y.-L. Chang, “Who should own access rights? a gametheoretical approach to striking the optimal balance in the debate over digital rights management,” Artificial Intelligence and Law, vol. 15, no. 4, pp. 323–357, Dec. 2007.
[4]. IJ Cox, J Kilian, FT Leighton, T Shamoon, Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process.6 (12), 1673–1687 (1997)
[5] Tarish A.H., “Designing and implementation a stream cipher cryptography system”, MSc. Thesis, Computer Science Department, University of Technology, 2000.
[6] Pommer A.,“Selective Encryption of Wavelet-compressed Visual Data”, PhD. Thesis, Department of Scientific Computing, Salzburg University, Austria, June 2003
[7]. V Solachidis, I Pitas, Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans. Image Process.10, 1741–1753 (2001)
[8]. IJ Cox, J Kilian, FT Leighton, T Shamoon, Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process.6 (12), 1673–1687 (1997)