An Optimization Technique for Image Watermarking Scheme

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - November Issue 2013 by IJCTT Journal
Volume-5 Issue-3                           
Year of Publication : 2013
Authors :S.Veeramani , Y.Rakesh

MLA

S.Veeramani , Y.Rakesh"An Optimization Technique for Image Watermarking Scheme"International Journal of Computer Trends and Technology (IJCTT),V5(3):139-144 November Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:- In this paper, a robust watermarking scheme using optimization watermarking technique is proposed. In the proposed scheme, the watermark image is to embed in the SCS transform domain. The advantage is that they are able to detect malicious tampering while being robust against content-preserving processes such as compression, filtering and Salt and pepper noise, and we plotted graphs for average payload versus bitplanes to show the image quality for higher resolutions and studied PSNR, MSE for images.

 

References -

[1]. CI Podilchuk, EJ Delp, Digital watermarking: algorithms and applications. IEEE Signal Process. Mag. 18(4), 33–46 (2001)
[2] R. Singh. (2001, Jan.) Emerging technologies that will c hange the world: Digital rights management. MIT Technology Review.[Online].Available:http://www.technology review.com/InfoTech/12264/
[3] Y.-L. Chang, “Who should own access rights? a game-theoretical approach to striking the optimal balance in the debate over digital rights management,” Artificial Intelligence and Law, vol. 15, no. 4, pp. 323–357, Dec. 2007.
[4]. IJ Cox, J Kilian, FT Leighton, T Shamoon, Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process.6 (12), 1673–1687 (1997)
[5] Tarish A.H., “Designing and implementation a stream cipher cryptography system”, MSc. Thesis, Computer Science Department, University of Technology, 2000.
[6] Pommer A.,“Selective Encryption of Wavelet-compressed Visual Data”, PhD. Thesis, Department of Scientific Computing, Salzburg University, Austria, June 2003
[7]. V Solachidis, I Pitas, Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans. Image Process.10, 1741–1753 (2001)
[8]. IJ Cox, J Kilian, FT Leighton, T Shamoon, Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process.6 (12), 1673–1687 (1997)

Keywords :— Digital watermarking, RC4, DWT