Abstract

A Blind Adaptive Color Image Watermarking Scheme Based on Principal Component Analysis, Singular Value Decomposition and Human Visual System

Highlights

  • The enormous usage and afford-ability of Internet across the world, has made it easy to access online literature in the form of pictures, audios, videos, books, etc

  • In proposed scheme 1, human visual system is used to find the areas of image which are more prone to alterations, and areas which are less prone to disturbances

  • The performance of proposed schemes is evaluated in terms of imperceptibility, robustness, security and capacity, which are discussed in following sections

Read more

Summary

Introduction

The enormous usage and afford-ability of Internet across the world, has made it easy to access online literature in the form of pictures, audios, videos, books, etc. The data available online can be downloaded, and can be redistributed its copies multiple times, without any distinguishable difference between original and copied material This illegal distribution and copyright violation results in the form of millions of dollars loss [1]. One additional challenge of color image watermarking is that the three channels R, G, and B are highly correlated [3], [8], modification of one channel affects other channels severally and as a result the quality of whole image is compromised This adverse effect can be avoided if Principal Component Analysis (PCA) [9] is used. Embedding more information in areas which are more prone to noise and less data into regions which are more susceptible to alterations In this way both imperceptibility and robustness can be achieved simultaneously. The proposed scheme is discussed in detail

Proposed Scheme
Human Visual System
Fuzzy Inference System
Proposed Scheme 1
Let a covariance matrix C be computed as
Let matrix Prn is formed from row vector Pr of matrix P as shown below pr11
Let each block is decomposed using SVD as follows
The principal components of covariance matrix Care calculated as
Proposed Scheme 2
Experimental Results
Imperceptibility
Robustness
Security
Capacity
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call