Abstract
In this paper, we propose an efficient image watermarking scheme based on combining Singular Value Decomposition (SVD) and Discrete Cosine Transform (DCT) transforms. The main idea consists of exploiting results obtained by the well-known Perona-Malik diffusion applied in image de-noising in watermarking domain by selecting significant blocks to embed a binary logo watermark. After applying the DCT on the selected blocks, the SVD is performed on each of these transformed blocks to modify a few numbers of its U matrix elements according to some defined conditions. Computer simulation and experimental results prove the efficiency of our proposed method against image processing attacks and outperform several previous schemes in terms of imperceptibility and robustness.
Highlights
In recent years, the growth of the Internet and the development of powerful computing tools boosted up the digital multimedia e-commerce, which engendered an enormous presence on the web of digital multimedia data, such as audio, image, and video files
In the light of the works presented above, we propose in this paper a blind hybrid watermarking technique using the two-dimensional Discrete Cosine Transform (DCT) (2D-DCT) and the Singular Value Decomposition (SVD) transforms
In order to evaluate the quality of the watermarked images in terms of watermark imperceptibility in our proposed method, we use the peak signal-to-noise ratio (PSNR) given in (14) [19] as: PSNR
Summary
The growth of the Internet and the development of powerful computing tools boosted up the digital multimedia e-commerce, which engendered an enormous presence on the web of digital multimedia data, such as audio, image, and video files. The novelty introduced in this paper is to exploit beneficially the well-known anisotropic diffusion technique of Perona-Malik in image watermarking. The proposed method can find its usefulness in many watermarking applications, such as: Ownership Claim, which means that a legal owner can prove his ownership by retrieving the watermark (signature) from its digital content; Copy Control and Fingerprinting where individual watermarks are embedded in each distributed copy of the content This prevents buyers of the content from making illegal copies because they will be identified; Content Authentication permits to ensure the integrity of the watermarked image, which means that it has not been altered by trying to remove the watermark.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.