Abstract

Piracy in the presence of internet and computers proves to be a biggest jolt to the concerned industry. To reduce the piracy and duplicity of the images, digital watermarking technique is having an edge over the other available techniques. In this paper, a blind digital watermarking algorithm is presented which is robust enough to resist the watermark against the attacks. The algorithm exploits the random sequence generated by Arnold and Chaos transformations. Discrete wavelet transformation of third level decomposition is used to convert the image into its frequency domain. In another transformation, the image is converted into frequency domain by using DCT and DWT combined. The binary watermark is embedded into its HL3 domain. The evaluation of the algorithm is calculated in terms of peak signal to noise ratio and non correlation. The results prove that the algorithm is robust enough to handle the attacks like JPEG, filtering, and different types of noise attacks.

Highlights

  • Days the growth of internet is so fast that it is penetrating in the remote areas

  • The algorithm watermarked a given digital image using a combination of the Discrete Wavelet Transform (DWT) and the Discrete Cosine Transform (DCT)

  • Performance evaluation results show that combining the two transforms improved the performance of the watermarking algorithms that are based solely on the DWT transform

Read more

Summary

Introduction

Days the growth of internet is so fast that it is penetrating in the remote areas. In digital watermarking, a specific code or mark is embedded permanently inside a cover multimedia file which remains within that cover invisibly or visibly even after decryption process. A specific code or mark is embedded permanently inside a cover multimedia file which remains within that cover invisibly or visibly even after decryption process.Watermark must have the following characteristics: 1) Imperceptibility. In some of the techniques, watermark is embedded by using combined DCT and DWT methods. We have implemented our watermarking algorithm using DCT and DWT combined to exploit the benefit of targeting the particular range of frequencies to embed the watermark.

Related Works
Watermarking Embedding algorithm
The steps involved in extraction algorithm are given below
Results and Discussions
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call