Abstract

Watermarking is used mostly for multimedia data copyright protection. This paper introduces the Transformation Framelet (FLT) for watermarking digital images. In this technique, the FLT is used to create an original image and watermark the low (LL) frequency subband of an original image in LL subband of an image watermarking. Simulation results demonstrate, in terms of a wide range of traditional attaches, that this approach is imperceptible and stable. MATLAB software version 2014 was used for simulation. Experiments on gray scale and colored images were performed in this work.

Highlights

  • The new fields of computer science, encryption, signal processing and communication are digital watermarking technology [1]

  • In addition to data coding and scrambling to secure information, digital watermarking is developed by its creators as a solution to the requirement of providing added value protection

  • This paper proposes a system based on FLT watermarking which functions in the domain of transformation

Read more

Summary

Introduction

The new fields of computer science, encryption, signal processing and communication are digital watermarking technology [1]. The methods of transforming the domain are common as the embedding of watermarks is more robust than spatial domain. Many researchers implemented hybrid method, the DCT-SVD watermarking mechanism, capable of enhancing the robustness and invisibility of watermarked images [11,12,13]. This hybrid mechanism has been developed by several researchers. This paper proposes a system based on FLT watermarking which functions in the domain of transformation. The additional wavelet at this point creates this structure an overcomplete one It follows that ɸ(t) , Ψ1(t) and Ψ2(t) satisfies a dilation and wavelet equations [16, 17,18]. This means that the input and output of the two filters are expected to be the same [20,21]

Filter bank structure for 2D framelet
Computational of FLT For 2-D signal using separable method
Computation of IFLT for 2-D signal via separable and non- separable methods
Results and Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.