Abstract
Multiple image watermarking is an advanced concept of singular watermarking techniques. The existing singular digital image watermarking techniques cannot obtain all the design goals, such as imperceptibility, robustness, security, and capacity simultaneously with perfection. Hence, the multiple image watermarking technique is designed that embeds several watermarks into the same host image for conveying multiple information. This paper proposed a multiple image watermarking technique with Discrete Cosine Transform (DCT) for ensuring the low computational time for embedding, encryption, decryption as well as extraction of the watermark images. Here, DCT is used to ensure the visual quality of the host image, and a random binary matrix is used to improve the security of the digital image. We have given a basic framework for multiple image watermarking. Our experimental results show satisfactory performance.
Highlights
The duplication, modification, reproduction, and distribution of digital images with a minimum cost and instant delivery are very easy without distorting the original image because of using the Internet
This paper proposed a multiple image watermarking technique with Discrete Cosine Transform (DCT) for ensuring the low computational time for embedding, encryption, decryption as well as extraction of the watermark images
DCT is used to ensure the visual quality of the host image, and a random binary matrix is used to improve the security of the digital image
Summary
The duplication, modification, reproduction, and distribution of digital images with a minimum cost and instant delivery are very easy without distorting the original image because of using the Internet. Network technology is threatening for humans as it is developing day by day. Copyright protection, image authentication, and shelter against image manipulation play an important role in facing upcoming threats for maintaining digital image information. Digital image watermarking is an alternative tool for ensuring ownership. S. Uddin identification, authentication against tampering, and securing multimedia elements [1]. Authentication against tampering, and securing multimedia elements [1] This technology adds the watermark image to the host data. The system extracts it from the watermarked image. The invisible watermarking technology maintains the cover (or host) image beauty and quality [2]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.