Abstract

Multiple image watermarking is an advanced concept of singular watermarking techniques. The existing singular digital image watermarking techniques cannot obtain all the design goals, such as imperceptibility, robustness, security, and capacity simultaneously with perfection. Hence, the multiple image watermarking technique is designed that embeds several watermarks into the same host image for conveying multiple information. This paper proposed a multiple image watermarking technique with Discrete Cosine Transform (DCT) for ensuring the low computational time for embedding, encryption, decryption as well as extraction of the watermark images. Here, DCT is used to ensure the visual quality of the host image, and a random binary matrix is used to improve the security of the digital image. We have given a basic framework for multiple image watermarking. Our experimental results show satisfactory performance.

Highlights

  • The duplication, modification, reproduction, and distribution of digital images with a minimum cost and instant delivery are very easy without distorting the original image because of using the Internet

  • This paper proposed a multiple image watermarking technique with Discrete Cosine Transform (DCT) for ensuring the low computational time for embedding, encryption, decryption as well as extraction of the watermark images

  • DCT is used to ensure the visual quality of the host image, and a random binary matrix is used to improve the security of the digital image

Read more

Summary

Introduction

The duplication, modification, reproduction, and distribution of digital images with a minimum cost and instant delivery are very easy without distorting the original image because of using the Internet. Network technology is threatening for humans as it is developing day by day. Copyright protection, image authentication, and shelter against image manipulation play an important role in facing upcoming threats for maintaining digital image information. Digital image watermarking is an alternative tool for ensuring ownership. S. Uddin identification, authentication against tampering, and securing multimedia elements [1]. Authentication against tampering, and securing multimedia elements [1] This technology adds the watermark image to the host data. The system extracts it from the watermarked image. The invisible watermarking technology maintains the cover (or host) image beauty and quality [2]

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call