Abstract

Problem statement: Digital Watermarking have gained popularity in recent years as a means of protecting multimedia data from illegal copying and unlawful reproduction. It is mainly used for copyright protection of multimedia data. Approach: In this study an image watermarking algorithm which is blind (do not require the presence of host image for detection) and robust is proposed. Results: The proposed watermarking scheme embeds the watermark in the Discrete Wavelet Transform (DWT) domain. The watermark is a binary logo and is embedded in the subband of the wavelet decomposition. Conclusion: This watermarking scheme is robust to several attacks like JPEG compression, rotation, Gaussian filtering, median filtering, cropping, scaling, sharpening, Gaussian noise and salt and pepper noise.

Highlights

  • Over the past few years digital watermarking has become popular due to its significance in content authentication and legal ownership for digital multimedia data

  • The proposed algorithm is shown to be robust to various attacks, JPEG compression, rotation, scaling, cropping, median filtering, Gaussian low pass filtering, sharpening, Gaussian noise and salt and pepper noise

  • The robustness of the proposed algorithm is very good to all types of attacks as compared with other methods (Wang and Lin, 2004; Lin et al, 2008)

Read more

Summary

Introduction

Over the past few years digital watermarking has become popular due to its significance in content authentication and legal ownership for digital multimedia data. A digital watermark is a sequence of information containing the owner’s copyright for the multimedia data. It is inserted invisibly in host image so that it can be extracted at later times for the evidence of rightful ownership. An ideal ownership-identifying watermarking should include Imperceptibility, Robustness and Unambiguity. Imperceptible: The image must not be visibly degraded by the presence of the watermark. Robustness: The watermark must be robust to attack and must be tolerant to reasonable lossy compression. Standard image processing operations such as low pass filtering, cropping, translation and rescaling should not remove the mark

Methods
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call