Abstract

Digital communication and media sharing have extensively increased in the last couple of years. Research is focused on protecting digital media through copyright protection. The digital media is secured by watermarking. We have developed an image watermarking technique in the frequency domain to hide secure information in the Discrete Cosine Transform (DCT) coefficients of the carrier image. DCT coefficients are modulated by Dither Modulation (DM). We have increased the modulation step to be able to entirely recover the embedded data (watermark) and increase the robustness of our proposed algorithm to affine transforms and geometrical attacks. Our algorithm showed lower complexity and robustness against different attacks.

Highlights

  • Steganography is the art of hiding data into digital carriers

  • Even if the watermark is visible to some algorithms, it must be robust to the degree that makes it impossible for the attacker to use the digital carrier after successfully removing the watermark

  • A description of the dataset will be introduced we will explore the effect of Host to Watermark Ratio (HWR) on the quality of the image

Read more

Summary

INTRODUCTION

Steganography is the art of hiding data into digital carriers. Steganography is used mainly in secure communication. The watermark is embedded into the digital carrier to make it robust to different types of attacks. Li and Wang [4] presented watermarking approach that modifies the quantization table of JPEG compression and inserts the secure data into the middle frequency coefficients. In [5], the authors embedded the watermark by applying dual domain transforms into the carrier image. Such techniques increased capacity but are still more complex to be implemented.

THE PROPOSED WATERMARKING TECHNIQUE
The Function for Extracting the Image Features
EXPERIMENTAL RESULTS AND DISCUSSION
Dataset Description
The Effect of HWR on the Visibility of the Watermark
Robustness of the Proposed Encoding Technique Against Different Attacks
Performance Comparison of the Proposed Technique
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call