Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery

View through CrossRef
Abstract In view of dual watermarking algorithm for dual two value image watermarking, the watermark information there is a gray image watermarking in the expression is obviously insufficient. The proposed embedded in the carrier image on the dual watermark includes a two watermark image and a gray image watermarking algorithm, the persuasive power while maintaining the original two values of the watermark robustness at the same time, improve the watermark information. In order to balance the robustness and invisibility of watermarking algorithm, this paper analyzes the embedding position and strategy of transform domain algorithms, the DC coefficient in the carrier image is divided into blocks of DCT spectrum and spectrum on the combination of DWT coefficient method and the advantage of embedded dual watermarking, and use the NEC characteristic of the algorithm is improved adaptive based on the embedded mode. The gray image watermark bit plane decomposition compression high four bit plane information as watermarking, in reducing the original watermark loading and enhance the overall strength of self recovery system. This paper from the working principle, classification of digital watermarking, attack types, performance index, evaluation method and uses six aspects were introduced to the digital watermarking technology. Simulation study of a digital image watermarking algorithm based on DCT transform and Arnold transform, the algorithm’s imperceptibility, robustness and security are analyzed, the algorithm for embedding process.
Title: Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Description:
Abstract In view of dual watermarking algorithm for dual two value image watermarking, the watermark information there is a gray image watermarking in the expression is obviously insufficient.
The proposed embedded in the carrier image on the dual watermark includes a two watermark image and a gray image watermarking algorithm, the persuasive power while maintaining the original two values of the watermark robustness at the same time, improve the watermark information.
In order to balance the robustness and invisibility of watermarking algorithm, this paper analyzes the embedding position and strategy of transform domain algorithms, the DC coefficient in the carrier image is divided into blocks of DCT spectrum and spectrum on the combination of DWT coefficient method and the advantage of embedded dual watermarking, and use the NEC characteristic of the algorithm is improved adaptive based on the embedded mode.
The gray image watermark bit plane decomposition compression high four bit plane information as watermarking, in reducing the original watermark loading and enhance the overall strength of self recovery system.
This paper from the working principle, classification of digital watermarking, attack types, performance index, evaluation method and uses six aspects were introduced to the digital watermarking technology.
Simulation study of a digital image watermarking algorithm based on DCT transform and Arnold transform, the algorithm’s imperceptibility, robustness and security are analyzed, the algorithm for embedding process.

Related Results

Mitigation of Geometrical Attack in Digital Image Watermarking using Different Transform Based Functions
Mitigation of Geometrical Attack in Digital Image Watermarking using Different Transform Based Functions
The illegal act of digital multimedia data loss the value of information and integrity. The loss of information and integrity born the process of piracy of digital data. The piracy...
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
The widespread utilization of mobile devices and the proliferation of video content, facilitated by communication networks, has unfortunately led to issues such as data piracy, ill...
Analisis Watermarking Menggunakan Metode Discrete Cosine Transform (DCT) dan Discrete Fourier Transform (DFT)
Analisis Watermarking Menggunakan Metode Discrete Cosine Transform (DCT) dan Discrete Fourier Transform (DFT)
Digital image watermarking is the insertion of watermarks into digital image media. Several types of watermarking methods used are Discrete Cosine Transform (DCT) and Discrete Four...
Access Denied
Access Denied
Introduction As social-distancing mandates in response to COVID-19 restricted in-person data collection methods such as participant observation and interviews, researchers turned t...
Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis
Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis
This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermark...
Is a Fitbit a Diary? Self-Tracking and Autobiography
Is a Fitbit a Diary? Self-Tracking and Autobiography
Data becomes something of a mirror in which people see themselves reflected. (Sorapure 270)In a 2014 essay for The New Yorker, the humourist David Sedaris recounts an obsession spu...
Current therapeutic strategies for erectile function recovery after radical prostatectomy – literature review and meta-analysis
Current therapeutic strategies for erectile function recovery after radical prostatectomy – literature review and meta-analysis
Radical prostatectomy is the most commonly performed treatment option for localised prostate cancer. In the last decades the surgical technique has been improved and modified in or...
Analysis of Secure Medical Image Communication with Digital Signature and Reversible Watermarking
Analysis of Secure Medical Image Communication with Digital Signature and Reversible Watermarking
<p>Protection of Medical image contents becomes the important issue in computer network security. Digital Watermarking has becomes a promising technique for medical content a...

Back to Top