The development of effective digital image copyright protection methods have recently become an urgent and necessary requirement in the multimedia industry due to the ever-increasing unauthorized manipulation and reproduction of original digital objects. The new technology of digital watermarking has been advocated by many specialists as the best method to such multimedia copyright protection probe. It's expected that digital watermarking will have a wide-span of practical applications such as digital cameras, medical imaging, image databases, and video-on-demand systems, among many others.One of the most important topics in digital watermarking community is robust watermarking, which aims at achieving robustness, imperceptibility and high capacity simultaneously. These three objectives, however, are Contradictory to each other, and thus a good design is required to achieve an appropriate tradeoff between them. Digital watermarking systems are closely related to the problem of communication with side information at the encoder. The data hiding techniques are Cryptography, Steganography, and watermark. The modern field of cryptography can be divided into several areas of study. Symmetric-key CryptographySymmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key or less. Commonly in which their keys are different, but related in an easily computable way. This was the only kind of encryption publicly known until June 1976. Symmetric key ciphers are implemented as either A block cipher or stream cipher. A block cipher enciphers input in blocks of plain text as opposed to individual characters, the input form used by a stream cipher. Public-key CryptographySymmetric-key cryptosystems use the same key for encryption and decryption of a message, though a message or group of messages may have a different key than others. The very significant disadvantage of symmetric ciphers is the key management necessity to use them securely. Each distinct pair of communicating parties must ideally share a different key, and perhaps each cipher text exchanged as well. The number of keys required increases, as the square of the number of network members, very quickly requires complex key management schemes to keep them all straight and secret. The difficulty of securely establishing a secret key between two communicating parties, when a secure ABSTRACTThe proliferation of digitized media due to the rapid growth of networked multimedia systems has created an urgent need for copyright enforcement technologies that can protect copyright. In this paper implementation of three different watermarking algorithms in the frequency domain is presented. The first algorithm is based on the Discrete Cosine Transform (DCT), the second one is based on the Discrete Wavelet Transform (DWT) and the third algorithm is based on the Discrete Tchebichef Transform (DTT).Embedding the watermark is done by modifying the coefficients of the middle frequency band so that the visibility of the image and diagnos...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.