2010
DOI: 10.7763/ijcee.2010.v2.109
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Wavelet-Based Watermarking Scheme Using Human Visual System for Protecting Copyrights of Digital Images

Abstract: Abstract-The modern era of information technology facilitates easy duplication, manipulation and distribution of digital data. This has demanded the certainty for effectively safe guarding the rightful ownership of digital images. Copyright protection and content authentication of digital images have emerged as an imperative concern to content owners and distributors. Digital watermarking provided a potential solution to this issue. The watermarking scheme must possess the characteristics of robustness and imp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…In non-Blind methods the original image itself are employed for the extraction of watermark, While the certain characteristics of the original image are engaged by the semi-Blind methods, whereas the detection process in the Blind methods do not necessitate the original image. A good watermarking scheme should be robust enough to define against attacks while being invisible such that the dissimilarity between the watermarked image and the host image should not be distinguishable by the human eyes [4] In this paper a simple and efficient security system is introduced to protect the ownership of digital image using non-blind imperceptibly encrypted binary image watermarking based on DWT using chaotic function to generate random sequence used to select DWT coefficient that will be used in embedding. Chaotic Logistic map function was used twice, first time for watermarking encryption and second for watermarking hiding in host image.…”
Section: College Of Computer Sciences and Mathematicsmentioning
confidence: 99%
See 1 more Smart Citation
“…In non-Blind methods the original image itself are employed for the extraction of watermark, While the certain characteristics of the original image are engaged by the semi-Blind methods, whereas the detection process in the Blind methods do not necessitate the original image. A good watermarking scheme should be robust enough to define against attacks while being invisible such that the dissimilarity between the watermarked image and the host image should not be distinguishable by the human eyes [4] In this paper a simple and efficient security system is introduced to protect the ownership of digital image using non-blind imperceptibly encrypted binary image watermarking based on DWT using chaotic function to generate random sequence used to select DWT coefficient that will be used in embedding. Chaotic Logistic map function was used twice, first time for watermarking encryption and second for watermarking hiding in host image.…”
Section: College Of Computer Sciences and Mathematicsmentioning
confidence: 99%
“…Y and Y  are original and watermarked image respectively.d. Correlation(corr): compute the correlation coefficient between the original image (A) and the watermarked image(B)[4]:…”
mentioning
confidence: 99%
“…In spatial domain technique, the watermark embedding is done by directly modifying the pixel values of the host image (Fu et al, 2008;Aggarwal and Singla, 201 1). In transform domain technique, the host image is first converted into frequency domain by a transformation method such as the Discrete Cosine Transform (DCT) or Discrete Wavelet Transform (DWT) @eddy and Varadarajan, 2010;Kundur and Hatzinakos, 2004). Then, watermark is embedded by modifying its coefficients.…”
Section: Introductionmentioning
confidence: 99%