Please use this identifier to cite or link to this item:
http://localhost:8081/xmlui/handle/123456789/15398
Title: | IMPLEMENTATION OF TRANSFORM BASED TECHNIQUES IN DIGITAL IMAGE WATERMARKING |
Authors: | Rathi, Tarun |
Keywords: | Digital Image;Watermarkin;Watermarked Image;Discrete Cosine Transform |
Issue Date: | Jun-2013 |
Publisher: | I I T ROORKEE |
Abstract: | Digital image watermarking is used to resolve the problem of data security and copyright protection. In many applications of digital watermarking, watermarked image of good quality is required. But there is tradeoff between number of embedded watermark images and quality of watermarked image. This aspect is quite important in case of multiple digital image watermarking. In this case multiple images singular value decomposition based watermarking algorithm performs much better than other transform based methods. This dissertation presents a robust multiple digital images watermarking using singular value decomposition (SVD) method. The results are compared with Discrete Cosine Transform (DCI) based multiple images watermarking method. In case of SVD image watermarking method only singular values are being varied either in single or multiple image watermarking. This helps in preserving the quality of watermarked image. To get more robust watermark against geometrical attack and JPEG compression is main issue in most of the watermarking algorithms. Due to the property of SVD. the SVDbased digital image watermarking has replaced DCT and DWT based watermarking. But here combining the property of DCT and SVD, a hybrid algorithm is introduced which gives much better results. DCT of the whole cover image is taken then segmented in to blocks for singular value decomposition. Watermark image is scrambled using Arnold transform and then it is embedded in singular values. This not only improves the robustness but also security of the watermark. To evaluate the algorithm, this hybrid DCT-SVD based watermarking is compared with the pure SVD based algorithm on the basis of PSNR and robustness. Experimental evaluation shows that this algorithm is able to resist a variety of attacks including JPEG compression, different signal processing attacks and geometric attacks. |
URI: | http://localhost:8081/xmlui/handle/123456789/15398 |
Research Supervisor/ Guide: | Maheshwari, R. P. Tripathy, Manoj |
metadata.dc.type: | Other |
Appears in Collections: | MASTERS' THESES (Electrical Engg) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
G22291.pdf | 11.71 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.