A RDWT and Block-SVD based Dual Watermarking Scheme for Digital Images
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 4
Abstract
In the modern era, digital image watermarking is a successful method to protect the multimedia digital data for example copyright protection, content verification, rightful ownership identification, tamper detection etc. In this paper for improving the robustness and security, a Dual watermarking approach using Redundant Discrete Wavelet Transform (RDWT), block based singular value decomposition (SVD) and Arnold transform is presented. There are two gray scale watermarks, one is Prime watermark and other is Arnold scrambled Second watermark. Second watermark is embedded into the RDWT transformed Prime watermark in all sub bands to get the processed watermark image. After that transformed gray scale cover image is partitioned into non-overlapping blocks for embedding the processed watermark image by modifying the SVD coefficients of each block to obtain the resultant watermarked image. Now a reverse algorithm is developed to takeout the Prime and Second watermark from noisy image. Analysis and experimental outcomes show that the presented method is more robust against numerous image processing attacks and perform better as compared to previously introduced schemes related to presented work.
Authors and Affiliations
Sachin Gaur, Vinay Kumar Srivastava
A Survey of IPv6 Deployment
The next-generation Internet protocol (IPv6) was designed to overcome the limitation in IPv4 by using a 128-bit address instead of a 32-bit address. In addition to solving the address the limitations, IPv6 has many impro...
An Investigation and Comparison of Invasive Weed, Flower Pollination and Krill Evolutionary Algorithms
Being inspired by natural phenomena and available biological processes in the nature is one of the difficult methods of problem solving in computer sciences. Evolutionary methods are a set of algorithms that are inspired...
ComplexCloudSim: Towards Understanding Complexity in QoS-Aware Cloud Scheduling
The cloud is generally assumed to be homogeneous in most of the research efforts related to cloud resource management and the performance of cloud resource can be determined as it is predictable. However, a plethora of c...
A Crypto-Steganography: A Survey
The two important aspects of security that deal with transmitting information or data over some medium like Internet are steganography and cryptography. Steganography deals with hiding the presence of a message and crypt...
Embedded Feature Selection Method for a Network-Level Behavioural Analysis Detection Model
Feature selection in network-level behavioural analysis studies is used to represent the network datasets of a monitored space. However, recent studies have shown that current behavioural analysis methods at the network-...