An Efficient Watermarking Algorithm Based on DWT and FFT Approach
Journal Title: International Journal on Computer Science and Engineering - Year 2014, Vol 6, Issue 6
Abstract
Multimedia and Internet have become our daily needs. It has become a common practice to create copy, transmit and spread digital data .It leads to unauthorized duplication problem. Digital image watermarking provides a powerful solution for this problem. Watermarking is the process of embedding a cover image in such a way that the resulting watermarked image is robust to certain distortion caused by either standard data processing in a friendly environment or malevolent attacks in an unfriendly environment . This paper presents a digital image watermarking based on two dimensional Fast Fourier Transform (FFT) and Discrete Wavelet Transform (DWT). The generalized algorithms are presented for FFT, DWT-FFT combined approach. Peak signal to noise ratio and normalized cross-correlation coefficient are computed to measure image quality for each transform. Comparative results of image watermarking using FFT and DWT-FFT are presented. Experimental results demonstrate that the proposed scheme is imperceptible and has good robustness for some common image processing operations and some attacks. The paper recommends DWT-FFT based techniques for achieving secure image watermarking.
Authors and Affiliations
S. Manikanda prabu , Dr. S. Ayyasamy
Audio Compression Codec Using a Dynamic Gammachirp Psychoacoustic Model And a D.W.T Multiresolution Analysis
Audio compression algorithms are used to obtain compact digital representations of high-fidelity audio signals for the purpose of efficient transmission over larger distances and storage. This paper presents an audio cod...
A Survey of Denial of Service Attacks and it’s Countermeasures on Wireless Network
Wireless networks are popular among the Laptop user community today because of the mobility and ease of use. People working through wireless connection must be aware of the surroundings due to the various types of attack...
Organizational improvement using Organizational paradigms with the support of people paradigms
An organization is a vital part of social environment. Different parts of organization have great impact to the environment. On the other hand the different organizational strategy helps to improve the efficiency of orga...
Comparison of Optimal Homotopy Asymptotic Method with Homotopy Perturbation Method of Twelfth Order Boundary Value Problems
In this work, we consider special problem consisting of twelfth order two-point boundary value by using the Optimal Homotopy Asymptotic Method and Homotopy Perturbation Method. Now, we discuss the comparison in between O...
Image Retrieval based on combined features of image sub-blocks
In this paper we propose a new and efficient technique to retrieve images based on sum of the values of Local Histogram and GLCM (Gray Level Co-occurrence Matrix) texture of image sub-blocks to enhance the retrieval perf...