An Efficient Watermarking Algorithm Based on DWT and FFT Approach
Journal Title: International Journal on Computer Science and Engineering - Year 2014, Vol 6, Issue 6
Abstract
Multimedia and Internet have become our daily needs. It has become a common practice to create copy, transmit and spread digital data .It leads to unauthorized duplication problem. Digital image watermarking provides a powerful solution for this problem. Watermarking is the process of embedding a cover image in such a way that the resulting watermarked image is robust to certain distortion caused by either standard data processing in a friendly environment or malevolent attacks in an unfriendly environment . This paper presents a digital image watermarking based on two dimensional Fast Fourier Transform (FFT) and Discrete Wavelet Transform (DWT). The generalized algorithms are presented for FFT, DWT-FFT combined approach. Peak signal to noise ratio and normalized cross-correlation coefficient are computed to measure image quality for each transform. Comparative results of image watermarking using FFT and DWT-FFT are presented. Experimental results demonstrate that the proposed scheme is imperceptible and has good robustness for some common image processing operations and some attacks. The paper recommends DWT-FFT based techniques for achieving secure image watermarking.
Authors and Affiliations
S. Manikanda prabu , Dr. S. Ayyasamy
Reclaiming Individuality of Mysterious Passage
Authorship attribution, the science of inferring characteristics of author from characteristics of documents written by that author become an urgent need to find the original author of anonymous text. In this paper, a no...
Modified Kalman Filter-based Approach in Comparison with Traditional Speech Enhancement Algorithms from Adverse Noisy Environments
The paper presents a new speech enhancement approach for a single channel speech enhancement in a noise environment. In this method speech is mixed with real-world noises from babble, car and street environments. In this...
Association Analaysis in Wireless Network using Trace data.
With the explosive growth in wireless devices like smart phones, PDA’s, netbooks, WLAN networks are usually overloaded at workplaces, social and home environments. Though a large number of mobility models have been propo...
A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms
Encryption is the process of transforming plaintext into the ciphertext where plaintext is the input to the encryption process and ciphertext is the output of the encryption process. Decryption is the process of transfor...
Automatic detection of human and Energy saving based on Zigbee Communication
This paper proposes automatic detection of human and Energy saving room architecture to reduce standby power consumption and to make the room easily controllable with an IR remote control of a home appliance. To realize...