1 Level DWT Image Watermarking Algorithm for RGB Cover Images and Watermarks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 5
Abstract
Abstract: This paper proposes a new 1 level DWT (Discrete wavelet transform) robust image watermarking algorithm for RGB cover images and watermarks. In the proposed algorithm 1 level DWT is applied on RGB cover image. The DWT divides cover image into four bands namely a lower resolution approximation image (LL) as well as horizontal (HH), vertical (LH) and diagonal (HL) detail components and watermark is inserted into LL sub band. As high frequency sub-band is usually removed through noise attacks. The proposed algorithm is imperceptible as well as robust against wide variety of image processing attacks like Gaussian noise, Salt –pepper noise, Gaussian filter, Median filter, Histogram Equalization etc. The watermarked image is of good quality and achieves high PSNR. The proposed watermarking algorithm shows efficient detection of watermark. Extracted RGB watermark is same as that of original watermark with NC value as 0.99
Authors and Affiliations
Jaya Jeswani
Approximating Source Accuracy Using Dublicate Records in Data Integration
Currently, there are two main basic strategies to resolve conflicts in data integration: Instance-based strategy and metadata-based strategy. However, the two strategies have their limitations and their problems....
Big data
Abstract: Big data refers to huge chunks of data that are very large and complex for it to be processed or analyzed by traditional methods. Initially, this enormous amounts of data brought about major challenges concerni...
Government Policies Search Using Marathi Speech RecognitionSystem– Based On Robust Feature Extraction Method
Abstract:Country like India, where 70% of the population lives in village and rural parts of the country, itbecomes more necessary to utilize such tools for their social, economic, administrative and governanceregenerati...
Visual Cryptography Implementation with Key Sharing For Effective Phishing Detection Process
The advent of the internet, various online attacks has been increased and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal, confidential information such...
Implementation of Hybrid Wavelet Transform for Adaptive Lossless Image Compression
Abstract: In digital image processing, Image compression is a type of data compression causing reduction in image size but maintain the image quality. It reduce cost and time in image storage and transmission and thuscan...