Compression Combined Robust Watermarking Scheme using SVD Replacement Technique
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: This paper proposes a novel compression combined digital image watermarking scheme based on singular value replacement technique. Image compression is achieved using Huffman encoding technique. Huffman encoding is an entropy encoding algorithm offering lossless image compression. The proposed watermarking scheme combines Integer wavelet transform (IWT) with singular value decomposition (SVD). For watermark embedding, the singular values (SV’s) of high frequency (CD) band of cover images are replaced with the singular values of watermark signal. Choosing a sample image as watermark signal depends on the relation between energy of singular value of high frequency component of cover and sample image. The combination of Huffman encoding with IWT-SVD domain watermarking results in a robust watermarking scheme that provides good compression ratio with better signal quality. Experiments suggest that the watermarked and original images are perceptually similar. Also, watermarked images are robust against image processing distortions and geometrical attacks. Further, the recovered images are distortion free.
Authors and Affiliations
Gangadhar Tiwari , Marpe Sora
Performance Optimization in Gang Scheduling In Cloud Computing
Cloud computing is a latest new computing paradigm where applications, data and IT services are provided over the Internet. The Job Scheduling is the key role in cloud computing systems. One technique is to use g...
Privacy Security of Multiuser on Multilevel System using XOR
Abstract: Privacy security of multiuser on multilevel system is considered in this work. On communication there is a chance for the eavesdropper’s to secretly listen to the conversation. In order to confuse the eavesdrop...
Hybrid Cryptography Algorithms for Enhanced Adaptive Acknowledgment Secure in MANET
The mobile adhoc network is a group of mobile nodes without having the fixed infrastructure. Due to the infrastructure less network and distributed nature, make mobile adhoc network susceptible to malicious attack...
Design and Development of an Automatic Online Newspaper Archiving System
Abstract: News archive has always been a great source of information. Till date, several printed and manual information retrieval systems served the purposes. But these systems are gradually becoming out of date, sinceth...
Enabling Integrity for the Compressed Files in Cloud Server
Cloud computing has been envisioned as next-generation architecture of IT enterprise. Cloud computing is the internet based model which delivers computing services on demand. Cloud storage moves the users...