Performance Comparison of Wavelets Generated from Four Different Orthogonal Transforms for Watermarking With Various Attacks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 9, Issue 3
Abstract
This paper proposes a watermarking technique using different orthogonal wavelet transforms like Hartley wavelet, Kekrewavelet, Slant wavelet and Real Fourier wavelet transform generated from corresponding orthogonal transform. Theseorthogonal wavelet transforms have been generated using different sizes of component orthogonal transform matrices.For example 256*256 size orthogonal wavelet transform can be generated using 128*128 and 2*2 size componentorthogonal transform. It can also be generated using 64*64 and 4*4, 32*32 and 8*8, 16*16 and 16*16 size componentorthogonal transform matrices. In this paper the focus is to compare the performance of above mentioned transformsgenerated using 128*128 and 2*2 size component orthogonal transform and 64*64 and 4*4 size component orthogonaltransform in digital image watermarking. The other two combinations are not considered as their performance iscomparatively not as good. Comparison shows that wavelet transforms generated using (128,2) combination of orthogonal transform give better performances than wavelet transforms generated using (64,4) combination of orthogonaltransformfor contrast stretching, cropping, Gaussian noise, histogram equalization and resizing attacks. Real Fourierwavelet and Slant wavelet prove to be better for histogram equalization and resizing attack respectively than DCT waveletand Walsh wavelet based watermarking presented in previous work.
Authors and Affiliations
H. B. Kekre, Tanuja Sarode, Shachi Natu
Role of Taxation in Formulation of Fiscal Plan (Case study of Pakistan)
Research on the role of taxation in formulation of fiscal plan was started from the idea of data collection from the ministry of finance government of Pakistan for the purpose of checking the inter correlation and degree...
Study of Vulnerability Diagnosis and Sustaining Integrity of the Embedded Devices
Security vulnerability of the embedded devices with Internet connectivity is frequently reported these days. In this paper, a diagnosis was made for a security vulnerability in the controller that is an element of the se...
3D from 2D for Nano images using images processing methods
The scanning electron microscope (SEM) remains a main tool for semiconductor and polymer physics but TEM and AFM are increasingly used for minimum size features which called nanomaterials. In addition some physical prope...
A Variable Step Size for Acoustic Echo Cancellation Using Normalized Sub band Adaptive Filter
Numerous various step size normalized least mean square (VSS-NLMS)Algorithms have been derived to solve the problem of fast convergence rate and low mean square error.Here we find out the ways to control the step size. A...
GRAYSCALE IMAGE WATERMARK DETECTION
A Digital watermarking is a technique that provides a solution to the longstanding problems faced with copyrighting digital data. Digital watermarks are pieces of information added to digital data (audio, video, or stil...