Robust Non-Oblivious Dwt-Adaptive Invisible Digital Watermarking

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 12

Abstract

The main idea of this paper is embedding invisible watermark into an image. The advantage of this method over previous works is that it is easy to embed and robust to attacks. Non-oblivious detection technique is used. This is implemented using matlab and is verified for the robustness and results with previous are compared. Here we introduced a factor k as scaling factor for the watermark. To make the embedding more strong divide the image into different sublevels and each sublevel is again divided into sub bands and watermark is embedded into each sub band except the low frequency band. TO achieve this we adapted the transform domain method using the DWT .To Hvs minute changes in high frequencies are imperceptible ,hence based on this we perform invisible watermarking. .We use dwt transform domain as it is better to embed the watermark in transform domain, selecting only perceptually significant coefficients, because those are the most likely to survive compression. We use a non-oblivious technique for detection of the watermark and extract it from the cover image

Authors and Affiliations

Sri K. Naga Prakash , Ms. G. Sindhuri , Mr. K. Akshay , Mr. G. Apuroop

Keywords

Related Articles

FINGERPRINTING SCHEME FOR FILE SHARING IN TRANSFORM DOMAIN

Fingerprinting scheme plays an important role for file sharing. In this paper, a novel method is introduced for fingerprinting an image. The proposed method uses wavelet and Principal Component Analysis (PCA) techniques...

Educational Approach of Refactoring in Facilitating Reverse Engineering

Refactoring improves software codes and design. This activity often neglected by software developers because they need time to decide tactically where and when to refactor codes. Although the concepts theoretically insti...

Modern Trends Used In Operating Systems For High Speed Computing Applications

Operating system researches traditionally consist of adding new functions to the operating system in other words inventing and evaluating new methods for performing functions. Operating systems are the single most comple...

Study on the Customer targeting using Association Rule Mining

Data mining is one of the widest area where many researches takes place to mine desired and hidden data. There are many different approaches to find the hidden data. This paper deals with Frequent Pattern growth algorith...

BEYOND SIMULATED ANNEALING IN GRID SCHEDULING

In Grid Environment the number of resources and tasks to be scheduled is usually variable and dynamic in nature. This characteristic emphasizes the scheduling approach as a complex optimization problem. Scheduling is a k...

Download PDF file
  • EP ID EP119330
  • DOI -
  • Views 92
  • Downloads 0

How To Cite

Sri K. Naga Prakash, Ms. G. Sindhuri, Mr. K. Akshay, Mr. G. Apuroop (2011). Robust Non-Oblivious Dwt-Adaptive Invisible Digital Watermarking. International Journal on Computer Science and Engineering, 3(12), 3715-3721. https://europub.co.uk/articles/-A-119330