An Effective Wavelet-Based Watermarking Scheme Using Human Visual System
#1

An Effective Wavelet-Based Watermarking Scheme Using Human Visual System for Protecting Copyrights of Digital Images
Abstract—
.
The modern era of information technology facilitates easy duplication, manipulation and distribution of digital data. This has demanded the certainty for effectively safe guarding the rightful ownership of digital images. Copyright protection and content authentication of digital images have emerged as an imperative concern to content owners and distributors. Digital watermarking provided a potential solution to this issue. The watermarking scheme must possess the characteristics of robustness and imperceptibility to ensure efficient copyright protection. An effective copyright protection is achieved by the incorporation of Human Visual System (HVS) models into watermarking scheme. Recently, interest in watermarking researches are chiefly fascinated by wavelet domain based watermarking schemes. In our earlier work, we have presented an imperceptible and efficient wavelet-based watermarking scheme for protecting the copyrights of images. Here, we have offered a proficient watermarking scheme by effecting some changes to our earlier work. The presented scheme for watermarking incorporates the HVS models into watermark embedding. The biorthogonal wavelet transform with lifting scheme is utilized in the watermarking. The image components for embedding are selected based on the entropy masking. A random matrix is generated on the basis of a key image and is engaged in both embedding and extraction processes. The correlation coefficient computation is made use of in the extraction of watermark. The experimental results illustrate the robustness and imperceptibility of the proposed approach.
Index Terms—Biorthogonal Wavelet Transform, Correlation Coefficient, Copyright Protection, Digital Watermarking, Discrete Wavelet Transform (DWT), Entropy Masking, Human Visual System (HVS), Lifting Scheme, Robust.
I. INTRODUCTION
Nowadays, almost the whole multimedia production and distribution is in the form of digital data [1]. The distribution, replication and modification of digital images are unsophisticated owing to the swift escalation of digital media such as Internet and Compact Discs. Because of this, copyright enforcement methods for the protection of copyright ownership have emerged as critical prerequisites
On behalf of the content owners and distributors, copyright protection and content authentication of digital content has developed into a grave problem.
This issue can be resolved by the solution offered by the Digital watermarking. In recent times, Digital watermarking has seen rapid escalation [3]. Ownership protection, authentication, and content integrity verification of intellectual property in digital form have comprehensively utilized watermarking, of late [4] [5]. The process of embedding data into multimedia elements such as images, audios and videos is defined as watermarking. The detection or extraction of this embedded data from the multimedia offers the proof of ownership or other purposes [6].
Diverse ways can be employed to find the different classifications of watermarking and watermarking techniques [7]. Generally, the literature available deals with two classes of digital watermarks namely the visible and invisible watermarks. In visible watermarks, the ownership of the image is illustrated by the distinctive unique visible message or a company logo and in the invisible watermarks, the invisibly watermarked digital content and the original image are extremely alike when envisaged [8]. The intent of the design of the major accessible invisible watermarking schemes is to offer either the copyright protection or content authentication. Robust and fragile watermarks are the two extensive categories of the invisible watermarks, the former principally intends at copyright protection where the need for high resistance against numerous signal processing operations is signified by the term ―robust‖. In contrast, content authentication is the primary objective of the latter [3]. In addition, non-blind, semi-blind and blind methods are the divisions of watermarking. In non-blind methods, the original image itself are employed for the extraction of watermark, while the certain characteristics of the original image are engaged by the semi-blind methods, whereas the detection process in the blind methods do not necessitate the original image


Download full report
http://ijceepapers/109.pdf
Reply
#2

to get information about the topic "wavelet transform watermarking" related topic refer the page link bellow

http://studentbank.in/report-a-digital-w...s-on-image

http://studentbank.in/report-multiresolu...e=threaded

http://studentbank.in/report-an-effectiv...ual-system

http://studentbank.in/report-digital-ima...e=threaded
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ppt visual system, digital watermarking scheme, areport on a fragile watermarking scheme for image, visual thersold scheme for color image in wikipedia, visual cryptography scheme with dynamic group, wavelet watermarking in digital images, watermarking using fractals report pdf,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  INTEGRATED EMERGENCY RESPONSE SYSTEM USING EMBEDDED SYSTEM seminar presentation 1 9,149 19-11-2018, 08:40 PM
Last Post:
  ROBUST DWT-SVD DOMAIN IMAGE WATERMARKING: EMBEDDING DATA IN ALL FREQUENCIES computer science crazy 2 5,221 19-06-2018, 06:10 PM
Last Post: KavyaIyengar
  Voice Based Automated Transport Enquiry System seminar class 2 3,184 05-10-2016, 09:34 AM
Last Post: ijasti
  MICROCONTROLLER BASED DAM GATE CONTROL SYSTEM full report seminar class 13 17,281 19-06-2016, 07:53 PM
Last Post: Saianjana
  GSM based SCADA implementation using Microcontroller project report tiger 19 27,736 31-05-2016, 12:13 PM
Last Post: dhanabhagya
  CONTENT DEPENDENT WATER MARKING SCHEME FOR SPEECH SIGNAL seminar class 3 2,400 04-05-2015, 03:15 PM
Last Post: seminar report asees
  Micro controller based automated irrigation system Electrical Fan 28 20,998 29-01-2015, 05:32 PM
Last Post: Guest
  Speech based password enabled devices switching system seminar class 1 2,627 24-01-2015, 05:23 AM
Last Post: Guest
  Positioning System using Bluetooth Technology project topics 1 1,548 01-12-2014, 02:49 AM
Last Post: ecosierra51
  Password based door locking system vinaysingri 4 7,942 10-11-2014, 11:25 PM
Last Post: jaseela123d

Forum Jump: