Efficient methods for digital image watermarking and information embedding

被引:7
|
作者
Gupta S. [1 ]
Saluja K. [1 ]
Solanki V. [1 ]
Kaur K. [2 ]
Singla P. [3 ]
Shahid M. [4 ]
机构
[1] Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab
[2] Chandigarh University, Mohali
[3] Chandigarh Engineering College-CGC Landran, Punjab, Mohali
[4] Noida Institute of Engineering and Technology, UP, Greater Noida
来源
Measurement: Sensors | 2022年 / 24卷
关键词
BPNN; DFIS; FWHT; Huffman; QIM; SVD;
D O I
10.1016/j.measen.2022.100520
中图分类号
学科分类号
摘要
Now a day to achieve security of digital data, utilizing digital image watermarking scheme is the option. The primary purpose to upgrade image watermarking scheme is to fulfill the need of sufficient imperceptibility, capacity, and robustness of watermark against several attacks like JPEG compression parameter, salt and pepper noise, cropping factor of the image part which contains a watermark and rotating the watermark at one particular angle. During embedding stage in digital image watermarking scheme, a secret message or image introduced into a host image without destroying the quality of original cover image for security and authentication of the data. During extraction stage in the watermarking scheme applying a process to that employed in insertion step but in a reverse way. In this paper different evaluation based on the watermarking methods described. Many projects have been presented such as DCT, DWT, DFT, SVD using FWHT, QIM, BPNN, DFIS, EZW, Huffman coding to provide protection, robustness and high embedding capacity. In the digital image watermarking world, where Peak signal-to-noise ratio (PSNR) is utilized to determine the image quality factor and Normalized correlation (NC) and robustness of the watermark. Using this learning opportunity an environment friendly digital image watermarking scheme can be used with sustainable infrastructure in developing countries. © 2022
引用
收藏
相关论文
共 50 条
  • [31] Digital Image Watermarking Based on DWT-DCT: Evaluate for a New Embedding Algorithm
    Akter, Afroja
    Nur-E-Tajnina
    Ullah, Muhammad Ahsan
    2014 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2014,
  • [32] Image pixel value unification digital watermarking embedding method based on quantum key
    Wu J.
    Zhang D.
    Wang H.
    Zhu D.
    Song L.
    International Journal of Performability Engineering, 2019, 15 (08): : 2277 - 2284
  • [33] Multi-bit embedding in asymmetric digital watermarking without exposing secret information
    Okada, Mitsuo
    Kikuchi, Hiroaki
    Okabe, Yasuo
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05): : 1348 - 1358
  • [34] Image vectorisation in digital image watermarking
    Shang, L
    VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2003, PTS 1-3, 2003, 5150 : 872 - 879
  • [35] Watermarking Approach of Embedding Patient Facial Information into RONI of Brain CT scan Image
    Moniruzzaman, Md.
    Hossain, Md. Foisal
    2015 18th International Conference on Computer and Information Technology (ICCIT), 2015, : 248 - 253
  • [36] Recent Trends in Holographic Digital Watermarking Technology for Image Hiding Information
    Xiao, Yingzhe
    Zhang, Wen
    Xie, Yong
    INTERNATIONAL ACADEMIC CONFERENCE ON THE INFORMATION SCIENCE AND COMMUNICATION ENGINEERING (ISCE 2014), 2014, : 37 - 42
  • [37] Digital watermarking based on locally linear embedding
    Fu, YG
    Shen, RM
    Shen, LP
    ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 2143 - 2146
  • [38] Digital Image Watermarking and Performance Analysis of Histogram Modification Based Methods
    Araghi, Tanya Koohpayeh
    INTELLIGENT COMPUTING, VOL 1, 2019, 858 : 631 - 637
  • [39] Image watermarking in DCT: an embedding strategy and algorithm
    Huang, Jiwu
    Yun, Q.Shi
    Cheng, Weidong
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2000, 28 (04): : 57 - 60
  • [40] Digital image watermarking: an overview
    Nikolaidis, N.
    Pitas, I.
    International Conference on Multimedia Computing and Systems -Proceedings, 1999, 1 : 1 - 6