Combined Technique for Improving Digital Image Watermarking

被引:0
作者
Salama, Ahmed S. [1 ]
Mokhtar, Mohamed Amr [2 ]
机构
[1] Alexandria Univ, Fac Engn, Elect Engn Dept, Alexandria, Egypt
[2] Alexandria Univ, Fac Engn 21544, Elect Engn Dept, Alexandria, Egypt
来源
2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC) | 2016年
关键词
digital image; watermarking; data hiding; image combination; discrete wavelet transforms; discrete cosine transform; image fusion; hybrid fusion technique;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The technique presented in this paper offers better imperceptibility, reduces execution time and improves robustness in comparison to Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and hybrid fusion technique (HFT) digital watermarking techniques. The proposed improved technique (IMD-WC-T) combined both the DWT and DCT subsequently and spread the watermark with PN-sequence with a certain key in the DCT transform after decompose the host image with DWT in level 2 to generate the final watermarked image. Such combination allowed us to exploit the individual advantages derivable from the separate use of the DWT and DCT methods. Results obtained from (IMD-WC-T) showed improved performance in terms of imperceptibility, execution time and certain aspect in robustness (Gama Correction, Histogram Equalization) than that of DWT, DCT, and hybrid fusion technique (HFT), in addition to the quality of recovered watermark image as well. Comparing with HFT, the IMD-WC-T technique guarantees additional imperceptibility, reduced execution time and gave more robustness against Gama Correction and Histogram Equalization.
引用
收藏
页码:557 / 562
页数:6
相关论文
共 8 条
[1]   A DWT ordering Scheme for Hiding Data in Images using Pixel Value Difference [J].
Al-Asmari, Awad Kh. ;
Salama, Ahmed ;
Iliyasu, Abdullah M. ;
Al-Qodah, Mohammed A. .
PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, :553-557
[2]  
[Anonymous], 2008, DIGITAL WATERMARKING
[3]   Watermarking and authentication of quantum images based on restricted geometric transformations [J].
Iliyasu, Abdullah M. ;
Le, Phuc Q. ;
Dong, Fangyan ;
Hirota, Kaoru .
INFORMATION SCIENCES, 2012, 186 (01) :126-149
[4]  
Lai C. C., 2010, IEEE T INSTRUMENTATI, V59
[5]  
Narang M., 2013, INT J COMPUTER APPL, V74
[6]  
Salama A., 2011, 2011 IEEE International Conference on System Engineering and Technology (ICSET), P100, DOI 10.1109/ICSEngT.2011.5993429
[7]  
Salama A. S., 2014, ADV INTELLIGENT SYST, P207
[8]  
Yadav U., 2014, Int. J. Sci. Eng. Res., V5, P1288