Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Digital Image Watermarking using Fibonacci Transform in YIQ Color Space

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 104 - Number 15
Year of Publication: 2014
Authors:
Manoranjan Kr Sinha
Rajesh Kumar Rai
G. Kumar
10.5120/18280-9206

Manoranjan Kr Sinha, Rajesh Kumar Rai and G Kumar. Article: Digital Image Watermarking using Fibonacci Transform in YIQ Color Space. International Journal of Computer Applications 104(15):28-35, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Manoranjan Kr Sinha and Rajesh Kumar Rai and G. Kumar},
	title = {Article: Digital Image Watermarking using Fibonacci Transform in YIQ Color Space},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {104},
	number = {15},
	pages = {28-35},
	month = {October},
	note = {Full text available}
}

Abstract

Digital watermarking is a technique for inserting ownership information to the digital data to prove the authenticity. A digital watermarking is perceptually invisible to prevent obstruction of the original image. It is also used for tamper proofing, broadcast monitoring, covert communication etc. In this paper, a wavelet-based watermarking approach for hiding watermark image in color host images is proposed. The host image is converted into YIQ color space and then Y channel decomposed into wavelet coefficients. This proposed methodology overcomes the drawback of the existing approaches and enhances the security by applying Arnold transform and Fibonacci transform for embedding the resultant pattern in the host image. The watermark embedding process does not degrade the visual quality of the image.

References

  • F. Bartolini, M. Barni, V. Cappellini, and A. Piva, "Mask Building for Perceptually Hiding Frequency Embedded Watermarks," Proc. Int. Conf. on Image Processing, Oct. 1998, vol. I, pp. 450-454.
  • Wang S. H. , LinY. P. , "Wavelet Tree quantization for copyright protection for Watermarking", IEEE Transactions, Image Processing, pp. 154-165, 2002.
  • Kundur and D. Hatzinakos, "A Robust Digital Image Watermarking Method Using Wavelet-Based Fusion," Proc. IEEE Int. Conf. on Image Processing, Oct. 1997, vol. I, pp. 544-547.
  • I. Cox, J. Kilian, F. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
  • Reddy R. , et al, "Robust Digital Watermarking of Color Images under Noise Attacks", International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May 2009.
  • Wang Y. , Doherty J. F. , Dyck V. R. E. , "A wavelet-based watermarking algorithm for ownership verification of digital images", IEEE Transactions, Image Processing, 11 pp. 77-88, 2002.
  • Tao P. , Eskicioglu A. M. , "A robust multiple watermarking scheme in the discrete wavelet transform domain", Proceedings of the SPIE, Vol. 5601, pp. 133-144, 2004.
  • Luo Y. , et al. "Study on digital elevation mode data watermark via integer wavelets", Journal of software, 16(6), pp. 1096-1103, 2005.
  • Yuan Y. , Huang D. , Liu D. , "An Integer Wavelet Based Multiple Logo- watermarking Scheme", In IEEE, Vol-2, pp. 175-179, 2006.
  • Lin Q. , Lin Z. , Feng G. , "DWT based on watermarking algorithm and its implementing with DSP", IEEE Xplore, pp. 131-134, 2009.
  • Chen, S. T. , Huang, H. N. , Chen, C. J. , Wu, G. D. , 'Energy-proportion based scheme for audio watermarking', IET Signal Process. , 2010, 4,(5), pp. 576–587.
  • Preda, R. O. , Vizireanu, D. N. , 'A robust digital watermarking scheme for video copyright protection in the wavelet domain', Measurement, 2010, 43, (10), pp. 720– 1726.
  • Deng, N. , Jiang, C. S. , 'CDMA watermarking algorithm based on wavelet basis'. Proc. 9th Int. Con. Fuzzy Systems and Knowledge Discovery, May 2012, pp. 2148– 2152.
  • Ho, C. K. and Li, C. T. Semifragile watermarking scheme for authentication of JPEG images. Proceeding of the IEEE international Conference on Information Technology: Coding and Computing, I, Pp. 7 – 11 2004.
  • I. Cox and M. Miller, "Electronic watermarking: the ?rst 50 years," in IEEE Fourth Workshop on Multimedia Signal Processing, 2001, pp. 225 –230.
  • Z. Wang, A. Bovic, H. Sheikh, and E. Simoncelli, "Image Quality Assessment: From Error Visibility to Structural Similarity," in IEEE Transactions on Image Processing, 2004, pp. 600-612.
  • http://www. mathworks. in/help
  • R. G. Gonzalez and R. E. Woods, Digital Image Processing, 3rd ed. Publishing House of Electronics Industry.