Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Analysis of Robustness of Digital Watermarking under Various Attacks

Print
PDF
IP Multimedia Communications
© 2011 by IJCA Journal
ISBN : 978-93-80864-99-3
Year of Publication: 2011
Authors:
Yashovardhan Kelkar
Heena Shaikh

Yashovardhan Kelkar and Heena Shaikh. Analysis of Robustness of Digital Watermarking Under Various Attacks. Special issues on IP Multimedia Communications (1):47-51, October 2011. Full text available. BibTeX

@article{key:article,
	author = {Yashovardhan Kelkar and Heena Shaikh},
	title = {Analysis of Robustness of Digital Watermarking Under Various Attacks},
	journal = {Special issues on IP Multimedia Communications},
	month = {October},
	year = {2011},
	number = {1},
	pages = {47-51},
	note = {Full text available}
}

Abstract

This project acquaints an algorithm of digital watermarking which is based on Least Significant Bit (LSB), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). In accord with the characters of human vision, the main objective of the project is to be focused on comparative analysis of this algorithms on the basis of invisibility, distortion and robustness to attacks. The simulation results show that this algorithm is invisible and has good robustness for some common image processing operations.By the use of Matlab software, the algorithms have been coded and then implemented properly.

Reference

  1. Seitz J., Digital Watermarking For Digital Media, Information Science Publishing, United States of America, May 2005.
  2. Cox I. J., Miller M. L., Bloom J. A., Digital watermarking. San Francisco: Morgan Kaufmann Publishers, 2001.
  3. Sanjay Rawat1, Balasubramanian Raman2. A New Robust Watermarking Scheme For Color Images, IEEE 2nd International Advance Computing Conference 2010.
  4. A.M.Kothari, A.C.Suthar, R.S.Gajre. Performance Analysis of Digital Image Watermarking Technique–Combined DWT–DCT over individual DWT, Published in International Journal of Advanced Engineering & Applications, Jan. 2010.
  5. Athanasios Nikolaidis and Ioannis Pitas. Region-Based Image Watermarking, Published in IEEE Transactions on Image Processing, Vol. 10, No. 11, November, 2001.
  6. I. J. Cox, M. L. Miller, J. A. Bloom, “Digital Watermarking”, Morgan Kaufmann Publishers, 2001.
  7. Chandra Mohan B and Srinivas Kumar S. Robust Multiple Image Watermarking Scheme using Discrete Cosine Transform with Multiple Descriptions. Published in International Journal of Computer Theory and Engineering, Vol. 1, No. 5, December, 2009.
  8. Shital Gupta, Dr Sanjeev Jain A Robust Algorithm of Digital Image Watermarking Based on Discrete Wavelet Transform. Published in Special Issue of IJCCT Vol.1 Issue 2, 3, 4; 2010 for International Conference
  9. ACCTA-2010, 3-5 August 2010.
  10. Y. Kim, Kwon, and R. Park, “Wavelet Based Watermarking Method for Digital Images Using the Human Visual System”, Proceeding of IEEE International symposium on circuits and systems,Vol. 4, pp. 80-83. July 1999.
  11. Lin, S. and C. Chin, “A Robust DCT-based Watermarking for Copyright Protection,” IEEE Trans.Consumer Electronics, 46(3): 415-421, 2000.