Performance Analysis of Hiding Techniques in Digital Image Watermarking

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-38 Number-3
Year of Publication : 2016
Authors : Anita yadav, Umesh kumar, Lajwanti singh
  10.14445/22312803/IJCTT-V38P127

MLA

Anita yadav, Umesh kumar, Lajwanti singh "Performance Analysis of Hiding Techniques in Digital Image Watermarking". International Journal of Computer Trends and Technology (IJCTT) V38(3):153-155, August 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Piracy is a big threat to the original contents. This multi-model approach interleaves some frequency domain watermarking strategies to counteract shortcomings of one strategy by the advantages of other. The original image is divided into spatially disjoint blocks. Watermarking is a way of embedding a mark that hides information in a multimedia carrier. Major issues in Image watermarking are to increase the robustness visual attacks. In this paper, a Review of different watermarking technique are analyzed.

References
[1] P.Y. Lin, J.S. Lee and C.C Chang, “Dual Digital Watermarking for Internet Media Based on Hybrid Strategies”. IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 8, pp.1169-1177, Aug 2009.
[2] C. Jin and J. Peng, “Robustness of a Blind Image Watermark Detector”, Electronic Letters on Computer Vision and Image Analysis 4(1):11-20, 2004.
[3] C. I. Podilchuk and E.J. Delp, Digital Watermarking: Algorithms and Applications, IEEE Signal Processing Magazine, pp. 33-45, July 2001.
[4] D. Li and B. Zhang, “A Dual Watermarking Scheme Based on Threshold Cryptography for Web Document”, International Conference on Computer Application and System Modeling (ICCASM 2010), vol. 8, pp.510-514, 2010.
[5] A. Houmansdr and S. Ghaemmaghami, “A Novel Video Watermarking Method Using Visual Cryptography”, International Conference on Engineering of Intelligent Systems IEEE, pp.1-5, 2006.
[6]Ms.K.Thaiyalnayaki,,MsA.Kala” Dual Robust Watermarking Using Integer Wavelet Transform And Singular Value Decomposition” International Journal of Remote Sensing & Geoscience (IJRSG ) ISSN No: 2319-3484 Volume 2, Issue 6, Nov. 2013
[7] Navnidhi Chaturvedi, Dr.S.J.Basha “Comparison of Digital Image watermarking Methods DWT & DWT-DCT on the Basis of PSNR”IJIRSET Vol. 1, Issue 2, December 2012
[8] Preeti Parashar1 and Rajeev Kumar Singh “ A Survey: Digital Image Watermarking Techniques”, International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 7, No. 6 (2014),pp.112
[9] Chesta Jain, Vijay Chaudhary , “ Performance Analysis of Integer Wavelet Transform for Image Compression ” IEEE conference 2011.
[10] Kaushik Deb Md. Sajib Al-Seraj,Md. Moshiul Hoque “Combined DWT-DCT Based Digital Image Watermarking Technique for Copyright Protection” 2012 7th International Conference on Electrical and Computer Engineering.
[11] Vijaya K. Ahire, Vivek Kshirsagar “Robust Watermarking Scheme Based on Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) for Copyright Protection of Digital Images” IJCSNS VOL.11 No.8, August 2011.
[12] Sudhanshi Sharma, Umesh kumar” Performance Improvement of IWT BPCS image steganography” 4th international conference sep 2015

Keywords
Watermarking, DCT, Wavelet Transform, DWT, IWT.