{"title":"A robust image watermarking using DWT, SVD and Torus automorphism","authors":"K. Kakkirala, S. Chalamala, Jyoti Dhillon","doi":"10.1109/CYBERNETICSCOM.2013.6865802","DOIUrl":null,"url":null,"abstract":"Digital watermarking is a process to provide authenticity by hiding a data into an image or audio or document. Hiding of data in an image can be done in frequency domain. Since frequency domain based techniques are more robust against signal processing and geometric attacks than time domain techniques. One such frequency domain technique is developed based on combination of discrete wavelet transform, singular value decomposition and torus automorphism and is presented in this paper. This results prove that this method robust against different attacks and has good PSNR ratio.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865802","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Digital watermarking is a process to provide authenticity by hiding a data into an image or audio or document. Hiding of data in an image can be done in frequency domain. Since frequency domain based techniques are more robust against signal processing and geometric attacks than time domain techniques. One such frequency domain technique is developed based on combination of discrete wavelet transform, singular value decomposition and torus automorphism and is presented in this paper. This results prove that this method robust against different attacks and has good PSNR ratio.