{"title":"Comparison of digital watermarking techniques","authors":"J. Aparna, Sonal Ayyappan","doi":"10.1109/I2CT.2014.7092189","DOIUrl":null,"url":null,"abstract":"Digital watermarking is the method of hiding digital data in any form of multimedia data such as image, audio, video, etc. Digital watermarks are used for verifying the integrity and authenticity of multimedia data and also used to prevent fraud and forgery. This paper performs a comparative analysis of different image watermarking techniques. The watermarking techniques based on DCT, DWT and a combination of DCT and DWT is implemented. These methods use Singular Value Decomposition (SVD) of the cover image and watermark for embedding the watermark. Different attacks are applied on the watermarked image in order to analyze the robustness of each algorithm.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference for Convergence for Technology-2014","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I2CT.2014.7092189","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Digital watermarking is the method of hiding digital data in any form of multimedia data such as image, audio, video, etc. Digital watermarks are used for verifying the integrity and authenticity of multimedia data and also used to prevent fraud and forgery. This paper performs a comparative analysis of different image watermarking techniques. The watermarking techniques based on DCT, DWT and a combination of DCT and DWT is implemented. These methods use Singular Value Decomposition (SVD) of the cover image and watermark for embedding the watermark. Different attacks are applied on the watermarked image in order to analyze the robustness of each algorithm.