{"title":"Dual watermarking based on Multiple parameter fractional Fourier transform and LSB technique","authors":"Sudhir Keshari, S. G. Modani","doi":"10.1109/ICIIP.2011.6108846","DOIUrl":null,"url":null,"abstract":"In this paper, a robust and imperceptible dual watermarking algorithm is proposed by the combination of multiple parameter fractional Fourier transform (MPFRFT) and least significant bits (LSB) technique. Original cover image is segregated into sub - bands of block size 8 × 8 and then MPFRFT transform is applied to each block, and the dual watermark images are embedded using the LSB technique. The parameters involved in the MPFRFT are used as a secrete keys for the technique. Robustness and imperceptibility of the proposed technique against the malicious person are demonstrated by simulations results.","PeriodicalId":201779,"journal":{"name":"2011 International Conference on Image Information Processing","volume":"93 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Image Information Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIIP.2011.6108846","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
In this paper, a robust and imperceptible dual watermarking algorithm is proposed by the combination of multiple parameter fractional Fourier transform (MPFRFT) and least significant bits (LSB) technique. Original cover image is segregated into sub - bands of block size 8 × 8 and then MPFRFT transform is applied to each block, and the dual watermark images are embedded using the LSB technique. The parameters involved in the MPFRFT are used as a secrete keys for the technique. Robustness and imperceptibility of the proposed technique against the malicious person are demonstrated by simulations results.