Design of Digital Image Watermarking Technique with Two Stage Vector Extraction in Transform Domain

R. Kanthavel
{"title":"Design of Digital Image Watermarking Technique with Two Stage Vector Extraction in Transform Domain","authors":"R. Kanthavel","doi":"10.36548/jitdw.2021.3.006","DOIUrl":null,"url":null,"abstract":"Multimedia data in various forms is now readily available because of the widespread usage of Internet technology. Unauthorized individuals abuse multimedia material, for which they should not have access to, by disseminating it over several web pages, to defraud the original copyright owners. Numerous patient records have been compromised during the surge in COVID-19 incidents. Adding a watermark to any medical or defense documents is recommended since it protects the integrity of the information. This proposed work is recognized as a new unique method since an innovative technique is being implemented. The resilience of the watermarked picture is quite crucial in the context of steganography. As a result, the emphasis of this research study is on the resilience of watermarked picture methods. Moreover, the two-stage authentication for watermarking is built with key generation in the section on robust improvement. The Fast Fourier transform (FFT) is used in the entire execution process of the suggested framework in order to make computing more straightforward. With the Singular Value Decomposition (SVD) accumulation of processes, the overall suggested architecture becomes more resilient and efficient. A numerous quality metrics are utilized to find out how well the created technique is performing in terms of evaluation. In addition, several signal processing attacks are used to assess the effectiveness of the watermarking strategy.","PeriodicalId":10896,"journal":{"name":"Day 1 Tue, September 21, 2021","volume":"20 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Day 1 Tue, September 21, 2021","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36548/jitdw.2021.3.006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Multimedia data in various forms is now readily available because of the widespread usage of Internet technology. Unauthorized individuals abuse multimedia material, for which they should not have access to, by disseminating it over several web pages, to defraud the original copyright owners. Numerous patient records have been compromised during the surge in COVID-19 incidents. Adding a watermark to any medical or defense documents is recommended since it protects the integrity of the information. This proposed work is recognized as a new unique method since an innovative technique is being implemented. The resilience of the watermarked picture is quite crucial in the context of steganography. As a result, the emphasis of this research study is on the resilience of watermarked picture methods. Moreover, the two-stage authentication for watermarking is built with key generation in the section on robust improvement. The Fast Fourier transform (FFT) is used in the entire execution process of the suggested framework in order to make computing more straightforward. With the Singular Value Decomposition (SVD) accumulation of processes, the overall suggested architecture becomes more resilient and efficient. A numerous quality metrics are utilized to find out how well the created technique is performing in terms of evaluation. In addition, several signal processing attacks are used to assess the effectiveness of the watermarking strategy.
变换域两阶段矢量提取数字图像水印技术设计
由于因特网技术的广泛使用,各种形式的多媒体数据现在很容易获得。未经授权人士滥用他们不应取得的多媒体资料,在多个网页上散布,以欺骗原始版权拥有人。在COVID-19事件激增期间,许多患者记录遭到泄露。建议在任何医疗或国防文件中添加水印,因为它可以保护信息的完整性。由于正在实施一项创新技术,这项拟议的工作被认为是一种新的独特方法。在隐写术中,水印图像的复原力是至关重要的。因此,本研究的重点在于水印图像方法的复原性。此外,在鲁棒性改进部分,提出了基于密钥生成的两阶段水印认证算法。在整个框架的执行过程中使用快速傅里叶变换(FFT),使计算更加简单。随着过程的奇异值分解(SVD)积累,建议的整体体系结构变得更有弹性和效率。使用许多质量度量来确定所创建的技术在评估方面的执行情况。此外,还使用了几种信号处理攻击来评估水印策略的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信