{"title":"Ayrik kosinüs dönüşümü ve ayrik dalgacik dönüşümü tabanli Çoklu resim damgalama yöntemi","authors":"A. Abdulrahman, Serkan Öztürk","doi":"10.1109/IDAP.2017.8090208","DOIUrl":null,"url":null,"abstract":"In recent years, due to the development of computer, internet and mobile technologies the copyright protection of the multimedia documents such as digital audio, image and video has become important. Digital watermarking has become the most popular method for protecting multimedia documents. In this work, a novel robust image watermarking method based on Discrete Cosine Transform, Discrete Wavelet Transform and Arnold Transform is presented. The experiment results show that the proposed method is robust against different attacks.","PeriodicalId":111721,"journal":{"name":"2017 International Artificial Intelligence and Data Processing Symposium (IDAP)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Artificial Intelligence and Data Processing Symposium (IDAP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IDAP.2017.8090208","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Ayrik kosinüs dönüşümü ve ayrik dalgacik dönüşümü tabanli Çoklu resim damgalama yöntemi
In recent years, due to the development of computer, internet and mobile technologies the copyright protection of the multimedia documents such as digital audio, image and video has become important. Digital watermarking has become the most popular method for protecting multimedia documents. In this work, a novel robust image watermarking method based on Discrete Cosine Transform, Discrete Wavelet Transform and Arnold Transform is presented. The experiment results show that the proposed method is robust against different attacks.