منابع مشابه
SVD based Image Watermarking Scheme
To embed watermark is a way to increase the robustness of the image. In this paper the singular value decomposition (SVD) based image watermarking scheme is proposed. The output result of SVD is more secure and robust. In the proposed scheme D and U components are used for embedding watermark. Unlike other transforms which uses fixed orthogonal bases, SVD uses non fixed orthogonal bases. The re...
متن کاملSVD-based digital image watermarking scheme
In the past couple of years, several digital watermarking schemes have been proposed and based on DCT, DFT, and DWT transformations. In this paper, a singular value decomposition (SVD)-based watermarking scheme is proposed. SVD transformation preserves both one-way and non-symmetric properties, usually not obtainable in DCT and DFT transformations. In the proposed scheme, both of the D and U co...
متن کاملA Robust Digital Image Watermarking Scheme Based on DWT
In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...
متن کاملA Robust Digital Image Watermarking Scheme Based on DWT
In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...
متن کاملSVD and Neural Network Based Watermarking Scheme
Presently the WWW phenomenon has brought the world in to the personal computer. Digital media is thereby given high priority. But this has increased the frequency of security breach of intellectual properties. Therefore copyright protections and content integrity verification are highly recommended. What we need is newer data hiding techniques that must be imperceptible, robust, highly secured,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2010
ISSN: 0975-8887
DOI: 10.5120/1531-134