Issues

Other Journals Published by Timeline Publication Pvt. Ltd.

  • IJECCE
    IJECCE
  • IJEIR
    IJEIR
  • IJAIR
    IJAIR
  • IJAIM
    IJAIM
  • IJRAS
    IJRAS
  • IJISM
    IJISM
  • IJIRES
    IJIRES
  • IJASM
    IJASM
  • IJRIES
    IJRIES

Latest News

  • Submissions open

    "Submissions Open For Volume 12,Issue 1,Jan. - Feb. 2021"

  • Submissions open

    "Submissions Open For Volume 12,Issue 1,Jan. - Feb. 2021"

  • Successfully Published

    "Volume 11,Issue 6,Nov. - Dec. 2020"

  • Send your paper at E-mail:

    submit2ijecce@yahoo.in , submit@ijecce.org

D}igital Image Watermarking Using {BWT

B. Rajendra Prasad; K. Vinayaka Kota
The drastic advancement of digital technologies has demanded the owners to pay immense attention in securing their digital contents. Of late, watermarking has been utilized by researchers for the security of digital documents. However the embedded watermark data can be easily hacked by the hackers and thus result as a threat to protection of digital content. The proposed method is an efficient scheme for protecting the copyrights of digital images with the aid of both biometrics and digital watermarking. Newer data hiding techniques that satisfy the requirements of imperceptibility, robustness, capacity, or data hiding rate and security of the hidden data etc., are being developed. Therefore the preference to go for digital image watermarking, to show resiliency against various unintentional or deliberate attacks has increased. In this paper implementation of two different watermarking algorithms in the frequency domain will be presented. The first algorithm is based on the Discrete Wavelet Transform (DWT), the second one is based on the Bi-orthogonal Wavelet Transform (BWT). Embedding the watermark is done by modifying the coefficients of the middle frequency band within region of non-interest (RONI) so that the visibility of the image and diagnosis capability will not be affected and the watermark will not be removed by attacks. All schemes are tested using medical images and the simulation results are compared and the comparison shows that the best scheme is that based on using BWT.
Select Volume / Issues:
Year:
2012
Type of Publication:
Article
Keywords:
Copyright; DCT; BWT; Attacks
Journal:
IJECCE
Volume:
3
Number:
5
Pages:
1141-1144
Month:
Sept.
Hits: 837

Indexed By:

  • 1.gif
  • 01.png
  • 1.png
  • 2.jpg
  • 2.png
  • 3.jpg
  • 3.png
  • 4.jpg
  • 4.png
  • 5.png
  • 6.jpg
  • 6.png
  • 7.jpg
  • 7.png
  • 8.jpg
  • 8.png
  • 9.jpeg
  • 9.jpg
  • 10.jpg
  • 10.png
  • 11.jpg
  • 11.png
  • 12.jpg
  • 12.png
  • 13.png
  • 14.jpg
  • 14.png
  • 15.jpg
  • 16.png
  • 17.jpg
  • 17.png
  • 19.png
  • copernicus.jpg
  • EuroPub-1.png