Tchebichef image watermarking along the edge using YCoCg-R color space for copyright protection

Easy creation and manipulation of digital images present the potential danger of counterfeiting and forgery. Watermarking technique which embeds a watermark into the images can be used to overcome these problems and to provide ownership and copyright protection. Digital image watermarking should mee...

Full description

Saved in:
Bibliographic Details
Main Author: Ferda, Ernawan
Format: Conference or Workshop Item
Language:English
English
Published: 2018
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/22177/1/20.%20Tchebichef%20Image%20Watermarking%20along%20the%20Edge.pdf
http://umpir.ump.edu.my/id/eprint/22177/2/20.1%20Tchebichef%20Image%20Watermarking%20along%20the%20Edge.pdf
http://umpir.ump.edu.my/id/eprint/22177/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaysia Pahang
Language: English
English
Description
Summary:Easy creation and manipulation of digital images present the potential danger of counterfeiting and forgery. Watermarking technique which embeds a watermark into the images can be used to overcome these problems and to provide ownership and copyright protection. Digital image watermarking should meet requirements, e.g. maintain image quality, difficult to remove the watermark, quality of watermark extraction, and applicable. This research proposes Tchebichef watermarking along the edge based on YCoCg-R color space. The embedding region is selected by considering the human visual characteristics entropy. The selected blocks with the human visual characteristics entropy are transformed by Tchebichef moments. The locations of C(0,1), C(1,0), C(0,2) and C(2,0) of the matrix moment are randomly embedded for each watermark bit. The proposed watermarking scheme can achieve a trade-off between invisibility and resistant of the watermark. The quantitative experimental results produce the imperceptibility by SSIM value around 0.98. The watermark recovery has greater resistant after several types of attack than other schemes.