Tchebichef image watermarking along the edge using YCoCg-R color space for copyright protection
Easy creation and manipulation of digital images present the potential danger of counterfeiting and forgery. Watermarking technique which embeds a watermark into the images can be used to overcome these problems and to provide ownership and copyright protection. Digital image watermarking should mee...
Saved in:
Main Author: | |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
2018
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/22177/1/20.%20Tchebichef%20Image%20Watermarking%20along%20the%20Edge.pdf http://umpir.ump.edu.my/id/eprint/22177/2/20.1%20Tchebichef%20Image%20Watermarking%20along%20the%20Edge.pdf http://umpir.ump.edu.my/id/eprint/22177/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Malaysia Pahang |
Language: | English English |
Summary: | Easy creation and manipulation of digital images present the potential danger of counterfeiting and forgery. Watermarking technique which embeds a watermark into the images can be used to overcome these problems and to provide ownership and copyright protection. Digital image watermarking should meet requirements, e.g. maintain image quality, difficult to remove the watermark, quality of watermark extraction, and applicable. This research proposes Tchebichef watermarking along the edge based on YCoCg-R color space. The embedding region is selected by considering the human visual characteristics entropy. The selected blocks with the human visual characteristics entropy are transformed by Tchebichef moments. The locations of C(0,1), C(1,0), C(0,2) and C(2,0) of the matrix moment are randomly embedded for each watermark bit. The proposed watermarking scheme can achieve a trade-off between invisibility and resistant of the watermark. The quantitative experimental results produce the imperceptibility by SSIM value around 0.98. The watermark recovery has greater resistant after several types of attack than other schemes. |
---|