首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Best tree wavelet packet transform based copyright protection scheme for digital images
Authors:Sanjay Rawat  Balasubramanian Raman
Institution:1. Department of Financial Management, Faculty of Management, University of Tehran, Tehran, Iran;2. Department of Physics, Firoozkooh Branch, Islamic Azad university, Tehran, Iran;3. Department of Physics, Shahid Beheshti University, G.C., Evin, Tehran 19839, Iran;1. Universidade do Algarve, Campus de Gambelas, 8000-117 Faro, Portugal;2. CEFAGE-UE (Center For Advanced Studies in Management and Economics), Portugal;3. Professora Auxiliar c/Agregação, Universidade do Algarve, Faculdade de Ciências e Tecnologia, Campus de Gambelas, 8000-117 Faro. ICAAM, Portugal;4. Direção de Serviços de Estatística, GPP (Gabinete de Planeamento e Políticas), Portugal;5. Professor Auxiliar c/Agregação, Universidade de Évora, Largo dos Colegiais, 7000 Évora, Portugal
Abstract:In this paper, a dual watermarking scheme based on discrete wavelet transform (DWT), wavelet packet transform (WPT) with best tree, and singular value decomposition (SVD) is proposed. In our algorithm, the cover image is sub-sampled into four sub-images and then two sub-images, having the highest sum of singular values are selected. Two different gray scale images are embedded in the selected sub-images. For embedding first watermark, one of the selected sub-image is decomposed via WPT. The entropy based algorithm is adopted to find the best tree of WPT. Watermark is embedded in all frequency sub-bands of the best tree. For embedding second watermark, l-level discrete wavelet transform (DWT) is performed on the second selected sub-image. The watermark is embedded by modifying the singular values of the transformed image. To enhance the security of the scheme, Zig-Zag scan in applied on the second watermark before embedding. The robustness of the proposed scheme is demonstrated through a series of attack simulations. Experimental results demonstrate that the proposed scheme has good perceptual invisibility and is also robust against various image processing operations, geometric attacks and JPEG Compression.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号