Escolar Documentos
Profissional Documentos
Cultura Documentos
A
k
I
A
k1
, k =1,2,3,4,
where k denotes B1,B2,B3 and B4
4. Apply DCT to the whole visual watermark W.
5. Apply SVD to the DCT-transformed visual watermark W:
w =u
w
w
I
w
1
.
International Journal of Engineering Trends and Technology (IJETT) Volume 4 Issue 9- September 2013
ISSN: 2231-5381 http://www.ijettjournal.org Page 3955
6. Modify the singular values in each Quadrant B
k
, k =
1,2,3,4, with the singular values of the
DCT-transformed visual watermark:
_i^(*k)=_i^k+_k*_wii=1n Where _i^ki=1n
are
The singular values of _A^k , and _wii=1n are the
singular values of _V .
7. Obtain the 4 sets of modified DCT coefficients:
A^(*k)=U_A^k _A^(*k) V_A^kT ,k=1,2,3,4.
8. Map the modified DCT coefficients back to their original
positions.
9. Apply the inverse DCT to produce the watermarked cover
image.
2.4.2) Watermark Extraction:
1. Apply the DCT to the whole watermarked (and possibly
attacked) cover image A^* .
2. Using the zig-zag sequence, map the DCT coefficients into
4 quadrants: B1, B2, B3, and B4.
3. Apply SVD to each quadrant: A^(*k)=U_A^k _A^(*k)
V_A^kT ,k=1,2,3,4. where k denotes the attacked quadrants.
4. Extract the singular values from each quadrant
Bk,k=1,2,3,4: _wi^k=(_i^(*k)-_i^k)/_k ,i=1,..n
5. Construct the DCT coefficients of the four visual
watermarks using the singular vectors:
W^k=U_W^k_W^kV_W^k ,k=1,2,3,4.
6. Apply the inverse DCT to each set to construct the four
visual watermarks.
3. CONCLUSION AND FUTURE SCOPE:
In this paper debate many latest technologies for improving
robust and harmless from many geometrical attacks. When
any one go for attack than extract the watermarking and find
the Peak Signal Noise Ratio value is greater than. The value of
after using of Singular Value Decomposition and Discrete
Cosine transformation algorithm Peak Signal Noise Ratio is
less.by implementation of these two algorithms performing
the outcomes on geometrical attacks. And future scope of this
technology we are performing many attacks Dither, Gaussian
Noise and Average filtering. We are improving the
multimedia in digital image, audio, video many digital media
in current time use day by day creating of request of digital
technology.
REFERENCES:
[1] R.J. Anderson, and F. Petitcolas,On the Limits of Steganography ,
IEEE J ournal of Selected Areas in Communications, vol 16, Issue 4, pp 474
481, 1998.
[2] -PETITCOLAS, F.ANDERSON, R.KUHN, M. : Attacks on
Copyright Marking Systems, in Lecture Notes on Computer Science, pp. 218
238, April 1998.
[3] BOJ KOVIC, Z.SAMCOVIC, A. : XXXVII International Sci-entific
Conference on Information, Communication and Energy Systems and
Technologies ICEST 2002, Vol. 1, pp. 131134, Nis,Yugoslavia, 14
October 2002.
[4] PLA, O.LIN, E.DELP, E. : A Wavelet Watermarking Algorithm
based on a Tree Structure, in Security, Steganography,and Watermarking of
Multimedia Contents, pp. 571580, 2004.
[5] BARNI, M.BARTOLINI, F. : Improved Wavelet-Based Watermarking
Through Pixel-Wise Masking, IEEE Trans. Image Processing 10 No. 5 (May
2001), 783791.
[6] CorinaNafornita, "A Wavelet-Based Watermarking for Still Images",
Scientific Bulletin of Politehnica University of Timisoara, Trans. on
Electronics and Telecommunications, 49(63), special number dedicated to the
Proc. of Symposiumof Electronics and Telecommunications ETc, Timisoara,
pp. 126-131, 22 - 23 October 2004.
[7] R. Liu and T. Tan, An SVD-based watermarking scheme for protecting
rightful ownership, IEEE Trans. Multimedia, vol. 4, no. 1, pp. 121128,Mar.
2002.
[8] A. Nikolaidis and I. Pitas, Asymptotically optimal detection for additive
watermarking in the DCT and DWT domains, IEEE Trans. Image Process.,
vol. 12, no. 5, pp. 563571, May 2003.
[9] F. Hartung , and M. Kutter,Multimedia Watermarking Techniques ,
Proc. IEEE, vol 87, no.7, pp 1079-1107,1999.