Image Security of Digital Image Watermarking Based on DWTDCT based
Authors: Rina Khande, Ashish Tiwari
Certificate: View Certificate
Abstract
In this project, two algorithms called Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) in digital image watermarking are compared. Therefore, by this method, the best result is obtained in the LL domain according to DWT, and the best result is obtained in the LL domain by DWT, and the best result is obtained in the LL domain by DWT. Therefore, according to the proposed embedding phase and extraction Mark, our schema embeds logo bits in the low frequency domain. Enhance us with image encryption and image watermarking using HUFFMAN coding. The principle of this process is to recover safety and robustness of the proposed DCT and DWT comparison system. Therefore, compared to other methods, this method can provide higher security accuracy and less data loss rate. The method also focuses on improving the quality after the embedding step and the goal of regaining the watermark after the extraction step. After experiments, it turns out that our proposed method provides safety and high performance with lower computational complexity and good target quality. This work evaluates the performance of watermarked images on MATLAB simulation the evaluates performance will be show in terms of peak signal-to-noise ratio (PSNR) and mean square error (MSE).
Introduction
In current years, dynamic chaotic organization has been widely used to propose cryptographic primitives with confused behavior or similar accidental assets. In his groundbreaking work, Shannon barbed out exceptional opportunity for dynamic chaotic graphs in communication. He recognized 2 essential attributes that a good data encryption system should have, namely to avoid (resist) numerical attacks: proliferation or confusion. Distribution can propagate changes to the entire encrypted data, while fabrication can hide connection among original data or encrypted data. In recent years, dynamic chaotic arrangement has been widely used to design cryptographic primitives with chaotic behavior and randomness. Like attributes. In his groundbreaking work, Shannon pointed out exceptional opportunity for dynamic chaotic graphs in communication. He identified 2 basic attributes that a good data encryption system should have, namely to avoid (resist) statistical attacks: proliferation or uncertainty. Diffusion can propagate changes to the entire encrypted data, while fabrication can hide connection among original data or encrypted data. Displacement of rearrangement of objects is the simplest method of diffusion or replacement that is, replacing an object with another object, which is simplest type of perplexity. The dependable use of permutation or replacement methods based on dynamic chaotic systems is the basis of deep cryptography. Data shooting is a set of method used to place protected data in host media (such as images) with minimal degradation of host performance as well as methods for subsequent extraction of secure data. For exemplar, steganography can be named. Steganography is such a prosecurity innovation where secret data is entrenched in cover. Reversible data that hides inserts information bits by changing host signal, but after remove integrated information, original host signal can be restored accurately (losslessly). Sometimes terms like distortion-free, reversible, loss-free or erasable watermark are used as synonyms for reversible watermarks.
Conclusion
The two most common digital watermarks for transformation domain are based on discrete wavelet transformation (DWT) and digital watermark based on discrete cosine transformation (DCT). This article focuses on the technology that combines the two. This article proposes a new embedding algorithm The algorithm evaluates level 2, level 3 and level 4 for DWT. It also describes the comparison results for NEA at these levels and the Cox addition algorithm established under the same environment. Two types of signal-to-noise ratio (PSNR) or correlation are considered to measure imperceptibility and robustness in digital watermarking, respectively. Digital signage is one of the key technologies that can be used in digital rights management systems to locate property, track usage, ensure licensing, prevent illegal copying , and promote content verification. Therefore, a dual security system that uses watermarking and encryption is needed to build an effective DRM system to address IP copyright issues. Digital markers provide an effective and easy way to protect the copyright of digital images. In marker technology, the key to the marker is unique and there is one contract for each marker. Its keys are confidential and only authorized parties can know this, thus eliminating the possibility of illegal use of digital content. The watermarking plan was successfully developed at MATLAB. Perform image processing. The limitation of the watermarking algorithm set is that the processing needs to be done pixel by pixel. In the future, we aim to consider the processing of individual barriers.
Copyright
Copyright © 2025 Rina Khande, Ashish Tiwari. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.