Site Loader


The latest growth of fast communication network and explosion of
a huge network of multimedia systems has discouraged the multimedia &
hypertext content providers. The authors and producers hesitate to share their
article on the network environment because they have no control to protect from
copy. The intelligent property with authentication is becoming very important
issue today (Karimi et al., 2013). Instead multiple efforts and resources are
working to make authorize intellectual property. The total cost of producing
such intellectual property and creations of typically constitute significant
formation. However, the creator of multimedia is always need some awards with
motivation for the development. The researchers today, are involving to the
research in image processing with the specialization in watermarking. The basic
property of the image allows multiple control and fact to judge the purity and
classify accordingly.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Figure 1. Watermark embedding and extraction processAll the watermarking process has basic approach with the
component in algorithm, the Figure 1 presents the block diagram of steps with
component used in watermarking. Basically, digital watermarks are used as
identity information to identify the owner by verifying authenticity and
integrity of the image. It is specially used for finding copyright
infringements and for banknote authentication. In the past decade, as the
information digitalization and internet were developed, digital media
increasingly rapidly over traditional analog media. However, as one of the
concomitant side-effects of digital media, that it is also becoming easier and
providing an easy approach for some individual or group to copy and transmit
digital products without the permission of the owner. And to solve this problem
watermarking technique were introduced. There are many subject covered by
watermarks such as signal processing, encryption and communication theory. The
research in the field of digital watermark aimed to provide to prevent and trace
prohibited copying and transmission and security of copyright to digital
products.Watermarking techniques are rarely used in spatial domain bude
widely used in transform domain because spaital domain based watermarking can
easily affected by basic image operation. The spatial domain techniques are not
complex to implement, so they cannot withstand low pass filtering. The
frequency domain of watermarking are achieved by i.e. DCT, DFT and DWT etc. The
comparison of developed techniques reflects that the frequency-domain
watermarking is most effective with realizing the imperceptibility and
robustness. (Rekhaet et al. 2014, Mitali et al., 2013). The DWT is most widely
researched Frequency-Domain based transforms. The Discrete Cosine Transform
(DCT) and Discrete Fourier Transform (DFT) are also used with their own
important characteristics and applications. DWT exist fine spatial localization
with multi-resolution characteristics, those are matches to theoretical models
of human visual system. Further, performance improvement of DWT based
Watermarking algorithms changes with the level of DWT (Naghsh et al., 2008).An effective and interactive watermarking technique should be
considering the several properties (Naghsh et al., 2008).

• Transparency: The
embedded watermark in the image should be perceptually and visually
imperceptible. This requirement holds the most challenges for the images
having noticeable pixel similarities in different parts of the image. The
fixed watermark in the images should must be perceptually invisible
because this holds the most challenges
• Robustness: The
watermarked image should be robust i.e. watermark should not be easy to
remove or destroy from image and before missing of the watermark,
watermarked image should be degraded. It should also be robust against
certain occasional or intentional attacks such as: i) Common digital
processing: A watermark should must survive after common digital
processing like scanning, dithering, compression, printing, blurring and,
etc. of the image. ii) Subterfuge attacks (collusion and forgery): It
should be robust from the collusion or repetition of the watermarks in the
image. iii) Geometric distortions: A watermarking technique has an ability
to survive different type of attacks such as scaling, geo-metric
transformation, cropping, and translation.
• Capacity: The
watermarking technique has a capacity to hide a watermark into an original
image with the majority of information.
• Blind Watermarking: This
include the extraction of watermark from a temporary watermarked image,
because sometimes it is unable to access the original image or a lot of
time and cost may be lost in searching original image.

Post Author: admin


I'm Erica!

Would you like to get a custom essay? How about receiving a customized one?

Check it out