Development of watermarking scheme using wavelet transform for multipurpose applications /
Over the last decade or so, Internet has become very popular phenomenon, where people can share whatever they want of images, videos, documents, etc. hence, protecting publishing copyrights has risen as pressing need. In addition, there has been also a significant demand for information security. F...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
Kuala Lumpur :
Kulliyyah of Engineering, International Islamic University Malaysia,
2015
|
Subjects: | |
Online Access: | http://studentrepo.iium.edu.my/handle/123456789/4691 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Over the last decade or so, Internet has become very popular phenomenon, where people can share whatever they want of images, videos, documents, etc. hence, protecting publishing copyrights has risen as pressing need. In addition, there has been also a significant demand for information security. For these reasons and many other reasons, digital image watermarking has recently become a very popular solution for these cases. Many researches have gone through this field to propose new techniques, or to enhance current techniques to efficiently solve such problems. The main purpose of this research is to achieve invisible watermarking system to show the ability to embed higher information with less degradation. In addition, to investigate the existing techniques and identify the literature review of watermarking using wavelet technique. Finally, to develop, implement, and evaluate digital image watermarking system using Wavelet Transform by proposing new methods of watermark embedding and extraction. This dissertation proposes digital image watermarking technique using discrete wavelet transform. First, an overview and history of digital image watermarking is underscored with sufficient discussion for the most popular applications of digital image watermarking, the problem statement and its significance are also highlighted. The experimental results show that the proposed method provides accepted level in term of imperceptibility compared to other works. In addition, it provides an acceptable level of robustness. We applied various types of attacks such as Gaussian noise, JPEG compression, and blurring. The results show the ability of the proposed algorithm to resist against several attacks. |
---|---|
Physical Description: | xiv, 85 leaves : ill. ; 30cm. |
Bibliography: | Includes bibliographical references (leaves 82-85). |