tailieunhanh - A robust watermarking technique using video compression standard H.264 integer discrete cosine transformation
This paper presents a robust watermarking algorithm for copyright protection of digital images. The proposed algorithm uses 4×4 block-based integer discrete cosine transformation (intdct) used in the video compression standard . The intDCT is used rather than the conventional DCT. | International Journal of Computer Networks and Communications Security C VOL. 6, NO. 4, APRIL 2018, 61–75 Available online at: E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) N C S A Robust Watermarking Technique Using Video Compression Standard Integer Discrete Cosine Transformation Ahmed Al-Gindy School of Engineering and Technology, AlDar Universiy College, Dubai, UAE 1 indri_mtc@ ABSTRACT This paper presents a robust watermarking algorithm for copyright protection of digital images. The proposed algorithm uses 4×4 block-based integer discrete cosine transformation (intdct) used in the video compression standard . The intDCT is used rather than the conventional DCT. The most significant advantage of this transform is that it is free from any floating-point or fixed-point multiplication required by the original dct and all operations can be carried out with integer arithmetic, without loss of accuracy. The 24 bits/pixel rgb images are used and the watermark is placed on the green channel of the rgb image. Handwritten signature has been used as a watermark and embedded into the host image using different watermarking strengths. Comparison between the DCT and intDCT algorithms is presented. The algorithm's performance is evaluated using attack tools. Experimental results show that this proposed algorithm can survive attacks such as jpeg compression, common signal processing attacks, cropping, and scaling. Keywords: Integer dct, Video Compression Standard , Image Watermarking. 1 INTRODUCTION Digital multimedia has witnessed an extreme growth during the last decade due to the advances of computer technology, efficient storage, ease of manipulation and transmission and growth of high speed internet connection. Unfortunately, this made the work of the pirates and hackers easier, since it enables easy modifications and reproduction of digital files (video, audio and images). Hence, the need to develop counter .
đang nạp các trang xem trước