Comparative Analysis of Normalization based Image Watermarking Techniques

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparative Analysis of Normalization based Image Watermarking Techniques

This paper presents a comparative study of watermarking schemes. The embedding of watermark is performed after the image normalization. By normalization process the normalized image achieves invariance properties against geometric attacks which include rotation, scaling and translation of an image. Watermarking is done using five methods DCT Zigzag, DCT blocks, DWT, Zernike transform, SVD-DCT. ...

متن کامل

Digital Image Watermarking Techniques: A Comparative Study

Digital watermarking plays an increasingly important role for proving authenticity and copyright protection. The Internet is an ideal medium for selling digital goods it also makes redistribution of pirated files very easy. Digital watermarking can be used to insert invisible data into an object helping to track down pirate copies and to prove rightful ownership in a dispute. In this paper we p...

متن کامل

Illumination Normalization using Quotient Image-based Techniques

This chapter focuses on correctly recognizing faces in the presence of large illumination variation. Our aim is to do this by synthesizing an illumination normalized image using Quotient Image-based techniques (Shashua et al., 2001, Wang et al., 2004, Chen et al., 2005, Nishiyama et al., 2006, Zhang et al., 2007, and An et al., 2008). These techniques extract an illumination invariant represent...

متن کامل

Affine transformation resistant watermarking based on image normalization

Geometric attacks are among the most challenging problems in present day watermarking. Such attacks are very simple to implement yet they can defeat most of the existing watermarking algorithms without causing serious perceptual image distortion. In this paper we propose a new public watermarking algorithm, which is robust to such attacks. This algorithm uses a normalized with respect to affine...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2011

ISSN: 0975-8887

DOI: 10.5120/3279-4461