Hybrid intelligent watermark System
As a result of the development in data transfer technology a cross multimedia and internet, it has became possible to access and copy these information in unauthentical manner . This leads to penetrate digital multimedia security problem. In this research a hybrid method is designed to protect produ...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | Arabic |
Published: |
Mosul University
2010-12-01
|
Series: | Al-Rafidain Journal of Computer Sciences and Mathematics |
Subjects: | |
Online Access: | https://csmj.mosuljournals.com/article_163902_b35a4be3e4bff6837040e8a38f379423.pdf |
id |
doaj-3752339a5d734faca67ddf8e7b9e8fed |
---|---|
record_format |
Article |
spelling |
doaj-3752339a5d734faca67ddf8e7b9e8fed2020-11-25T04:08:21ZaraMosul UniversityAl-Rafidain Journal of Computer Sciences and Mathematics 1815-48162311-79902010-12-017212513810.33899/csmj.2010.163902163902Hybrid intelligent watermark SystemFardos Abdalkader0Shahbaa Khaleel1Nada Saleem2College of Computer Sciences and Mathematics\ University of Mosul, IraqCollege of Computer Sciences and Mathematics University of MosulCollege of Computer Sciences and Mathematics University of Mosul, Mosul, IraqAs a result of the development in data transfer technology a cross multimedia and internet, it has became possible to access and copy these information in unauthentical manner . This leads to penetrate digital multimedia security problem. In this research a hybrid method is designed to protect product from unauthentication access using watermark technique with digital images, these images represent the important part in information systems and many applications. The method indicates hiding the watermark in both spatial and frequency domains using Artificial Intelligent techniques, such as neural networks and genetic algorithms by dividing the watermark depending on the important information contents. The basic important part hides in frequency domain and the second part in spatial domain using <em>Discreet Cosine Transform DCT</em> and <em>Least Significant Bit LSB</em>. The method efficiency is measured using <em>Peak Signal –to-Noise Ratio</em><em> PSNR</em> and <em>Normalized Correlation Coefficient</em> <em>NC</em> , Also many attacks is used to measured the watermark robustness and feasibility.https://csmj.mosuljournals.com/article_163902_b35a4be3e4bff6837040e8a38f379423.pdfwatermark techniqueartificial intelligent techniquesdct |
collection |
DOAJ |
language |
Arabic |
format |
Article |
sources |
DOAJ |
author |
Fardos Abdalkader Shahbaa Khaleel Nada Saleem |
spellingShingle |
Fardos Abdalkader Shahbaa Khaleel Nada Saleem Hybrid intelligent watermark System Al-Rafidain Journal of Computer Sciences and Mathematics watermark technique artificial intelligent techniques dct |
author_facet |
Fardos Abdalkader Shahbaa Khaleel Nada Saleem |
author_sort |
Fardos Abdalkader |
title |
Hybrid intelligent watermark System |
title_short |
Hybrid intelligent watermark System |
title_full |
Hybrid intelligent watermark System |
title_fullStr |
Hybrid intelligent watermark System |
title_full_unstemmed |
Hybrid intelligent watermark System |
title_sort |
hybrid intelligent watermark system |
publisher |
Mosul University |
series |
Al-Rafidain Journal of Computer Sciences and Mathematics |
issn |
1815-4816 2311-7990 |
publishDate |
2010-12-01 |
description |
As a result of the development in data transfer technology a cross multimedia and internet, it has became possible to access and copy these information in unauthentical manner . This leads to penetrate digital multimedia security problem.
In this research a hybrid method is designed to protect product from unauthentication access using watermark technique with digital images, these images represent the important part in information systems and many applications. The method indicates hiding the watermark in both spatial and frequency domains using Artificial Intelligent techniques, such as neural networks and genetic algorithms by dividing the watermark depending on the important information contents. The basic important part hides in frequency domain and the second part in spatial domain using <em>Discreet Cosine Transform DCT</em> and <em>Least Significant Bit LSB</em>.
The method efficiency is measured using <em>Peak Signal –to-Noise Ratio</em><em> PSNR</em> and <em>Normalized Correlation Coefficient</em> <em>NC</em> , Also many attacks is used to measured the watermark robustness and feasibility. |
topic |
watermark technique artificial intelligent techniques dct |
url |
https://csmj.mosuljournals.com/article_163902_b35a4be3e4bff6837040e8a38f379423.pdf |
work_keys_str_mv |
AT fardosabdalkader hybridintelligentwatermarksystem AT shahbaakhaleel hybridintelligentwatermarksystem AT nadasaleem hybridintelligentwatermarksystem |
_version_ |
1724426286225424384 |