ROBUST WATERMARKING TECHNIQUE USING DIFFERENT WAVELET DECOMPOSITION LEVELS FOR SIGNATURE IMAGE PROTECTION

This paper proposed a non-blind watermarking technique based on different wavelet decomposition levels for biometric image protection. In this technique, a biometric image is used as a watermark instead of a standard image, logo or random noise pattern type watermark. For watermark embedding, the or...

Full description

Bibliographic Details
Main Authors: Rohit Thanki, Ved Vyas Dwivedi, Komal R. Borisagar
Format: Article
Language:English
Published: UUM Press 2017-04-01
Series:Journal of ICT
Online Access:https://www.scienceopen.com/document?vid=e91220f6-d717-47e1-a8dd-7ef2fc1251f4
id doaj-d296c772838446bcbf9eacff1bd7f6bd
record_format Article
spelling doaj-d296c772838446bcbf9eacff1bd7f6bd2021-08-03T00:24:59ZengUUM PressJournal of ICT1675-414X2017-04-0110.32890/jict2017.16.1.8227ROBUST WATERMARKING TECHNIQUE USING DIFFERENT WAVELET DECOMPOSITION LEVELS FOR SIGNATURE IMAGE PROTECTIONRohit ThankiVed Vyas DwivediKomal R. BorisagarThis paper proposed a non-blind watermarking technique based on different wavelet decomposition levels for biometric image protection. In this technique, a biometric image is used as a watermark instead of a standard image, logo or random noise pattern type watermark. For watermark embedding, the original host image and the watermark biometric image are transformed into various levels of wavelet coefficients. The watermark biometric image is embedded into the host image by modifying the values of the wavelet coefficients of the host image using the values of wavelet coefficients of the watermark biometric image. Experimental results demonstrated that the proposed technique was able to withstand various watermarking attacks. The novelty of the proposed technique is that it is used to transform coefficients of the watermark biometric image instead of the Pseudo Noise sequences or any other feature extraction technique.  https://www.scienceopen.com/document?vid=e91220f6-d717-47e1-a8dd-7ef2fc1251f4
collection DOAJ
language English
format Article
sources DOAJ
author Rohit Thanki
Ved Vyas Dwivedi
Komal R. Borisagar
spellingShingle Rohit Thanki
Ved Vyas Dwivedi
Komal R. Borisagar
ROBUST WATERMARKING TECHNIQUE USING DIFFERENT WAVELET DECOMPOSITION LEVELS FOR SIGNATURE IMAGE PROTECTION
Journal of ICT
author_facet Rohit Thanki
Ved Vyas Dwivedi
Komal R. Borisagar
author_sort Rohit Thanki
title ROBUST WATERMARKING TECHNIQUE USING DIFFERENT WAVELET DECOMPOSITION LEVELS FOR SIGNATURE IMAGE PROTECTION
title_short ROBUST WATERMARKING TECHNIQUE USING DIFFERENT WAVELET DECOMPOSITION LEVELS FOR SIGNATURE IMAGE PROTECTION
title_full ROBUST WATERMARKING TECHNIQUE USING DIFFERENT WAVELET DECOMPOSITION LEVELS FOR SIGNATURE IMAGE PROTECTION
title_fullStr ROBUST WATERMARKING TECHNIQUE USING DIFFERENT WAVELET DECOMPOSITION LEVELS FOR SIGNATURE IMAGE PROTECTION
title_full_unstemmed ROBUST WATERMARKING TECHNIQUE USING DIFFERENT WAVELET DECOMPOSITION LEVELS FOR SIGNATURE IMAGE PROTECTION
title_sort robust watermarking technique using different wavelet decomposition levels for signature image protection
publisher UUM Press
series Journal of ICT
issn 1675-414X
publishDate 2017-04-01
description This paper proposed a non-blind watermarking technique based on different wavelet decomposition levels for biometric image protection. In this technique, a biometric image is used as a watermark instead of a standard image, logo or random noise pattern type watermark. For watermark embedding, the original host image and the watermark biometric image are transformed into various levels of wavelet coefficients. The watermark biometric image is embedded into the host image by modifying the values of the wavelet coefficients of the host image using the values of wavelet coefficients of the watermark biometric image. Experimental results demonstrated that the proposed technique was able to withstand various watermarking attacks. The novelty of the proposed technique is that it is used to transform coefficients of the watermark biometric image instead of the Pseudo Noise sequences or any other feature extraction technique.  
url https://www.scienceopen.com/document?vid=e91220f6-d717-47e1-a8dd-7ef2fc1251f4
work_keys_str_mv AT rohitthanki robustwatermarkingtechniqueusingdifferentwaveletdecompositionlevelsforsignatureimageprotection
AT vedvyasdwivedi robustwatermarkingtechniqueusingdifferentwaveletdecompositionlevelsforsignatureimageprotection
AT komalrborisagar robustwatermarkingtechniqueusingdifferentwaveletdecompositionlevelsforsignatureimageprotection
_version_ 1721224994417016832