Digital image watermarking by using intermediate significant bits in gray scale images

The rapid growths of the computer technologies have been increased over the last half century in terms of amount and complexity of data. Also, access to the data has become much easier due to rapid growth of the networks such as Internet. Furthermore, most of the people use image to represent inform...

Full description

Bibliographic Details
Main Author: Sharifara, Ali (Author)
Format: Thesis
Published: 2012.
Subjects:
Online Access:Get fulltext
LEADER 02013 am a22001573u 4500
001 29528
042 |a dc 
100 1 0 |a Sharifara, Ali  |e author 
245 0 0 |a Digital image watermarking by using intermediate significant bits in gray scale images 
260 |c 2012. 
520 |a The rapid growths of the computer technologies have been increased over the last half century in terms of amount and complexity of data. Also, access to the data has become much easier due to rapid growth of the networks such as Internet. Furthermore, most of the people use image to represent information and it is transferred throughout the internet. Digital watermarking techniques are used to protect the copyrights of multimedia data by embedding secret information inside them, for example, embedding in images, audios, or videos. Digital Image watermarking also has been used to detect original images against forged images by embedding an evidence of the owner of image. Digital Image watermarking can be categorized into two domains namely; spatial, and frequency domains. The former has been chosen for the current research and some remaining problems have been studied such as imperceptibility, security, and robustness of watermarked image. A repeated method is proposed to solve the problem of robustness, and a Zig-zag algorithm is also recommended to change the order of embedding in watermarked image. Furthermore, the proposed method aims to embed watermark in different bit planes of host image which can improve both the visual quality and robustness. To evaluate the proposed technique, some attacks have been applied for the approach and the experimental results have shown that the proposed technique successfully withstood against most of the attacks, and at the same time preserved the watermarked image quality. 
546 |a en 
650 0 4 |a QA76 Computer software 
655 7 |a Thesis 
787 0 |n http://eprints.utm.my/id/eprint/29528/ 
856 |z Get fulltext  |u http://eprints.utm.my/id/eprint/29528/5/AliSharifaraMFSKSM2012.pdf