International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 75 - Issue 18 |
Published: August 2013 |
Authors: Harshita Rawat, Ashwani Kumar Satendra Kumar |
![]() |
Harshita Rawat, Ashwani Kumar Satendra Kumar . Robust Digital Image Watermarking Scheme for Copyright Protection. International Journal of Computer Applications. 75, 18 (August 2013), 27-32. DOI=10.5120/13349-0617
@article{ 10.5120/13349-0617, author = { Harshita Rawat,Ashwani Kumar Satendra Kumar }, title = { Robust Digital Image Watermarking Scheme for Copyright Protection }, journal = { International Journal of Computer Applications }, year = { 2013 }, volume = { 75 }, number = { 18 }, pages = { 27-32 }, doi = { 10.5120/13349-0617 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2013 %A Harshita Rawat %A Ashwani Kumar Satendra Kumar %T Robust Digital Image Watermarking Scheme for Copyright Protection%T %J International Journal of Computer Applications %V 75 %N 18 %P 27-32 %R 10.5120/13349-0617 %I Foundation of Computer Science (FCS), NY, USA
As the popularity of digital media is growing, and world is becoming smaller, all due to the internet connectivity and WWW phenomena, the copyright protection of intellectual properties have become a necessity for prevention of illegal copying and content integrity verification. Digital watermarking is a technique of embedding some information (usually hidden copyright notices) into an image. The proposed approach a Robust Digital image watermarking algorithm using two levels discrete wavelet transform with Singular value decomposition. Second level DWT is performed on HL sub-band. One of the main contributions of the proposed technique is in decomposing the host image. Primarily the proposed technique aims to improve the robustness of the other watermarking techniques and keeps the watermarked image imperceptible. To increase and control the strength of the watermark, we used a scale factor. Experimental results clearly show that this proposed scheme is quite resilient to various image processing attacks.