Blog
About

1
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      ROBUST WATERMARKING TECHNIQUE USING DIFFERENT WAVELET DECOMPOSITION LEVELS FOR SIGNATURE IMAGE PROTECTION

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          This paper proposed a non-blind watermarking technique based on different wavelet decomposition levels for biometric image protection. In this technique, a biometric image is used as a watermark instead of a standard image, logo or random noise pattern type watermark. For watermark embedding, the original host image and the watermark biometric image are transformed into various levels of wavelet coefficients. The watermark biometric image is embedded into the host image by modifying the values of the wavelet coefficients of the host image using the values of wavelet coefficients of the watermark biometric image. Experimental results demonstrated that the proposed technique was able to withstand various watermarking attacks. The novelty of the proposed technique is that it is used to transform coefficients of the watermark biometric image instead of the Pseudo Noise sequences or any other feature extraction technique.  

          Related collections

          Author and article information

          Contributors
          India
          India
          India
          Journal
          Journal of Information and Communication Technology
          UUM Press
          May 31 2017
          : 16
          : 157-174
          Affiliations
          [1 ]Faculty of Technology & Engineering Chimanlal Ujamshibhai Shah University, Gujarat, India
          Article
          8227
          10.32890/jict2017.16.1.8227

          All content is freely available without charge to users or their institutions. Users are allowed to read, download, copy, distribute, print, search, or link to the full texts of the articles in this journal without asking prior permission of the publisher or the author. Articles published in the journal are distributed under a http://creativecommons.org/licenses/by/4.0/.

          Comments

          Comment on this article