Improving the Security of Digital Images in Hadamard Transform Domain Using Digital Watermarking

Improving the Security of Digital Images in Hadamard Transform Domain Using Digital Watermarking

V. Santhi (VIT University, India) and D. P. Acharjya (VIT University, India)
DOI: 10.4018/978-1-4666-9426-2.ch009
OnDemand PDF Download:
No Current Special Offers


In recent days, due to the advancement in technology there are increasing numbers of threats to multimedia data which are floating around in the Internet especially in the form of image data. Many methods exist to provide security for digital images but transform domain based digital watermarking could be considered as a promising method. Many transformation techniques are used to insert watermark in cover data, but this chapter deals with watermarking approaches in Hadamard transform domain. In traditional watermarking approaches the scaling parameter is empirically considered for inserting watermark but to maintain the quality of underlying cover images it needs to be calculated based on the content of the cover images. In order to make the watermarking algorithm completely automated the embedding and scaling parameters are calculated using the content of cover images. Many methods are existing for calculating scaling parameter adaptively but this chapter discusses various approaches using computational intelligence to arrive at optimum value of scaling and embedding parameters.
Chapter Preview

Review Of Visible Watermarking Schemes

According to human perception watermarking fall into two categories: visible and invisible. Visible watermarking is predominantly used to identify the ownership and protect copyrights of digital images. It also prevents unauthorized use of copyrighted images as stated in Yeung et al (1997)’s work. Visible watermarking could be classified into two types namely reversible and irreversible watermarking. In reversible watermarking (Yang et al., 2009), the original signal is recovered after the removal of watermark but in irreversible watermark (Braudaway et al. 1996) the original signal could not be recovered after the removal of watermark.

Complete Chapter List

Search this Book: