Robust Digital Image Watermarking Technique in DWT domain based on HVS and BPNN
-
Upload
cscjournals -
Category
Education
-
view
101 -
download
0
Transcript of Robust Digital Image Watermarking Technique in DWT domain based on HVS and BPNN
![Page 1: Robust Digital Image Watermarking Technique in DWT domain based on HVS and BPNN](https://reader031.fdocuments.us/reader031/viewer/2022030213/589bbe581a28ab082b8b5187/html5/thumbnails/1.jpg)
Robust Digital Image Watermarking Technique in DWT domain based on HVS and BPNN
B.Jagadeesh [email protected] Professor E.C.E.Department G.V.P.College of Engineering (Autonomous) Visakhapatnam, AP, India.
P.Rajesh Kumar [email protected], E.C.E.Department Andhra University Visakhapatnam, AP, India.
P.Chenna Reddy [email protected], C.S.E.Department JNTUA College of Engineering, Pulivendula Kadapa, AP, India.
Abstract
Keywords:
1. INTRODUCTION
![Page 2: Robust Digital Image Watermarking Technique in DWT domain based on HVS and BPNN](https://reader031.fdocuments.us/reader031/viewer/2022030213/589bbe581a28ab082b8b5187/html5/thumbnails/2.jpg)
2. PRELIMINARIES
2.1 Discrete Wavelet Transformation (DWT)
![Page 3: Robust Digital Image Watermarking Technique in DWT domain based on HVS and BPNN](https://reader031.fdocuments.us/reader031/viewer/2022030213/589bbe581a28ab082b8b5187/html5/thumbnails/3.jpg)
FIGURE 1:
2.2 Back Propagation Neural Network (BPNN)
FIGURE 2:
![Page 4: Robust Digital Image Watermarking Technique in DWT domain based on HVS and BPNN](https://reader031.fdocuments.us/reader031/viewer/2022030213/589bbe581a28ab082b8b5187/html5/thumbnails/4.jpg)
3. THE PROPOSED METHOD
3.1 Watermark Embedding
3.2 Watermark Extraction
![Page 5: Robust Digital Image Watermarking Technique in DWT domain based on HVS and BPNN](https://reader031.fdocuments.us/reader031/viewer/2022030213/589bbe581a28ab082b8b5187/html5/thumbnails/5.jpg)
’
4. EXPERIMENTAL RESULTS
FIGURE 3:
FIGURE 4:
FIGURE 5:
![Page 6: Robust Digital Image Watermarking Technique in DWT domain based on HVS and BPNN](https://reader031.fdocuments.us/reader031/viewer/2022030213/589bbe581a28ab082b8b5187/html5/thumbnails/6.jpg)
Type of Attack
Qiao Baoming et al. [16] method
Proposed method
PSNR in dB NCC
PSNR in dB NCC
TABLE 1:
Type of Attack
Qiao Baoming et al.[16] method
Proposed method
PSNR in dB NCC
PSNR in dB
NCC
![Page 7: Robust Digital Image Watermarking Technique in DWT domain based on HVS and BPNN](https://reader031.fdocuments.us/reader031/viewer/2022030213/589bbe581a28ab082b8b5187/html5/thumbnails/7.jpg)
TABLE 2:
Type of Attack
Qiao Baoming et al. [16] method Proposed method
PSNR in dB NCC PSNR in dB
NCC
TABLE 3:
Type of attack
Watermarked image Type
Lena Peppers Mandrill
![Page 8: Robust Digital Image Watermarking Technique in DWT domain based on HVS and BPNN](https://reader031.fdocuments.us/reader031/viewer/2022030213/589bbe581a28ab082b8b5187/html5/thumbnails/8.jpg)
TABLE 4:
0
10
20
30
40
50
60
Lena Peppers Mandrill
PSN
R
Type of Image
Qiao Baoming et al. [16 ] Proposed
FIGURE 6:
![Page 9: Robust Digital Image Watermarking Technique in DWT domain based on HVS and BPNN](https://reader031.fdocuments.us/reader031/viewer/2022030213/589bbe581a28ab082b8b5187/html5/thumbnails/9.jpg)
FIGURE 7:
FIGURE 8:
FIGURE 9:
![Page 10: Robust Digital Image Watermarking Technique in DWT domain based on HVS and BPNN](https://reader031.fdocuments.us/reader031/viewer/2022030213/589bbe581a28ab082b8b5187/html5/thumbnails/10.jpg)
5. CONCLUSIONS
6. REFERENCES