{"title":"M-band Wavelet and Cosine Transform Based Watermark Algorithm Using Randomization and Principal Component Analysis","authors":"Tong Liu, Xuan Xu, Xiaodi Wang","volume":71,"journal":"International Journal of Computer and Information Engineering","pagesStart":1517,"pagesEnd":1521,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/15433","abstract":"
Computational techniques derived from digital image processing are playing a significant role in the security and digital copyrights of multimedia and visual arts. This technology has the effect within the domain of computers. This research presents discrete M-band wavelet transform (MWT) and cosine transform (DCT) based watermarking algorithm by incorporating the principal component analysis (PCA). The proposed algorithm is expected to achieve higher perceptual transparency. Specifically, the developed watermarking scheme can successfully resist common signal processing, such as geometric distortions, and Gaussian noise. In addition, the proposed algorithm can be parameterized, thus resulting in more security. To meet these requirements, the image is transformed by a combination of MWT & DCT. In order to improve the security further, we randomize the watermark image to create three code books. During the watermark embedding, PCA is applied to the coefficients in approximation sub-band. Finally, first few component bands represent an excellent domain for inserting the watermark.<\/p>\r\n","references":"[1] K. R. Rao and P. Yip, Discrete Cosine Transform: Algorithms,\r\nAdvantages, Applications. San Diego, CA: Academic Press, 1990.\r\n[2] J.S. Walker, A primer on wavelets and their scientific applications. Boca\r\nRaton, FL: Chapman & Hall\/CRC, 2008.\r\n[3] Theory of regular m-band wavelet bases\u000f\u00b4IEEE Trans. Signal Processing, Vol. 41,\r\npp. 3497-3511, Dec. 1993.\r\n[4] A.K. Mostafa, A.S. Tolba,,F.M. Abdelkader, and H.0\u0011(OKLQG\u000f\u00b39LGHR\r\nWatermarking Scheme Based on Principal Component Analysis and\r\nwavelet transform\u000f\u00b4Int. J. of Computer Science and Network Security,\r\nVol.9, pp. 45-52, Aug. 2009.\r\n[5] \"A Multi-band Wavelet Watermarking Scheme\u00b4Int. J. of Network Security, Vol.6, pp. 121-126, Mar. 2008.\r\n[6] D. Cotting, T. Weyrich, M. Pauly, and M. Gross\u000f \"Robust watermarking\r\nof point-sampled geometry\" LQProc. SMI Conf., pp. 233-242, June\r\n2004.\r\n[7] I.J. Cox, J. Kilian, F. T. Leigton, and T. Shamoon, \" Secure spectrum\r\nwatermarking for multimedia,\" IEEE Trans .Image Processing,Vol.6,\r\npp. 1673-1687, Dec. 1997. \r\n[8] watermarking for\r\nimage and video\u000f\u00b4 IEEE Trans. Circuits and Systems for Video\r\nTechnology, Vol.9, pp. 545-550, June 1999. \r\n[9] H. Nikmehr, S.T. Hashemy, \"A new approach to audio watermarking\r\nusing discrete wavelet and cosine transforms,\" In Proc. 1st Int. Conf. on \r\nCommunications Engineering, pp. 1-10, Dec. 2010.\r\n[10] Performance analysis of digital image\r\nwatermarking using discrete wavelet transform, discrete cosine\r\ntransform and singular value decomposition based on PSNR and NC\" in \r\n2012 Proc. Int. Conf. on Computing and Control Engineering,\r\nICCCECS730, April 2012\r\n[11] Block based video watermarking scheme using wavelet transform and principle component\r\nanalysis\"\u00b4Int. J. of Computer Science, Vol. 9, Issue 1, pp. 296-301, Jan.\r\n2012. \r\n[12] \"Principal component analysis of spectral\r\ncoefficients for mesh watermarking\u000f\u00b4 In Proc15th IEEE Int. Conf. on\r\nImage Processing, pp. 441-444, Oct. 2008.","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 71, 2012"}