Imperceptible and secure image watermarking using DCT and random spread technique

[...]in this study we combine DCT, Beaufort cipher, to improve safety and robustness, Beaufort key that is generated with random function is also used as a substitute of PN sequence to improve imperceptibility. 2.Research Method 2.1.Discrete Cosine Transform (DCT) DCT is a very popular transformatio...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Telkomnika 2019-08, Vol.17 (4), p.1750-1757
Hauptverfasser: Rachmawanto, Eko Hari, Setiadi, De Rosal Ignatius Moses, Sari, Christy Atika, Rijati, Nova
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:[...]in this study we combine DCT, Beaufort cipher, to improve safety and robustness, Beaufort key that is generated with random function is also used as a substitute of PN sequence to improve imperceptibility. 2.Research Method 2.1.Discrete Cosine Transform (DCT) DCT is a very popular transformation and widely applied in the various science of digital image processing. (11) This study also measured the computational performance of the proposed algorithm using tic toc function in Matlab to find out the time required to perform the watermarking process. 3.Results and Analysis The image dataset used in this research are grayscale images with size 512·512 which can be downloaded at http://sipi.usc.edu/database/ [25]. A secure image watermarking using Chinese remainder theorem based on haar wavelet transform. in International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), Semarang, 2017. An Anti-JPEG Compression Digital Watermarking Technology with an Ability in Detecting Forgery Region for Color Images. in International Conference on Computer Distributed Control and Intelligent Environmental Monitoring (CDCIEM), Hunan, 2012.
ISSN:1693-6930
2302-9293
DOI:10.12928/telkomnika.v17i4.9227