Digital Image Hiding Using Iterative Blending in Discrete Cosine Transform Domain

2013 ◽  
Vol 318 ◽  
pp. 63-66
Author(s):  
Xin Wang ◽  
Xian Ge Sun

In this paper,the technology about still image copyright protection are analyzed and discussed.We will do the iterative blending calculation of the image using the discrete cosine transform to achieve the hiding of the digital image. In this paper, we show the main idea of the discrete cos transform and the digital image blending at first, then through using the methods of the iterative blending of single image to realize the propose of image hiding. At the same time ,we get the results analysis through the calculation of the pictures ’s PSNR.

2020 ◽  
Vol 10 (11) ◽  
pp. 2588-2599
Author(s):  
Saqib Ali Nawaz ◽  
Jingbing Li ◽  
Uzair Aslam Bhatti ◽  
Anum Mehmood ◽  
Raza Ahmed ◽  
...  

With the advancement of networks and multimedia, digital watermarking technology has received worldwide attention as an effective method of copyright protection. Improving the anti-geometric attack ability of digital watermarking algorithms using image feature-based algorithms have received extensive attention. This paper proposes a novel robust watermarking algorithm based on SURF-DCT perceptual hashing (Speeded Up Robust Features and Discrete Cosine Transform), namely blind watermarking. We design and implement a meaningful binary watermark embedding and extraction algorithm based on the SURF feature descriptor and discrete-cosine transform domain digital image watermarking algorithm. The algorithm firstly uses the affine transformation with a feature matrix and chaotic encryption technology to preprocess the watermark image, enhance the confidentiality of the watermark, and perform block and DCT coefficients extraction on the carrier image, and then uses the positive and negative quantization rules to modify the DCT coefficients. The embedding of the watermark is completed, and the blind extraction of the watermark realized. Correlation values are more than 90% in most of the attacks. It provides better results against different noise attacks and also better performance against rotation. Transparency and high computational efficiency, coupled with dual functions of copyright protection and content authentication, is the advantage of the proposed algorithm.


2014 ◽  
Vol 41 (8Part1) ◽  
pp. 082501 ◽  
Author(s):  
Cheng-Ting Shih ◽  
Jay Wu ◽  
Hsin-Hon Lin ◽  
Shu-Jun Chang ◽  
Keh-Shih Chuang

Sign in / Sign up

Export Citation Format

Share Document