Section 2 presents the proposed watermarking method that consists of watermark embedding and decoding.
Our proposed watermarking method foucus on two stages: embedding and detection.
Bhat, "A Simple Robust Digital Image Watermarking against Salt and Pepper Noise using Repetition Codes," International Journal on Signal & Image Processing, vol.
Arya, "A survey of frequency and wavelet domain digital watermarking techniques," International Journal of Scientific & Engineering Research, vol.
Figure 3(a) shows the original host MRI image of size 348x314 for watermarking. The chaotic maps used are the logistic map given in (1) with initial conditions x(0) = 0.25, r = 3.58 and x(0) = 0.56, r = 3.57 respectively at embedding side and chaotic watermark pattern of size 55x55 is considered for experiment.
This is another figure of merit of the digital image watermarking. It is a measure of perceptual level of the watermarked image.
The proposed watermarking
scheme effectively embeds both the watermarks into original image and then extracts both the watermarks from the watermarked image.
In , Hasan and Hassan proposed a robust self-embedding watermarking
scheme for self-correction and a fragile watermarking
scheme for sensitive authentication.
The digital watermarking
algorithms based on the type of host medium are divided into image watermarking
, video watermarking
, audio watermarking
and text watermarking
Though using SVDs gives satisfactory results in respect of robustness, but it is inefficient to provide security (the property of a watermarking
scheme to nullify the chances of watermark extraction completely, is referred as security [2, 7]).
Both watermark insertion techniques and watermarking
protocols determine the security level that a web system can achieve in implementing the copyright protection of digital content.
The LSB watermark is considered the simplest form of watermarking