z-logo
open-access-imgOpen Access
WATERMARK TECHNIQUE FOR AUTHENTICATION OF VISIBLY WATERMARK IMAGES
Author(s) -
Md. Imtaiyaz Hassan
Publication year - 2021
Publication title -
magallaẗ kulliyyaẗ al-rāfidayn al-ǧāmi'aẗ al-'ulūm/maǧallaẗ kulliyyaẗ al-rāfidayn al-ǧāmiʻaẗ li-l-ʻulūm
Language(s) - English
Resource type - Journals
eISSN - 2790-2293
pISSN - 1681-6870
DOI - 10.55562/jrucs.v25i2.447
Subject(s) - watermark , digital watermarking , computer science , authentication (law) , object (grammar) , computer vision , artificial intelligence , process (computing) , computer security , image (mathematics) , operating system
With the rapid spread of computer networks and the wide use of multimedia technologies, many watermarking techniques are now under development and investigation for protecting owner's intellectual rights. Watermarks can be divided into two types, visible and invisible watermarks, physical visible watermarks have been used for centuries. Now days it is used in digital library, in video broad casting, and other multimedia services. The visible watermark may face several problems. Among these problems, watermark removal and unauthorized insertion are two main concern. This paper proposes a method of invisible watermark to overcome these problems. The watermarking process based on hiding a selected watermark object, that holds a little a mount of information relative to the source object, inside the cover image which has to be authenticated. The processes are based on using invisible watermarks to protect visibly watermarked images which are done by using different techniques. The experiments have shown that the proposed algorithm can provide a very effective protection for watermarked images.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here