Comparison of Discrete Cosine Transforms (DCT), Discrete Fourier Transforms (DFT), and Discrete Wavelet Transforms (DWT) in Digital Image Watermarking
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 2
Abstract
Digital Image Watermarking is used recently to secure the image by embedding another digital image. It is typically used to identify ownership of the copyright of the signal. Frequency domain transformation methods used widely in Digital Image Compression and Digital Image Watermarking. They reduce the weakness of classics digital image watermarking such as Least Significant Bit (LSB) methods which is more noise-tolerant. Popular transformation method used are Two Dimensional Discrete Cosine Transform (2D DCT), Two Dimensional Discrete Fourier Transforms (2D DFT), and Two Dimensional Discrete Wavelet Transform (2D DWT). This paper will show the comparison result of those three transformation method. The experiments are comparison analysis of image watermark quality using Peak Signal to Noise Ratio (PSNR), color converting, image resizing, image optical scanning and the noise-tolerant of the image watermarked by giving Gaussian noise.
Authors and Affiliations
Rosa A Asmara, Reza Agustina, Hidayatulloh Hidayatulloh
Ranking XP Prioritization Methods based on the ANP
The analytic network process (ANP) is considered one of the most powerful tools to facilitate decision-making in complex environments. The ANP allows decision makers to structure their problems mathematically using a ser...
A 7-Layered E-Government Framework Consolidating Technical, Social and Managerial Aspects
E-Government has been hype for the last 2 decades and still several implementations do not reach the intended success. Different definitions and consequently different models of operations and assessment were developed....
Implementation of Binary Search Trees Via Smart Pointers
Study of binary trees has prominent place in the training course of DSA (Data Structures and Algorithms). Their implementation in C++ however is traditionally difficult for students. To a large extent these difficulties...
SaaS Level based Middleware Database Integrator Platform
In purpose of data searching acceleration, the fastest data response is the major concern for latest cloud environment. Regarding this, the intellectual decision is to enrich the SaaS level applications. Amongst the SaaS...
Design, Release, Update, Repeat: The Basic Process of a Security Protocol’s Evolution
Companies, businesses, colleges, etc. throughout the world use computer networks and telecommunications to run their operations. The convenience, information-gathering, and organizational abilities provided by computer n...