1. INTRODUCTION
1.1 Digital Image
A digital image is a representation of a two-dimensional image using ones and zeros (binary). Depending on whether or not the image resolution is fixed, it may be of vector or raster type. Without qualifications, the term "digital image" usually refers to raster images also called bitmap images.
Digital images are pictures that have been converted into a computer readable binary format consisting of logical 0s and 1s. Usually, by an image we mean a still picture that does not change with time, where as a video evolves with time and generally contains moving and/or changing objects. This project deals primarily with still images. Digital images are usually obtained by converting continuous signals into digital format, although “direct digital” systems are becoming more prevalent. Likewise, digital images are viewed using diverse display media, included digital printers, computer monitors, and digital projection devices. The frequency with which information is transmitted, stored, processed, and displayed in a digital visual format is increasing rapidly, and as such, the design of engineering methods for efficiently transmitting, maintaining, and even improving the visual integrity of this information is of heightened interest.
1.2 Digital Image Processing
An image may be defined as a two-dimensional function, f(x,y) where x and y are spatial coordinates, and the amplitude of f at any pair of coordinates (x,y) is called the intensity or gray level of the image at that point. When x, y and the amplitude values of f are all finite, discrete quantities, we call the image a digital image. The field of digital image processing refers to processing digital images by means of a digital computer. Note that a digital image is composed of a finite number of elements, each of which has a particular location and value. These elements are referred to as picture elements or image elements or
References: | |Piva., A |Image Processing 10 (5) 783–791, 2001. | |5 |Bas P, J | |and Macq. B |Processing, Vol. 11, No. 9, pp. 1014-1028, 2002. | |6 |Bender .W | |and Morimoto .N |Database, vol. 2420, pp. 164–173, 1995. | |7 |Bender W., et.al |“Techniques for Data Hiding”, In IBM Systems Journal, 1996, Vol | |Daubechies I., et.al |Computational Harmonic Analysis, 1998, Vol. 5, pp.332-369. | |9 |Carlson, A.B., et.al |“Communication Systems” |10 |Celik M, Sharma GM, Tekalp.|“Lossless watermarking for image authentication: a new framework and an | | |A |implementation”, IEEE Trans Image Proc;15(4):1042–9, 2006 | | | |August 4-7, 3, pp. 264–267, 2002. | |13 |Chang C.C | | |images,” J.Systems Software 79, 1754-1766, 2006. | |14 |Chang | |Hwang .M.S |Proceedings – Vision, Image and Signal Processing 149 (1) 43–50, 2002. | |15 |Chang |17 |Chen.L |“VLSI Design of Wavelet Transform: Analysis, Architecture and Design Examples”, Imp. | | | |College press, 2007 |18 |Cheng Yaw Low, Andrew Beng |“Fusion of LSB and DWT Biometric Watermarking for Offline Handwritten Signature”, | | |Jin Teoh |Congress on Image and Signal Processing, pp.702-708, 2008 |19 |Chung-Ming Wang a, Nan-I Wu|“A high quality steganographic method with pixel-value differencing and modulus | | |a, et.al |function,” The Journal of Systems and Software, 2007 |21 |Cox I.J, Linnartz J.P.M.G |“Some general methods for tampering with watermarks”, IEEE J Select Area | | | |Commun;16(4),pp.587–93, 1998 |22 |Cox, I.J, Miller. M.L |“Digital Watermarking”, Morgan Kaufmann Publishers Inc. San Francisco, USA, 2001. | |23 |Craver |24 |Daubechies Ingrid |“Ten Lectures on Wavelets,” Society for Industrial and Applied Mathematics, 1992. | |25 |De Vleeschouwer C., et.al |“Circular Interpretation of Histogram for Reversible Watermarking”, In Proc | | |4th Workshop on Multimedia Signal Processing, pp. 345-350, 2001. | |26 |De Vleeschouwer C., |“Circular Interpretation of Bijective Transformations in Lossless Watermarking for | | |.O.R |pp. 1335-1342, 1979. | |28 |Dougherty E | |Astola |Press, Washington, 1994. | |29 |Dugad.R, Ratakonda .K, and|“A new wavelet-base for water- marking image,” in Proc | |Ahuja .N |vol. 2, pp. 419–423, 1998. | |30 |Fisher J., Gasteratos |“Mathematical morphology operations and structuring elements”, In CVonline: On-Line | | | |Filters, 2001. | |31 |Fridrich J | | |Bifurcation and Chaos, 8(6), pp. 1259-1284, June 1998. | |32 |Fridrich J., Goljan M., |“ 'Invertible Authentication”, In Proc | |and Rui D., |Watermarking of Multimedia Contents III, San Jose, California, USA, Vol. 3971, pp. | | | |197-208, January 2001 | | |California, USA, Vol. 4675, pp. 572-583, January, 2002. | |34 |Fridrich J., Goljan M |36 |Gaurav Bhatnagar, et.al |“DWT-SVD based Dual Watermarking Scheme,” IEEE Trans. pp.526-531, 2008. | |37 |Ghazy | | |Prentice-Hall, 1988. | |39 |Gorodetski |42 |Haralick R. and Shapiro L. |“An Introduction to Nonlinear Image Processing,” Vol.16, SPIE Optical Engineering | | | |Press, Washington, 1994