Professional Documents
Culture Documents
Abstract
The WWW (World Wide Web) is a superb sales and distribution medium for digital image assets, but official document
compliance and important data can be a call to prove or justify it. Present days, digital image, audio and video used all over
world with or without agreement. In digital image watermarking answer let you add extra layer of protection (added logo) to
your digital image. By using Singular Value Decomposition - Discrete Cosine Transfer we are finding Normalization Cross
Correlation coefficient value of attacking (rotational attack) on digital image watermarking. The Normalization Cross
Correlation coefficient value depended on step size of digital image. If you change the value of step size than our results are
different.
2N
x 0
For u= 0,1,2.,N-1.
2
1
W (u )
for u 0;
for u 0
N
N
When u 0, C (0)
N 1
f ( x) .
This is called DC
x 0
2N
u 0
1
N
2
N
2N
x 0 y 0
_______________________________________________________________________________________
Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org
260
2N
2N
x 0 y 0
g A F A
where the symmetric transformation of matrix A is specified
as
5
5
26
5
=
18
7
1 5
7 1
26
18
18
74
=2 100 + 1600
= 20 80
Det =
18
74
Eigen values of ,
N 1
(2 j 1)i
ai , j W ( j ) cos
2N
j 0
F A1 T A1
T
T
= A T A
5
1
1 =
6
18
18
54
10
1
10
54
18
Similarly, 80 =
2 =
18
6
10
3
10
10
1
10
3
10
10
Therefore, =
.................. (i)
20
0
2 5
=
0
80
0
. (ii)
=
Therefore
0
4 5
3
=
5
1
5
7
10
1
10
1
10
= 2 5
3
0
10
0
4 5
_______________________________________________________________________________________
Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org
261
2
1
2
1
... (iii)
x3 = x3 + (w * W_h_r)
y3 = y3 + (w * w)
P3 = (x3/y3)
Where x3 = 0; initially
y3 = 0; initially
P3 = correlation coefficient
w = original watermark
W_h_r = watermark extracted from rotated image
The value of correlation coefficient found in this case of
rotated back is p1 = 0.6779 for step size of 15. the
correlation value is less which shows that the watermarking
scheme is not more robust for rotating attack also.
_______________________________________________________________________________________
Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org
262
REFERENCES
[1].
Andreja
SamcovicJan
Turan,,Attacks
On
Digitalwavelet
Imagewatermarks,Journal
of
ElectricalEngineering, Vol. 59,
No. 3, 2008, 131138.
[2]. Carla D. Martin and Mason A. Porter,The Extraordinary
SVD, The Mathematical Association Of America, December
2012, pp.838-851.
[3]. Cox, I. J. Kilian, J., Leighton, T., and Shamoon, T.,
Secure spread spectrumwatermarking for images, audio,
and video. Proceedings of the 1996 IEEEInternational
Conference on Image Processing, 1996, 3, pp. 243256.
BIOGRAPHIES
He received M. Tech and B. Tech.
Currently, he is working as an Assistant
Professor
in
Computer
Science
Department at MVN University, Palwal.
His areas of interest include Operating
System, Computer Network and Object
Oriented Programming, Digital Image
Processing.
Komal Goyal received the M.Sc.
degree in Mathematics in 2010. She is
pursuing
Ph.D.
from
Jaypee
University, Noida. She is working as
an Assistant Professor in a reputed
University. She is mainly indulged in
research of Fixed point theory and
fractals. She has published two research papers in
international Journals.
_______________________________________________________________________________________
Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org
263
_______________________________________________________________________________________
Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org
264