Professional Documents
Culture Documents
y [k ]
and low
are the outputs of the high pass and low pass filters,
respectively after sub sampling by 2. This
decomposition halves the time resolution since only
half the number of samples now characterizes the
entire signal. However, this operation doubles the
frequency resolution, since the frequency band of the
signal now spans only half the previous frequency
band, effectively reducing the uncertainty in the
frequency by half. The above procedure, which is also
known as the sub-band coding can be repeated for
further decomposition. At every level, the filtering
and sub sampling will result in half the number of
samples (and hence half the time resolution) and half
Divya Jyoti College of Engineering & Technology, Modinagar, Ghaziabad (U.P.), India
126
International Journal of Advanced Engineering Research and Technology (IJAERT), ISSN: 23488190
ICRTIET-2014 Conference Proceeding, 30th -31st August 2014
| ( )|
|| d
+
2
i.e., | ( )| =0
This means that wavelets must have a band-pass like
spectrum. This is a very important observation, which
we will use later on to build an efficient wavelet
transform.
A zero at the zero frequency also means that the
average value of the wavelet in the time domain must
be zero.
2
(t )dt 0
And therefore it must be oscillatory. In other words
( s, 0)
1 n ( p)
tp t
[ f (0) ( )dt o(n 1)]
p s
s p 0
t (t )dt,
p
Mp =
Then we can get the finite development
(s,0)
1
f (1) (0)
f (2) (0)
f ( n ) (0)
2
3
n 1
n2
f (0)M 0 s 1 M1s 2 M 2 s ... n M n s 0(s )
s
Divya Jyoti College of Engineering & Technology, Modinagar, Ghaziabad (U.P.), India
127
International Journal of Advanced Engineering Research and Technology (IJAERT), ISSN: 23488190
ICRTIET-2014 Conference Proceeding, 30th -31st August 2014
B2
B3
B4
watermark W: =
.
6. Modify the singular values in each quadrant , k
= 1,2,3,4, withthe singular values of theDiscrete
Cosine
Transformation-transformed
visual
watermark:
= + = 1 where =
1 are thesingular values of , and =
1 are the singular valuesof .
7. Obtain the 4 sets of modified DCT coefficients:
= ,
= 1,2,3,4.
8. Map the modified Discrete Cosine Transformation
coefficients back to their original positions.
9. Apply the inverse Discrete Cosine Transformation
to produce the watermarked cover image.
4.2 Watermark Extraction:
1. Apply the Discrete Cosine Transformations to the
whole watermarked (and possibly attacked) cover
image .
2. Using the zig-zag sequence, map the Discrete
Cosine Transformations coefficients into 4 quadrants:
B1, B2, B3, and B4.
3. Apply Singular Value decomposition to each
quadrant: = , = 1,2,3,4.where k
denotes the attacked quadrants.
4. Extract the singular values from each
quadrant , = 1,2,3,4: =
, = 1, . .
Divya Jyoti College of Engineering & Technology, Modinagar, Ghaziabad (U.P.), India
128
International Journal of Advanced Engineering Research and Technology (IJAERT), ISSN: 23488190
ICRTIET-2014 Conference Proceeding, 30th -31st August 2014
Divya Jyoti College of Engineering & Technology, Modinagar, Ghaziabad (U.P.), India
129
International Journal of Advanced Engineering Research and Technology (IJAERT), ISSN: 23488190
ICRTIET-2014 Conference Proceeding, 30th -31st August 2014
Divya Jyoti College of Engineering & Technology, Modinagar, Ghaziabad (U.P.), India
130
International Journal of Advanced Engineering Research and Technology (IJAERT), ISSN: 23488190
ICRTIET-2014 Conference Proceeding, 30th -31st August 2014
Divya Jyoti College of Engineering & Technology, Modinagar, Ghaziabad (U.P.), India
131