Professional Documents
Culture Documents
Authorized licensed use limited to: Kumaraguru College of Technology. Downloaded on March 08,2010 at 11:08:07 EST from IEEE Xplore. Restrictions apply.
I(rls)(z>Y) + a ( T ( z , y )* X(Z,Y))
I("S)"(Z, y) = if I ( ~ , ~ y)) (>
z ,~ ( zy)/4
, SPIHT PSNR Watermark detector
I('>')(x,y) otherwise response
(1)
where I('J)(x, y ) is the coefficient value of the decomposition I at
level r, orientation s, and position x,y within that subband. I(',,?)*
0.05 38.99 I 3.25
is its corresponding watermarked coefficient and a is a scaling fac-
I I
I I
tor. Finally, we obtain the watermarked image by performing the 0.5 44.60 37.34
inverse DWT. 1.o I 47.33 I 78.62
2
Y
30
for images and video: A unified approach', IEEE Trans. Circuits
Syst. Video Technol., 1998, 9, pp. 545-550
k 20
c COX, J., et a/.: 'Secure spread spectrum watermarking for
10 multimedia', IEEE Trans. Image Process., 1997, 6, pp. 1673-1687
n XIA, x.G., BONCELET, c.G., and ARCE, G.R.: 'A multiresolution
0 10 20 30 40 watermark for digital images'. IEEE ICIP, July 1997, Vol. 1, pp.
JPEG quality factor
548-55 1
LEWIS, AS., and KNOWLES, G.: 'Image compression using the 2-D
Authorized licensed use limited to: Kumaraguru College of Technology. Downloaded on March 08,2010 at 11:08:07 EST from IEEE Xplore. Restrictions apply.