Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2017, Article ID 3509258, 10 pages
https://doi.org/10.1155/2017/3509258
Research Article

An Efficient Image Watermarking Method Based on Fast Discrete Cosine Transform Algorithm

1Department of Computer Science and Information Engineering, Chang Jung Christian University, Tainan City 701, Taiwan
2Asian Institute of Telesurgery, Changhua County 500, Taiwan
3Department of Aeronautics and Astronautics, National Cheng Kung University, Tainan City 701, Taiwan

Correspondence should be addressed to S. E. Tsai; wt.ude.ucjc.liam@naes

Received 15 February 2017; Revised 24 May 2017; Accepted 21 June 2017; Published 16 August 2017

Academic Editor: Raffaele Solimene

Copyright © 2017 S. E. Tsai et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Koz and A. A. Alatan, “Oblivious spatio-temporal watermarking of digital video by exploiting the human visual system,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, no. 3, pp. 326–337, 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. A. Kaur, R. Dhir, and G. Sikka, “A new image steganography based on first component alteration technique,” International Journal of Computer Science and Information Security, vol. 6, no. 3, pp. 53–56, 2009. View at Google Scholar
  3. A. Agarwal, “Security enhancement scheme for image steganography using S-DES technique,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, pp. 164–169, 2012. View at Google Scholar
  4. V. Tyagi, A. Kumar, R. Patel, S. Tyagi, and S. S. Gangwar, “Image steganography using least significant bit with cryptography,” Journal of Global Research in Computer Science, vol. 3, no. 3, pp. 53–55, 2012. View at Google Scholar
  5. J. Nath, S. Das, S. Agarwal, and A. Nath, “A challenge in hiding encrypted message in LSB and LSB+1 bit positions in various cover files,” International Journal of Computer Applications, vol. 14, no. 7, pp. 31–35, 2011. View at Publisher · View at Google Scholar
  6. K. Sara, A. D. Mashallah, and Y. M. Hossein, “A new steganography method based on HIOP (Higher Intensity Of Pixel) algorithm and strassen’s matrix multiplication,” Journal of Global Research in Computer Science, vol. 2, no. 1, p. 12, 2011. View at Google Scholar
  7. A. Chadha, N. Satam, R. Sood, and D. Bade, “An efficient method for image and audio steganography using Least Significant Bit (LSB) substitution,” International Journal of Computer Applications, vol. 77, no. 13, pp. 37–45, 2013. View at Publisher · View at Google Scholar
  8. H. A. Surrah and I. N. Mohamed, “A new steganography data hiding algorithm,” Journal of Global Research in Computer Science, vol. 5, no. 6, pp. 1–6, 2014. View at Google Scholar
  9. X.-Y. Wang, C.-P. Wang, H.-Y. Yang, and P.-P. Niu, “A robust blind color image watermarking in quaternion Fourier transform domain,” Journal of Systems and Software, vol. 86, no. 2, pp. 255–277, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. A. Benoraira, K. Benmahammed, and N. Boucenna, “Blind image watermarking technique based on differential embedding in DWT and DCT domains,” Eurasip Journal on Advances in Signal Processing, vol. 2015, no. 1, article 55, 2015. View at Publisher · View at Google Scholar · View at Scopus
  11. H. M. Al-Otum and N. A. Samara, “A robust blind color image watermarking based on wavelet-tree bit host difference selection,” Signal Processing, vol. 90, no. 8, pp. 2498–2512, 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. C.-S. Lu, S.-K. Huang, C.-J. Sze, and H.-Y. M. Liao, “Cocktail watermarking for digital image protection,” IEEE Transactions on Multimedia, vol. 2, no. 4, pp. 209–224, 2000. View at Publisher · View at Google Scholar · View at Scopus
  13. S. Rawat and B. Raman, “A blind watermarking algorithm based on fractional Fourier transform and visual cryptography,” Signal Processing, vol. 92, no. 6, pp. 1480–1491, 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. N. M. Makbol and B. E. Khoo, “Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition,” AEU—International Journal of Electronics and Communications, vol. 67, no. 2, pp. 102–112, 2013. View at Publisher · View at Google Scholar · View at Scopus
  15. S. Lagzian, M. Soryani, and M. Fathy, “A new robust watermarking scheme based on RDWT-SVD,” International Journal of Intelligent Information Processing, vol. 2, no. 1, pp. 22–29, 2011. View at Publisher · View at Google Scholar
  16. H.-T. Hu and L.-Y. Hsu, “Exploring DWT-SVD-DCT feature parameters for robust multiple watermarking against JPEG and JPEG2000 compression,” Computers and Electrical Engineering, vol. 41, pp. 52–63, 2015. View at Publisher · View at Google Scholar · View at Scopus
  17. A. Mishra, C. Agarwal, A. Sharma, and P. Bedi, “Optimized gray-scale image watermarkingusing DWT-SVD and firefly algorithm,” Expert Systems with Applications, vol. 41, no. 17, pp. 7858–7867, 2014. View at Publisher · View at Google Scholar
  18. S. E. Tsai and S. M. Yang, “A fast DCT algorithm for watermarking in digital signal processor,” Mathematical Problems in Engineering, vol. 2017, Article ID 7401845, 7 pages, 2017. View at Publisher · View at Google Scholar