Digital Information Hiding Techniques
Information hiding, a form of watermark, embeds data into digital media for the purpose of identification and copyright. Several constraints affect this process: the size of data to be hidden, the need for robustness of these data under conditions where a host_signal is subject to distortions, for e...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Mosul University
2010-12-01
|
| Series: | Al-Rafidain Journal of Computer Sciences and Mathematics |
| Subjects: | |
| Online Access: | https://csmj.mosuljournals.com/article_163916_8abd35ea19fe9eee606a1d0218059e53.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850195396719017984 |
|---|---|
| author | Alyaa Abdul Majeed Haleem Nadia Mohammed |
| author_facet | Alyaa Abdul Majeed Haleem Nadia Mohammed |
| author_sort | Alyaa Abdul Majeed Haleem |
| collection | DOAJ |
| description | Information hiding, a form of watermark, embeds data into digital media for the purpose of identification and copyright. Several constraints affect this process: the size of data to be hidden, the need for robustness of these data under conditions where a host_signal is subject to distortions, for e.g., lossy_compression, and the degree to which the data must be immune to interception, modification, or removal by a third person.
Here, we explore two techniques (DC watermarking scheme and Time Domain watermarking technique) for addressing the data-hiding process and evaluate these techniques in light of the copyright protection application. The measures (SNR, PSNR, NRMSE) were used to improve the results. Besides that the Matlab were used as a programming language in this paper. |
| format | Article |
| id | doaj-art-20cbfd33fa0342269a24ec162d4d3571 |
| institution | OA Journals |
| issn | 1815-4816 2311-7990 |
| language | English |
| publishDate | 2010-12-01 |
| publisher | Mosul University |
| record_format | Article |
| series | Al-Rafidain Journal of Computer Sciences and Mathematics |
| spelling | doaj-art-20cbfd33fa0342269a24ec162d4d35712025-08-20T02:13:45ZengMosul UniversityAl-Rafidain Journal of Computer Sciences and Mathematics1815-48162311-79902010-12-017310912010.33899/csmj.2010.163916163916Digital Information Hiding TechniquesAlyaa Abdul Majeed Haleem0Nadia Mohammed1College of Computers Sciences and Mathematics University of Mosul, IraqCollege of Computer Science and Mathematics University of MosulInformation hiding, a form of watermark, embeds data into digital media for the purpose of identification and copyright. Several constraints affect this process: the size of data to be hidden, the need for robustness of these data under conditions where a host_signal is subject to distortions, for e.g., lossy_compression, and the degree to which the data must be immune to interception, modification, or removal by a third person. Here, we explore two techniques (DC watermarking scheme and Time Domain watermarking technique) for addressing the data-hiding process and evaluate these techniques in light of the copyright protection application. The measures (SNR, PSNR, NRMSE) were used to improve the results. Besides that the Matlab were used as a programming language in this paper.https://csmj.mosuljournals.com/article_163916_8abd35ea19fe9eee606a1d0218059e53.pdfdc level shiftingsnrdct coefficients |
| spellingShingle | Alyaa Abdul Majeed Haleem Nadia Mohammed Digital Information Hiding Techniques Al-Rafidain Journal of Computer Sciences and Mathematics dc level shifting snr dct coefficients |
| title | Digital Information Hiding Techniques |
| title_full | Digital Information Hiding Techniques |
| title_fullStr | Digital Information Hiding Techniques |
| title_full_unstemmed | Digital Information Hiding Techniques |
| title_short | Digital Information Hiding Techniques |
| title_sort | digital information hiding techniques |
| topic | dc level shifting snr dct coefficients |
| url | https://csmj.mosuljournals.com/article_163916_8abd35ea19fe9eee606a1d0218059e53.pdf |
| work_keys_str_mv | AT alyaaabdulmajeedhaleem digitalinformationhidingtechniques AT nadiamohammed digitalinformationhidingtechniques |