Investigation of the effects on embedded watermarks under image manipulations

Nilesh Moti, Theo G. Swart

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, different types of image watermarking techniques, the embedding of data or copyright information into the data file, are investigated. Three image watermarking techniques are discussed, namely: least significant bit, least significant bit and discrete cosine transform combined, and discrete cosine transform and discrete wavelet transform combined. These embedded watermarking techniques are evaluated on how robust each technique is under image manipulations. Simulations are done using the three image watermarking techniques to determine the effects on how well the embedded watermarking technique resists manipulations. Different watermarking techniques resulted in high robustness in some cases but showed visible artefacts, in other cases robustness was low but image quality stayed relatively close to the original watermark.

Original languageEnglish
Title of host publication2017 IEEE AFRICON
Subtitle of host publicationScience, Technology and Innovation for Africa, AFRICON 2017
EditorsDarryn R. Cornish
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages303-308
Number of pages6
ISBN (Electronic)9781538627754
DOIs
Publication statusPublished - 3 Nov 2017
EventIEEE AFRICON 2017 - Cape Town, South Africa
Duration: 18 Sept 201720 Sept 2017

Publication series

Name2017 IEEE AFRICON: Science, Technology and Innovation for Africa, AFRICON 2017

Conference

ConferenceIEEE AFRICON 2017
Country/TerritorySouth Africa
CityCape Town
Period18/09/1720/09/17

Keywords

  • Digital images
  • Robustness
  • Watermarking

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Signal Processing
  • Computer Vision and Pattern Recognition
  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Investigation of the effects on embedded watermarks under image manipulations'. Together they form a unique fingerprint.

Cite this