scispace - formally typeset
Search or ask a question
Author

Mohammad Abdullatif

Other affiliations: University of Kuala Lumpur
Bio: Mohammad Abdullatif is an academic researcher from International Islamic University Malaysia. The author has contributed to research in topics: Digital watermarking & Second-generation wavelet transform. The author has an hindex of 2, co-authored 3 publications receiving 57 citations. Previous affiliations of Mohammad Abdullatif include University of Kuala Lumpur.

Papers
More filters
Proceedings ArticleDOI
08 Mar 2013
TL;DR: A basic model of digital image watermarking is started, the main requirements and applications are discussed, and some of the techniques and algorithm used in image water marking are reviewed.
Abstract: Digital image watermarking techniques have been developed widely in recent years to maintain the broadcasting media and content authentication, broadcast monitoring, copy control, and many other applications. Therefore, many studies have used digital image watermarking to solve these problem. This paper highlights digital image watermarking. It starts with a basic model of digital image watermarking, it discusses the main requirements and applications. Moreover, it reviews some of the techniques and algorithm used in image watermarking. In addition, digital image watermarking attacks are discussed. Lastly, Watermarking evaluation system is described.

55 citations

Proceedings ArticleDOI
23 Sep 2014
TL;DR: A robust digital image watermarking techniques by using discrete wavelet transform to achieve high performance in term of imperceptibility and is robust against several attacks.
Abstract: This paper proposes a robust digital image watermarking techniques by using discrete wavelet transform. The watermark is embedded in 2-level diagonal coefficient to achieve high performance in term of imperceptibility. The watermark is embedded by selecting a seed that generating pseudorandom noise sequence. Then the Watermark is extracted back by using the same pseudorandom noise sequence seed in the embedding. The experimental results show that the proposed algorithm provides good level of imperceptibility. Moreover, the watermarked image is robust against several attacks.

6 citations

Book Chapter
01 Jan 2011
TL;DR: In this article, AI-Battani has made great and significant contributions in Islamic astronomy and mathematics, including making corrections upon Ptolemy's results and making some new tables of the Sun and the Moon.
Abstract: This chapter is talking about one of the famous and greatest Islamic astronomers and mathematicians around the world; AI-Battani has great and significant contributions in astronomy and mathematics. In astronomy, he has astronomical observations for more than forty years. In addition, he did some corrections upon Ptolemy's results and made some new tables of the Sun and the Moon. Moreover, he determined the length of solar year. In mathematics, he innovated new relationships in trigonometric, and created a table of cotangents, and made some formulas in spherical trigonometry

1 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A survey of medical images watermarking is presented and offers an evident scene for concerned researchers by analysing the robustness and limitations of various existing approaches.

110 citations

Journal ArticleDOI
TL;DR: Experimental results demonstrate that the proposed technique successfully fulfills the requirement of imperceptibility and provides high robustness against a number of image-processing attacks, such as JPEG compression, noise adding, low-pass filtering, sharpening, and bit-plane removal.
Abstract: This paper presents a new blind and robust image watermarking scheme based on discrete wavelet transform (DWT) and discrete cosine transform (DCT). Two DCT-transformed sub-vectors are used to embed the bits of the watermark sequence in a differential manner. The original sub-vectors are obtained by the sub-sampling of the approximation coefficients of the DWT transform of the host image. During the extraction stage, the simple difference between the corresponding sub-vectors of the watermarked image, gives directly the embedded watermark sequence. Experimental results demonstrate that the proposed technique successfully fulfills the requirement of imperceptibility and provides high robustness against a number of image-processing attacks, such as JPEG compression, noise adding, low-pass filtering, sharpening, and bit-plane removal. Our scheme exhibits also an acceptable to good performance against some geometrical attacks such as resizing and cropping.

79 citations

Journal ArticleDOI
TL;DR: Details of standard water marking system frameworks are given and some standard requirements that are used in designing watermarking techniques for several distinct applications are listed.
Abstract: Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images. Based on the desired applications, several suitable watermarking techniques have been developed to mitigate this concern. However, it is tough to achieve a watermarking system that is simultaneously robust and secure. This paper gives details of standard watermarking system frameworks and lists some standard requirements that are used in designing watermarking techniques for several distinct applications. The current trends of digital image watermarking techniques are also reviewed in order to find the state-of-the-art methods and their limitations. Some conventional attacks are discussed, and future research directions are given.

72 citations

01 Jan 2015
TL;DR: Digital watermarking has become a promising research area to face the challenges created by the rapid growth in distribution of digital content over the internet.
Abstract: Digital watermarking has become a promising research area to face the challenges created by the rapid growth in distribution of digital content over the internet. To prevents misuse of this data Digital watermarking techniques are very useful in which a Secret message called as a watermarks which can be a logo or label is embedded into multimedia data imperceptibly which would be then used for various applications like copyright protection, authentication, and tamper detection etc.. Based on the requirement of the application the watermark is extracted or detected by detection algorithm to test condition of the data.

55 citations

Journal ArticleDOI
TL;DR: Soft computing based watermarking approaches providing robustness, imperceptibility and good embedding capacity are compared systematically and major issues and potential solutions for soft computing-basedWatermarking are discussed to encourage further research in this area.
Abstract: Image watermarking techniques are used to provide copyright protection and verify ownership of media/entities. This technique refers to the concept of embedding of secret data/information of an owner in a given media/entity for determining any ownership conflicts that can arise. Many watermarking approaches have been offered by various authors in the last few years. However, there are not enough studies and comparisons of watermarking techniques in soft computing environments. Nowadays, soft computing techniques are used to improve the performance of watermarking algorithms. This paper surveys soft computing-based image watermarking for several applications. We first elaborate on novel applications, watermark characteristics and different kinds of watermarking systems. Then, soft computing based watermarking approaches providing robustness, imperceptibility and good embedding capacity are compared systematically. Furthermore, major issues and potential solutions for soft computing-based watermarking are also discussed to encourage further research in this area. Thus, this survey paper will be helpful for researchers to implement an optimized watermarking scheme for several applications.

40 citations