scispace - formally typeset
Search or ask a question
Author

Rakhi Dubolia

Bio: Rakhi Dubolia is an academic researcher from Madhav Institute of Technology and Science. The author has contributed to research in topics: Harmonic wavelet transform & Second-generation wavelet transform. The author has an hindex of 1, co-authored 1 publications receiving 58 citations.

Papers
More filters
Proceedings ArticleDOI
03 Jun 2011
TL;DR: DCT and DCT are compared with respect to peak signal to noise ratio (PSNR) at a different threshold values and DWT gives better Image quality then DCT.
Abstract: Digital watermarking is a technique which allows an individual to add hidden copyright notices or other verification messages to digital audio, video, or image signals and documents. Watermarking can be done by using least significant bit (LSB), singular value decomposition (SVD), Discrete Fourier Transform (DFT), Discrete cosine transform (DCT) and Discrete wavelet transform (DWT) techniques. In this paper Discrete cosine transform (DCT) and Discrete wavelet transform (DWT) are used for embedding and extraction of watermark. DWT and DCT are compared with respect to peak signal to noise ratio (PSNR) at a different threshold values. DWT gives better Image quality then DCT.

69 citations


Cited by
More filters
Journal ArticleDOI
01 Apr 2020-Optik
TL;DR: The obtained results show that the approach offers good imperceptibility and generates watermarking images robust against various attacks with a high-quality watermark.

102 citations

Journal ArticleDOI
07 Oct 2020
TL;DR: This survey contributes to a better understanding of the blockchain, ML, and watermarking techniques for securing UAVs and sheds new light on challenges and opportunities on subject applications.
Abstract: Unmanned aerial vehicles (UAVs) or Drones technology has a huge potential for supporting different efficient solutions for the smart applications in our world. The applications include sma...

59 citations

Proceedings ArticleDOI
08 Mar 2013
TL;DR: A basic model of digital image watermarking is started, the main requirements and applications are discussed, and some of the techniques and algorithm used in image water marking are reviewed.
Abstract: Digital image watermarking techniques have been developed widely in recent years to maintain the broadcasting media and content authentication, broadcast monitoring, copy control, and many other applications. Therefore, many studies have used digital image watermarking to solve these problem. This paper highlights digital image watermarking. It starts with a basic model of digital image watermarking, it discusses the main requirements and applications. Moreover, it reviews some of the techniques and algorithm used in image watermarking. In addition, digital image watermarking attacks are discussed. Lastly, Watermarking evaluation system is described.

55 citations

Journal ArticleDOI
TL;DR: A blind and robust watermarking technique that allows the integration of the electronic patient’s record into a computerized tomography scan and offers excellent imperceptibility and very good robustness against several geometric and destructive attacks is presented.
Abstract: In order to contribute to the security of medical image, we present in this paper a blind and robust watermarking technique that allows the integration of the electronic patient’s record into a computerized tomography scan. In this approach, a discrete wavelet transform is applied to the image before the integration process, then, a topological reorganization of the coefficients of the LL sub-bands is done by the ZigZag scanning method. The obtained coefficients are then combined to integrate the watermark bits. A hash of the electronic patient record being integrated in the image, the integrity of the watermark can easily be verified. After the evaluation of our approach in terms of invisibility and robustness, the experimental results obtained show that our approach offers excellent imperceptibility (with a PSNR above 70 dB) and very good robustness against several geometric and destructive attacks.

47 citations

Journal ArticleDOI
TL;DR: In this article, a blind watermarking approach for medical image protection is proposed, which consists of the Electronic Patient Record and the image acquisition data, and the watermark is then integrated into the least significant bits of the S component obtained by combining the parity of the successive coefficients.

45 citations