IDEAS home Printed from https://ideas.repec.org/a/hin/jnlmpe/5060564.html
   My bibliography  Save this article

Maximize the Security for Image Processing Using an Improved Watermarking Approach

Author

Listed:
  • Manoj Kumar Tyagi
  • Cuddapah Anitha
  • R. Ramyadevi
  • Sunita Pachar
  • Ravi Kumar Tata
  • Preetam Suman
  • Fardin Ahmadi
  • Savita Gupta

Abstract

Creating a dependable and effective digital image watermarking (WM) method necessitates balancing imperceptibility, resilience, capacity, and security. Several studies have combined spatial and transform domains to meet these needs. We investigated the current state of hybrid digital image WM. When developing a hybrid WM strategy, it is critical to consider software compatibility. Following a brief review of the literature, we used a table to analyse and evaluate current hybrid approaches. Furthermore, the limitations and possibilities of these approaches are discussed. We investigated the limitations of current research methodologies and proposed new research directions. The internet’s role in distributing digital material has resulted in more digitalisation and more complex copyright concerns. Copyright breaches are being reduced through the deployment of innovative digital WM techniques. As a result of this research, a WM system capable of dealing with a wide range of threats is being developed. The goal of this study is to maximise security while maintaining visibility and resilience. Discrete wavelets transform (DWT) and singular value decomposition (SVD) were used to investigate covert operations; DWT was used to isolate each level of the host image, which was then processed using SVD. At the time, normalized correlation was the best method for measuring watermarked images. In research, DWT–SVD was more accurate in detecting assaults; it shows structural similarity index and normalized correlation are 98.4 and 98.35, respectively. Watermarked images can withstand a variety of assaults due to their invisibility and resilience; this system repels assaults that alter pixel values better than traditional methods.

Suggested Citation

  • Manoj Kumar Tyagi & Cuddapah Anitha & R. Ramyadevi & Sunita Pachar & Ravi Kumar Tata & Preetam Suman & Fardin Ahmadi & Savita Gupta, 2023. "Maximize the Security for Image Processing Using an Improved Watermarking Approach," Mathematical Problems in Engineering, Hindawi, vol. 2023, pages 1-11, September.
  • Handle: RePEc:hin:jnlmpe:5060564
    DOI: 10.1155/2023/5060564
    as

    Download full text from publisher

    File URL: http://downloads.hindawi.com/journals/mpe/2023/5060564.pdf
    Download Restriction: no

    File URL: http://downloads.hindawi.com/journals/mpe/2023/5060564.xml
    Download Restriction: no

    File URL: https://libkey.io/10.1155/2023/5060564?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hin:jnlmpe:5060564. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Mohamed Abdelhakeem (email available below). General contact details of provider: https://www.hindawi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.