dc.contributor.author | Souad, Bekkouche | |
dc.contributor.author | Mohamed, Faraoun Kame | |
dc.date.accessioned | 2018-07-09T06:18:23Z | |
dc.date.available | 2018-07-09T06:18:23Z | |
dc.date.issued | 2014 | |
dc.identifier.issn | 2210-142X | |
dc.identifier.uri | https://journal.uob.edu.bh:443/handle/123456789/263 | |
dc.description.abstract | This paper presents a secure and robust image watermarking scheme based on the reversible DWT-DCT-SVD transformations to increase both integrity authentication and confidentiality. The proposed approach uses two types of watermarks image: a reversible watermark W1 used for verification (integrity and authentication aspects), and a second watermark W2 (a logo image) to verify the confidentiality. Performances of proposed method are evaluated with respect to the PSNR (Peak Signal to Noise Ratio), SNR (Signal noise to ratio), and NCC (Normalized Correlation) and to the running time. A comparative study is also provided to show robustness of the technique against different attacks including compression attack and Salt & Pepper. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | University of Bahrain | en_US |
dc.rights | Attribution-NonCommercial-ShareAlike 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/4.0/ | * |
dc.subject | Watermarking | en_US |
dc.subject | R-DWT-DCT-SVD | en_US |
dc.subject | Images security | en_US |
dc.title | Reversible Combined R-DWT-DCT-SVD Watermarking Schema | en_US |
dc.type | Article | en_US |
dc.identifier.doi | http://dx.doi.org/10.12785/IJCDS/030307 | |
dc.volume | 03 | |
dc.issue | 03 | |
dc.source.title | International Journal of Computing and Digital Systems | |
dc.abbreviatedsourcetitle | IJCDS |
The following license files are associated with this item: