Please use this identifier to cite or link to this item:
https://ptsldigital.ukm.my/jspui/handle/123456789/476498
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Md. Jan Nordin, Assoc. Prof. Dr. | |
dc.contributor.author | Atheer Bassel Abdulkareem (P54420) | |
dc.date.accessioned | 2023-10-06T09:19:39Z | - |
dc.date.available | 2023-10-06T09:19:39Z | - |
dc.date.issued | 2011-03-25 | |
dc.identifier.other | ukmvital:114629 | |
dc.identifier.uri | https://ptsldigital.ukm.my/jspui/handle/123456789/476498 | - |
dc.description | Multimedia communication is widely used nowadays; it has been used in most of life fields. Great importance has been given to a new art concerns about hiding a secret message inside pictures. Watermarking is one of the methods to hide secret information in multimedia contents. The main concept of watermarking is a pattern of bits inserted into an image. Watermarking is also a type of steganography field in which some useful information can be hidden inside another innocent image. This work will use the watermarking technique to solve the authentication problem. The research methodology of this work contains four phases of problem awareness of literature review, development, evaluation, and conclusion. Discrete Wavelet Transform (DWT) algorithm is used in this research to develop image security by hiding the watermark image inside the original image to prove owner image. DWT can combine more than one image by using mathematical techniques and used to embed and extract the watermark image, and low bit-rate transmission. Different type of attacks can be used in order to steal the ownership or destroy it, such as rotation attack, dithering attack, cropping attack, and compression attack. Matlab programming language will be used in this research to implement the proposed methods and to test the performance of the proposed method by different types of attacks. The expected conclusion of this research is a technique that has the ability to hide the secret data (message) inside the image by using DWT to avoid all the different types of attacks and finally extract the secret data from the image. Two techniques has been used to achieve imperceptibility and robustness of the watermark against certain geometric and non-geometric attacks. DWT only technique showed good imperceptibility with 80.128 value of PSNR, while DWT-DCT showed greater improvement with 96.73 of the PSNR value. The proposed technique showed impressing performance against different attacks such as cropping, dithering, and Gaussian noise. On the other hand, DWT-DCT found difficulties against compression and rotation techniques due to the nature of the attacks.,“Certification of Master’s/Doctoral Thesis” is not available,Master Information Technology | |
dc.language.iso | eng | |
dc.publisher | UKM, Bangi | |
dc.relation | Faculty of Information Science and Technology / Fakulti Teknologi dan Sains Maklumat | |
dc.rights | UKM | |
dc.subject | Digital watermarking | |
dc.subject | Wavelets (Mathematics) | |
dc.subject | Universiti Kebangsaan Malaysia -- Dissertations | |
dc.subject | Dissertations, Academic -- Malaysia | |
dc.title | Digital image watermark authentication using discrete wavelet transfrom algorithm | |
dc.type | theses | |
dc.format.pages | 86 | |
dc.identifier.callno | QA76.9.A25A237 2011 3 tesis | |
dc.identifier.barcode | 002379(2011) | |
Appears in Collections: | Faculty of Information Science and Technology / Fakulti Teknologi dan Sains Maklumat |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ukmvital_114629+SOURCE1+SOURCE1.0.PDF Restricted Access | 10.53 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.