Advances in Soft Computing and Machine Learning in Image Processing by Aboul Ella Hassanien & Diego Alberto Oliva

Advances in Soft Computing and Machine Learning in Image Processing by Aboul Ella Hassanien & Diego Alberto Oliva

Author:Aboul Ella Hassanien & Diego Alberto Oliva
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham


4 Methodology

Methodology consists of two phases called watermarking and authentication. For watermarking, the FHT mechanism is used which is discussed in Sect. 4.1 in detail. For authentication, the SVD mechanism is used which is discussed in Sect. 4.2 in detail.

4.1 Hadmard Transformation Theory

The Hadamard transform has been used extensively in image processing and image compression [68–70]. In this section, we give a brief review of the Hadamard transform representation of image data, which is used in the watermarking embedding and extraction process. The reason for choosing FHT domain is also discussed. Let [U] represents the original image and [V] the transformed image, the 2D-Hadamard transform is given by Eq. 1.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.