<< Chapter < Page Chapter >> Page >

We decided to use singular value decomposition(SVD) to simulate the intentional attack and compress the image. After we embedded our message into the host image, we sent the watermarked image to the SVD compression function in Matlab. To implement SVD, we used Matlab code " [ U S V] = svd(W) " where W is the watermarked image, U,S and V are the singular values of W returned by the function.

To determine the compression ratio, we modified how many singular values we would preserve from the image. The fewer values we preserve, the larger compression ratio we have. We then wanted to extract the message from the compressed watermarked image and see if we can still retrieve the original message. We found out that the message embedded was also distorted due to the compression and the distortion was getting worse with the increase in compression ratio. Therefore, we want to test the relationship between how well the message was recovered and the compression ratio in the next step.

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, Robustness analysis on dct watermarking technique under compression attack. OpenStax CNX. Dec 19, 2012 Download for free at http://cnx.org/content/col11472/1.1
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'Robustness analysis on dct watermarking technique under compression attack' conversation and receive update notifications?

Ask