Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Frontiers of Information Technology & Electronic Engineering >> 2016, Volume 17, Issue 11 doi: 10.1631/FITEE.1500165

Level-direction decomposition analysis with a focus on image watermarking framework

. Department of Electrical and Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran.. Department of Control Engineering, Faculty of Electrical Engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran

Available online: 2016-12-08

Next Previous

Abstract

This research addresses the new level-direction decomposition in the area of image watermarking as the further development of investigations. The main process of realizing a watermarking framework is to generate a watermarked image with a focus on contourlet embedding representation. The approach performance is evaluated through several indices including the peak signal-to-noise ratio and structural similarity, whereby a set of attacks are carried out using a module of simulated attacks. The obtained information is analyzed through a set of images, using different color models, to enable the calculation of normal correlation. The module of the inverse of contourlet embedding representation is correspondingly employed to obtain the present watermarked image, as long as a number of original images are applied to a scrambling module, to represent the information in disorder. This allows us to evaluate the performance of the proposed approach by analyzing a complicated system, where a decision making system is designed to find the best level and the corresponding direction regarding contourlet embedding representation. The results are illustrated in appropriate level-direction decomposition. The key contribution lies in using a new integration of a set of subsystems, employed based upon the novel mechanism in contourlet embedding representation, in association with the decision making system. The presented approach is efficient compared with state-of-the-art approaches, under a number of serious attacks. A number of benchmarks are obtained and considered along with the proposed framework outcomes. The results support our ideas.

Related Research