Digital Watermarking Technique using Robust Quantization Index Regulation (RQIR)
International Journal of Electronics and Communication Engineering |
© 2015 by SSRG - IJECE Journal |
Volume 2 Issue 1 |
Year of Publication : 2015 |
Authors : S.Manasseh and M.Niranjan Kumar |
How to Cite?
S.Manasseh and M.Niranjan Kumar, "Digital Watermarking Technique using Robust Quantization Index Regulation (RQIR)," SSRG International Journal of Electronics and Communication Engineering, vol. 2, no. 1, pp. 1-4, 2015. Crossref, https://doi.org/10.14445/23488549/IJECE-V2I1P101
Abstract:
Digital watermarking is one of the efficient technique that is used in the current technological systems to support and provide the copyright notices, authorization, secret correspondence and cross breed transmission applications, for example, computerized sound television are samples of developing sight and sound applications for computerized watermarking and data implanting systems, techniques for installing one signal, We represent a unique digital modeling technique called Robust Quantization index regulations (RQIR) that accomplish provably great rate-twisting strength execution. These strategies, and low-multifaceted nature acknowledge of them called dither tweak, are provably superior to both a while ago proposed straight routines for spread range and nonlinear techniques for low-bit(s) balance against squareslip twisting compelled purposeful assaults. At long last, we report reenactment comes about that show the execution of dither balance acknowledge that can be executed with just a couple of adders and scalar quantizes.
Keywords:
Digital Watermarking, Robust Quantization Index Regulations(RQIR), Dither Balance.
References:
[1] N.S. Jayant and P. Noll,Digital Coding of Waveforms: Princi-ples and pplications to Speech and Video, Englewood Cliffs, NJ: Prentice-Hall, 1984.
[2] R. Zamir and M. Feder, “On Lattice Quantization Noise,”IEEE Transactions on Information Theory, vol. 42, 1996, pp. 1152–1159.
[3] G. Ungerboeck, “Channel Coding With Multilevel/Phase Sig-nals,”IEEE Transactions on Information Theory, vol. 28, 1982, pp. 55–67.
[4] T.M. Cover, “Broadcast Channels,”IEEE Transactions on In-formation Theory, vol. 18, 1972, pp. 2–14.
[5] K. Ramchandran, A. Ortega, K.M. Uz, and M. Vetterli, “Multiresolution Broadcast for Digital HDTV Using Joint Source/Channel Coding,”IEEE Journal on Selected Areas in Communications, vol. 11, 1993, pp. 6–23.
[6] T.M. Cover and J.A. Thomas,Elements of Information Theory, New York, NY: John Wiley & Sons, 1991.31. M.H.M. Costa, “Writing on Dirty Paper,”IEEE Transactions onInformation Theory, vol. IT-29, 1983, pp. 439–441.
[7] P. Moulin and J.A. O’Sullivan, “Information-theoretic analysis of information hiding,” Preprint, 1999.
[8] S.I. Gel’fand and M.S. Pinsker, “Coding for Channel with Random Parameters, “Problems of Control and Information Theory, vol. 9, no. 1, 1980, pp. 19–31.
[9] A.S. Willsky, G.W. Wornell, and J.H. Shapiro, “Stochastic Processes, Detection and Estimation,” MIT 6.432 Supplementary Course Notes, Cambridge, MA, 1996.
[10] S. Lin and D.J. Costello,Jr.,Error Control Coding: Fundamentals and Applications, Englewood Cliffs, NJ: Prentice-Hall,1983.
[11] R.J. Barron, B. Chen, and G.W. Wornell, “The Duality Between Information Embedding and Source Coding with Side Information and Its Implications and Applications,”IEEE Transactions on Information Theory, submitted.
[12] B. Chen and G.W. Wornell, “Provably Robust Digital Water-marking,” inProceedings of SPIE: Multimedia Systems and Applications II, Boston, MA, Sept. 1999, vol. 3845, pp. 43–54