SlideShare a Scribd company logo
1 of 18
University ofTUNISIA:ESSTT
CEREP Research Unit
hassene.seddik@esstt.rnu.tn
Shaping optimal parameters selection for
most favourable robustness and
imperceptibility in watermarking in the
DWT domain
1
TABLE
INTRODUCTION
WATERMARKING METHODS
WATERMARKING TECHNIQUES IN DWT DOMAINS
 OPTIMIZATIONS
 Optimal wavelet choice.
 Optimal frequency sub-band choice
 Selection of the optimal embedding force “ α”
 choice of the most useful embedding equation
 Selection of the optimal decomposition level
CONCLUSION
2
Widespread of numeric data exchanges
Increase of commercial activity on Internet and media industries
NEED
copyright protection and data owner identification.
protection of media such as images, video and audio against illicit
processing and use.
to resolve these problems
DIGITAL WATERMARKING
3
DIGITAL WATERMARKING
 Spatial Domain: Weakness , non blind techniques;
Frequency Domain: JPEG lossy compression, geometric distortions
Other mathematical transformations: Reversible, conservative transforms
DWT Domain: MPEG 2, MPEG4, JPEG2000, H264, HSV…
• Additive techniques
•Substitutive techniques
• Robust techniques
•weak techniques
4
WATERMARKING TECHNIQUES IN DWT
DOMAINS
5
countless papers proposing different algorithms :
Hiding binary logos hierarchically decomposed in DWT and added
to the image sub-bands.
Binary watermark coded in selected coefficients of the detail bands
Embedding a watermark in the low frequency sub-band
Using the LSB technique of DWT sub-band coefficients, the
selected modified bits are chosen with respect to the HSV….
Parameters managing the
watermarking scheme
6
Kind of wavelet to be used
Frequency band used to code the watermark
Power of embedding with respect to HSV
Embedding techniques
Level of sub-bands decomposition
Experimental configuration
7
The original image is transformed in the time-frequency domain,
the watermark is coded. After recovering the spatial
representation of the watermarked image many STIRMARK
attacks are applied in order to test the robustness of the
embedding algorithm. These tests allow as checking and finding
the equilibrium point between the involved parameters.
In every set of tests one parameter is varied, and the others are
fixed and the optimal value is determined based on the distortions
measurements.
8
Optimization procedure
Watermarks database
used watermarks
Optimal wavelet choice
9
wavelet can generate loss or lossless decomposition.
Varying sub-bands coefficients provoke distortions in the spatial
representation depending on the wavelet kind.
Check witch wavelet type can affect the less the spatial image if
the watermark is added.
The diagonal sub-band is used
Embedding power is fixed as 0.8
The wavelet that engender less distortion
to the spatial representation of the
watermarked image is considered.
Optimal frequency sub-band
choice
10
In witch sub-band is
better to code the
watermark ?
Fixing the parameters that have not been optimized
Insert the same watermark with the same embedding gain
factor in the different iteratively frequency sub-band.
The insertion that engenders lower distortions
to the original image is considered
11
( )( ).1.,,0,,0,,0,,0 jiN
LH
ji
LH
ji
LH
ji
LH
ji
WXXXY meanmean +
+−+= α
( )( )jiNMN
HL
ji
HL
ji
HL
ji
HL
ji WXXXY meanmean ++++= .1.- ,,0,,0,,0,,0 α
( )( )jiNMN
HH
ji
HH
ji
HH
ji
HH
ji
WXXXY meanmean ++
+−+= 2,,0,,0,,0,,0
.1. α
Gain factor
coefficient
PSNR (HL1 sub-
band insertion)
PSNR (LH1 sub-
band insertion)
PSNR (HH1 sub-band
insertion)
0.1 50.49 48.11 55.18
0.2 44.47 42.09 49.27
0.3 40.95 38.57 4581
0.4 38.45 36.07 43.29
0.5 36.51 34.13 41.36
0.6 34.95 32.55 39.82
0.7 33.39 31.21 38.50
0.8 32.43 30.05 37.41
0.9 31.41 29.03 36.43
α
HH sub-band presents more reliability with respect to the HSV
and causes less distortion to the processed image
Selection of the optimal embedding
force “ α”
12
The α called gain factor is the first parameter in charge of the
robustness of any watermarking algorithm.
α is thresholded by the HSV imperceptibility limit.
A limit of 37dB is fixed to decide about the presence of visible distortions
The optimal gain factor
corresponding to the fixed
PSNR threshold is 0.8 .
choice of the most useful
embedding equation
13
Different equations are proposed in the literatures
).1).(),((),( kmeanmeanw
wfjiffjif α+−+=
).1.(),(),( kw
wjifjif α+=
kw wjifjif .),(),( α+=
The second equation is
more reliable and improves
the robustness of the
algorithm compared with
the first one.
Choice of the optimal
decomposition level
14
the first decomposition generates sub-bands (LH, HL, and HH).
The LL sub-band is re-decomposed to generate the next level of
decomposition .
For an n-level decomposition and M×N image, the size of the
area in which watermarks are to be embedded is : M.N/22n
n
MN
2
2 n
MN
2
2 n
MN
2
2
Third level decomposition of
LENA image.
15
Different level watermarked sub-bands and the differences between
the watermarked and original images.
• we deduce that more the decomposition level is high, more the
watermark is spread and distributed over and near the borders.
• This distribution is controlled in the frequency domain
depending on the non-randomly selected sub-bands coefficients.
16
Distortion variation
against level
decomposition
The first level is found more advantageous for watermark
embedding procedures. It generates fewer distortions when
compared with levels of higher order.
CONCLUSIONCONCLUSION
17
An overview over different watermarking techniques in the
DWT domain is presented.
A strategy to optimize the different parameters that intervene
in the watermarking process is built up.
Experiments and tests are conducted to find the optimal value
that leads to a robust and imperceptible watermarking
algorithm. .
Injecting these optimal parameters in the embedding equation
of the watermarking process, guarantee better robustness of the
watermarked image against different attacks and decreases the
distortions to maintain them under the perceptibility threshold.
This optimization wasn’t done in the literature and can be
exploited easily for DWT watermarking shames.
18
THANK YOU FOR YOUR
ATTENTION
Seddik_hassene@yahoo.fr hassene.seddik@esstt.rnu.tn

More Related Content

What's hot

Massive MIMO and Random Matrix
Massive MIMO and Random MatrixMassive MIMO and Random Matrix
Massive MIMO and Random Matrix
VARUN KUMAR
 
Interference management in spectrally and energy efficient wireless networks
Interference management in spectrally and energy efficient wireless networksInterference management in spectrally and energy efficient wireless networks
Interference management in spectrally and energy efficient wireless networks
Mohamed Seif
 

What's hot (20)

Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
 
Massive MIMO and Random Matrix
Massive MIMO and Random MatrixMassive MIMO and Random Matrix
Massive MIMO and Random Matrix
 
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
 
[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...
[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...
[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...
 
Strategies to Combat Pilot Contamination in Massive MIMO Systems
Strategies to Combat Pilot Contamination in Massive MIMO SystemsStrategies to Combat Pilot Contamination in Massive MIMO Systems
Strategies to Combat Pilot Contamination in Massive MIMO Systems
 
Outage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channelOutage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channel
 
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
 
Image Interpolation Techniques in Digital Image Processing: An Overview
Image Interpolation Techniques in Digital Image Processing: An OverviewImage Interpolation Techniques in Digital Image Processing: An Overview
Image Interpolation Techniques in Digital Image Processing: An Overview
 
THE EVIDENCE THEORY FOR COLOR SATELLITE IMAGE COMPRESSION
THE EVIDENCE THEORY FOR COLOR SATELLITE IMAGE COMPRESSIONTHE EVIDENCE THEORY FOR COLOR SATELLITE IMAGE COMPRESSION
THE EVIDENCE THEORY FOR COLOR SATELLITE IMAGE COMPRESSION
 
Labview with dwt for denoising the blurred biometric images
Labview with dwt for denoising the blurred biometric imagesLabview with dwt for denoising the blurred biometric images
Labview with dwt for denoising the blurred biometric images
 
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color ImagesRobust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
 
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
 
Compressive spectrum sensing using two-stage scheme for cognitive radio netwo...
Compressive spectrum sensing using two-stage scheme for cognitive radio netwo...Compressive spectrum sensing using two-stage scheme for cognitive radio netwo...
Compressive spectrum sensing using two-stage scheme for cognitive radio netwo...
 
1570265619
15702656191570265619
1570265619
 
056-2004 SID Manuscript
056-2004 SID Manuscript056-2004 SID Manuscript
056-2004 SID Manuscript
 
Nov 04 P3
Nov 04 P3Nov 04 P3
Nov 04 P3
 
Interference management in spectrally and energy efficient wireless networks
Interference management in spectrally and energy efficient wireless networksInterference management in spectrally and energy efficient wireless networks
Interference management in spectrally and energy efficient wireless networks
 
Mimo detection-bp-p mrf-yoon-160706a
Mimo detection-bp-p mrf-yoon-160706aMimo detection-bp-p mrf-yoon-160706a
Mimo detection-bp-p mrf-yoon-160706a
 
Lc3618931897
Lc3618931897Lc3618931897
Lc3618931897
 
DETECTION OF POWER-LINES IN COMPLEX NATURAL SURROUNDINGS
DETECTION OF POWER-LINES IN COMPLEX NATURAL SURROUNDINGSDETECTION OF POWER-LINES IN COMPLEX NATURAL SURROUNDINGS
DETECTION OF POWER-LINES IN COMPLEX NATURAL SURROUNDINGS
 

Viewers also liked (15)

Fab friday ppt
Fab friday pptFab friday ppt
Fab friday ppt
 
The element of art
The element of artThe element of art
The element of art
 
Photos 110208145628-phpapp02
Photos 110208145628-phpapp02Photos 110208145628-phpapp02
Photos 110208145628-phpapp02
 
The globe mire i judit
The globe mire i juditThe globe mire i judit
The globe mire i judit
 
Ppsj maikel
Ppsj maikelPpsj maikel
Ppsj maikel
 
24symbols - Walk-through for Publishers
24symbols - Walk-through for Publishers24symbols - Walk-through for Publishers
24symbols - Walk-through for Publishers
 
P1111348307
P1111348307P1111348307
P1111348307
 
P1121133746
P1121133746P1121133746
P1121133746
 
APD Presentation by Prof.Javed Akram
APD Presentation by Prof.Javed AkramAPD Presentation by Prof.Javed Akram
APD Presentation by Prof.Javed Akram
 
Mashario elements
Mashario elementsMashario elements
Mashario elements
 
P1111343299
P1111343299P1111343299
P1111343299
 
Acorde
AcordeAcorde
Acorde
 
PHP from soup to nuts Course Deck
PHP from soup to nuts Course DeckPHP from soup to nuts Course Deck
PHP from soup to nuts Course Deck
 
Moonupdated
MoonupdatedMoonupdated
Moonupdated
 
Quality stories feb
Quality stories   febQuality stories   feb
Quality stories feb
 

Similar to P1151132703

Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithm
eSAT Journals
 

Similar to P1151132703 (20)

DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
 
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
 
Blind and Robust Images Watermarking Based on Wavelet and Edge Insertion
Blind and Robust Images Watermarking Based on Wavelet and Edge InsertionBlind and Robust Images Watermarking Based on Wavelet and Edge Insertion
Blind and Robust Images Watermarking Based on Wavelet and Edge Insertion
 
BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION
BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTIONBLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION
BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Project doc
Project docProject doc
Project doc
 
Wavelet
WaveletWavelet
Wavelet
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithm
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithm
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
1873 1878
1873 18781873 1878
1873 1878
 
1873 1878
1873 18781873 1878
1873 1878
 
A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...
A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...
A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...
 
H3602056060
H3602056060H3602056060
H3602056060
 
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletsNon standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded wavelets
 
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletsNon standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded wavelets
 

More from Ashraf Aboshosha

More from Ashraf Aboshosha (20)

P1151351311
P1151351311P1151351311
P1151351311
 
P1151345302
P1151345302P1151345302
P1151345302
 
P1121352313
P1121352313P1121352313
P1121352313
 
P1121340296
P1121340296P1121340296
P1121340296
 
P1121340294
P1121340294P1121340294
P1121340294
 
P1121327289
P1121327289P1121327289
P1121327289
 
P1151442348
P1151442348P1151442348
P1151442348
 
P1151442347
P1151442347P1151442347
P1151442347
 
P1151439345
P1151439345P1151439345
P1151439345
 
P1151424332
P1151424332P1151424332
P1151424332
 
P1151423331
P1151423331P1151423331
P1151423331
 
P1151420328
P1151420328P1151420328
P1151420328
 
P1151418327
P1151418327P1151418327
P1151418327
 
P1151404314
P1151404314P1151404314
P1151404314
 
P1111351312
P1111351312P1111351312
P1111351312
 
P1111444352
P1111444352P1111444352
P1111444352
 
P1111440346
P1111440346P1111440346
P1111440346
 
P1111431335
P1111431335P1111431335
P1111431335
 
P1111410320
P1111410320P1111410320
P1111410320
 
P1111410321
P1111410321P1111410321
P1111410321
 

P1151132703

  • 1. University ofTUNISIA:ESSTT CEREP Research Unit hassene.seddik@esstt.rnu.tn Shaping optimal parameters selection for most favourable robustness and imperceptibility in watermarking in the DWT domain 1
  • 2. TABLE INTRODUCTION WATERMARKING METHODS WATERMARKING TECHNIQUES IN DWT DOMAINS  OPTIMIZATIONS  Optimal wavelet choice.  Optimal frequency sub-band choice  Selection of the optimal embedding force “ α”  choice of the most useful embedding equation  Selection of the optimal decomposition level CONCLUSION 2
  • 3. Widespread of numeric data exchanges Increase of commercial activity on Internet and media industries NEED copyright protection and data owner identification. protection of media such as images, video and audio against illicit processing and use. to resolve these problems DIGITAL WATERMARKING 3
  • 4. DIGITAL WATERMARKING  Spatial Domain: Weakness , non blind techniques; Frequency Domain: JPEG lossy compression, geometric distortions Other mathematical transformations: Reversible, conservative transforms DWT Domain: MPEG 2, MPEG4, JPEG2000, H264, HSV… • Additive techniques •Substitutive techniques • Robust techniques •weak techniques 4
  • 5. WATERMARKING TECHNIQUES IN DWT DOMAINS 5 countless papers proposing different algorithms : Hiding binary logos hierarchically decomposed in DWT and added to the image sub-bands. Binary watermark coded in selected coefficients of the detail bands Embedding a watermark in the low frequency sub-band Using the LSB technique of DWT sub-band coefficients, the selected modified bits are chosen with respect to the HSV….
  • 6. Parameters managing the watermarking scheme 6 Kind of wavelet to be used Frequency band used to code the watermark Power of embedding with respect to HSV Embedding techniques Level of sub-bands decomposition
  • 7. Experimental configuration 7 The original image is transformed in the time-frequency domain, the watermark is coded. After recovering the spatial representation of the watermarked image many STIRMARK attacks are applied in order to test the robustness of the embedding algorithm. These tests allow as checking and finding the equilibrium point between the involved parameters. In every set of tests one parameter is varied, and the others are fixed and the optimal value is determined based on the distortions measurements.
  • 9. Optimal wavelet choice 9 wavelet can generate loss or lossless decomposition. Varying sub-bands coefficients provoke distortions in the spatial representation depending on the wavelet kind. Check witch wavelet type can affect the less the spatial image if the watermark is added. The diagonal sub-band is used Embedding power is fixed as 0.8 The wavelet that engender less distortion to the spatial representation of the watermarked image is considered.
  • 10. Optimal frequency sub-band choice 10 In witch sub-band is better to code the watermark ? Fixing the parameters that have not been optimized Insert the same watermark with the same embedding gain factor in the different iteratively frequency sub-band. The insertion that engenders lower distortions to the original image is considered
  • 11. 11 ( )( ).1.,,0,,0,,0,,0 jiN LH ji LH ji LH ji LH ji WXXXY meanmean + +−+= α ( )( )jiNMN HL ji HL ji HL ji HL ji WXXXY meanmean ++++= .1.- ,,0,,0,,0,,0 α ( )( )jiNMN HH ji HH ji HH ji HH ji WXXXY meanmean ++ +−+= 2,,0,,0,,0,,0 .1. α Gain factor coefficient PSNR (HL1 sub- band insertion) PSNR (LH1 sub- band insertion) PSNR (HH1 sub-band insertion) 0.1 50.49 48.11 55.18 0.2 44.47 42.09 49.27 0.3 40.95 38.57 4581 0.4 38.45 36.07 43.29 0.5 36.51 34.13 41.36 0.6 34.95 32.55 39.82 0.7 33.39 31.21 38.50 0.8 32.43 30.05 37.41 0.9 31.41 29.03 36.43 α HH sub-band presents more reliability with respect to the HSV and causes less distortion to the processed image
  • 12. Selection of the optimal embedding force “ α” 12 The α called gain factor is the first parameter in charge of the robustness of any watermarking algorithm. α is thresholded by the HSV imperceptibility limit. A limit of 37dB is fixed to decide about the presence of visible distortions The optimal gain factor corresponding to the fixed PSNR threshold is 0.8 .
  • 13. choice of the most useful embedding equation 13 Different equations are proposed in the literatures ).1).(),((),( kmeanmeanw wfjiffjif α+−+= ).1.(),(),( kw wjifjif α+= kw wjifjif .),(),( α+= The second equation is more reliable and improves the robustness of the algorithm compared with the first one.
  • 14. Choice of the optimal decomposition level 14 the first decomposition generates sub-bands (LH, HL, and HH). The LL sub-band is re-decomposed to generate the next level of decomposition . For an n-level decomposition and M×N image, the size of the area in which watermarks are to be embedded is : M.N/22n n MN 2 2 n MN 2 2 n MN 2 2 Third level decomposition of LENA image.
  • 15. 15 Different level watermarked sub-bands and the differences between the watermarked and original images. • we deduce that more the decomposition level is high, more the watermark is spread and distributed over and near the borders. • This distribution is controlled in the frequency domain depending on the non-randomly selected sub-bands coefficients.
  • 16. 16 Distortion variation against level decomposition The first level is found more advantageous for watermark embedding procedures. It generates fewer distortions when compared with levels of higher order.
  • 17. CONCLUSIONCONCLUSION 17 An overview over different watermarking techniques in the DWT domain is presented. A strategy to optimize the different parameters that intervene in the watermarking process is built up. Experiments and tests are conducted to find the optimal value that leads to a robust and imperceptible watermarking algorithm. . Injecting these optimal parameters in the embedding equation of the watermarking process, guarantee better robustness of the watermarked image against different attacks and decreases the distortions to maintain them under the perceptibility threshold. This optimization wasn’t done in the literature and can be exploited easily for DWT watermarking shames.
  • 18. 18 THANK YOU FOR YOUR ATTENTION Seddik_hassene@yahoo.fr hassene.seddik@esstt.rnu.tn