Programs
- M. Tech. in Automotive Engineering -
- Clinical Fellowship in Laboratory Genetics & Genomics - Fellowship
Publication Type : Conference Paper
Publisher : ICCTD 2009 - 2009 International Conference on Computer Technology and Development
Source : ICCTD 2009 - 2009 International Conference on Computer Technology and Development, Volume 1, Kota Kinabalu, p.535-539 (2009)
ISBN : 9780769538921
Keywords : Binary data files, Computer hardware, Conventional methods, Copyright protections, Copyrights, Cosine transforms, DCT/IDCT, Digital Image Watermarking, Digital watermarking, Discrete cosine transforms, Hardware, Hardware implementations, Image authentication, Image pixel value, Image processing, Low Power, MATLAB, Modelsim, Pipelined implementation, Pipelines, Speed increase, Transpose method, Verilog HDL, Visible and invisible watermarking, Watermarking, Watermarking techniques
Campus : Amritapuri
School : School of Engineering
Center : Humanitarian Technology (HuT) Labs
Department : Electronics and Communication
Year : 2009
Abstract :
This paper presents a comparison with the conventional watermarking technique and the novel 5-stage pipelined implementation of DCT/IDCT which is used in digital image watermarking. The most common method of Discrete Cosine Transform (DCT)-based digital image watermarking which is used for image authentication and copyright protection is the transpose method. In this method the 2-Dimensional DCT is obtained by taking two 1-dimensional DCTs in series. The image pixel value is first divided into 8×8 blocks and the row-wise 1D DCT of each block is taken. The transpose of the blocks is then determined and a column-wise 1D DCT is ascertained which gives the 2D DCT of the data. The major advantage of this design is that, unlike the conventional DCT-based watermarking technique, this method uses a 5-stage pipeline which can bring about a speed increase of close to 500% over the conventional method which is naturally a great advantage. This technique has been tested on the standard 'Lena' image. Both visible and invisible watermarking is implemented in hardware. The design is done in Verilog HDL and the simulation is done in Modelsim 6.3b. Matlab is used to produce the binary data file which is the input to the 1D DCT module. The hardware implementation is done in Xilinx XC3S4000 FPGA. The results of the comparison are discussed in the concluding sections. © 2009 IEEE.
Cite this Research Publication : Rajesh Kannan Megalingam, Venkat, K. B., Vineeth, S. V., Mithun, M., and Srikumar, R., “Hardware Implementation of Low Power, High Speed DCT/IDCT Based Digital Image Watermarking”, in ICCTD 2009 - 2009 International Conference on Computer Technology and Development, Kota Kinabalu, 2009, vol. 1, pp. 535-539