12.07.2015 Views

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

104 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 2, NO. 2, MAY 2010Our experiments show that for group <strong>of</strong> attacks likeJPEG compression, resiz<strong>in</strong>g, add<strong>in</strong>g noise the proposedmethod can be able to extract the copyright image withless loss <strong>in</strong> the quality.Figure 3(a)Reconstructed image us<strong>in</strong>g shadowimage 1 and shadow image 2Figure 5(a) Resized Embedded ImageFigure 3(b)Reconstructed image us<strong>in</strong>g shadowimage 1 and shadow image 3Figure 5(b)Extracted Copyright image when the embeddedimage is resizedFig 5 shows the Resized embedded image <strong>in</strong> part(a) andthe extracted copyright image when the embedded imageis resized <strong>in</strong> part(b)Figure 3(c)Reconstructed image us<strong>in</strong>g shadowimage 2 and shadow image 3Fig 3 shows the Reconstructed image us<strong>in</strong>g shadowimages 2(a) and 2(b) <strong>in</strong> part(a) Reconstructed imageus<strong>in</strong>g shadow images 2(a) and 2(c) <strong>in</strong> part(b) andReconstructed image us<strong>in</strong>g shadow images 2(a) and 2(c)<strong>in</strong> part(c).Watermark extraction processFigure 6(a) Compressed Embedded ImageFigure 6(b)Extracted Copyright image when the embeddedimage is CompressedFig 6 shows the compressed embedded image <strong>in</strong> part (a)and the extracted copyright image when the embeddedimage is compressed <strong>in</strong> part (b)Figure 4(a) Embedded imageFigure 7(a) Embedded Image with added noiseFigure 4(b)Extracted copyright imageFig 4 shows the embedded image <strong>in</strong> part (a) and theextracted copyright image <strong>in</strong> part (b)Attacks on the Proposed MethodFigure 7(b)Extracted Copyright image when the embeddedimage is added with noise© 2010 ACADEMY PUBLISHER

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!