12 research outputs found
An improvement of RGB color image watermarking technique using ISB stream bit and Hadamard matrix
In the past half century, the advancement of internet technology has been rapid and widespread. The innovation provides an efficient platform for human communication and other digital applications. Nowadays, everyone can easily access, copy, modify and distribute digital contents for personal or commercial gains. Therefore, a good copyright protection is required to discourage the illicit activities. On way is to watermark the assets by embedding an owner's identity which could later on be used for authentication. Thus far, many watermarking techniques have been proposed which focus on improving three standard measures, visual quality or imperceptibility, robustness and capacity. Although their performances are encouraging, there are still plenty of rooms for improvements. Thus, this study proposes a new watermarking technique using Least Significant Bit (LSB) insertion approach coupled with Hadamard matrix. The technique involves four main stages: Firstly, the cover image is decomposed into three separate channels, Red, Green and Blue. Secondly, the Blue channel is chosen and converted into an eight bit stream. Thirdly, the second least signification bit is selected from the bit stream for embedding. In order to increase the imperceptibility a Hadamard matrix is used to find the best pixels of the cover image for the embedding task. Experimental results on standard dataset have revealed that average PSNR value is greater than 58db, which indicates the watermarked image is visually identical to its original. However, the proposed technique suffers from Gaussian and Poisson noise attacks
Performance analysis of gray code number system in image security
The encryption of digital images has become essential since it is vulnerable to interception while being transmitted or stored. A new image encryption algorithm to address the security challenges of traditional image encryption algorithms is presented in this research. The proposed scheme transforms the pixel information of an original image by taking into consideration the pixel location such that two neighboring pixels are processed via two separate algorithms. The proposed scheme utilized the Gray code number system. The experimental results and comparison shows the encrypted images were different from the original images. Also, pixel histogram revealed that the distribution of the plain images and their decrypted images have the same pixel histogram distributions, which means that there is a high correlation between the original images and decrypted images. The scheme also offers strong resistance to statistical attacks
An enhanced method based on intermediate significant bit technique for watermark images
Intermediate Significant Bit digital watermarking technique (ISB) is a new approved
technique of embedding a watermark by replacing the original image pixels with new pixels. This is done by ensuring a close connection between the new pixels and the original, and at the same time, the watermark data can be protected against possible damage. One of the most popular methods used in watermarking is the Least Significant Bit (LSB). It uses a spatial domain that includes the insertion of the
watermark in the LSB of the image. The problem with this method is it is not resilient to common damage, and there is the possibility of image distortion after embedding a watermark. LSB may be used through replacing one bit, two bits, or three bits; this is done by changing the specific bits without any change in the other bits in the pixel. The objective of this thesis is to formulate new algorithms for digital image watermarking with enhanced image quality and robustness by embedding two bits of watermark data into each pixel of the original image based on ISB technique. However, to understand the opposite relationship between the image quality and robustness, a tradeoff between them has been done to create a balance and to acquire the best position for the two embedding bits. Dual Intermediate Significant Bits (DISB) technique has been proposed to solve the existing LSB problem. Trial results
obtained from this technique are better compared with the LSB based on the Peak Signal to Noise Ratio (PSNR) and Normalized Cross Correlation (NCC). The work in this study also contributes new mathematical equations that can study the change on the other six bits in the pixel after embedding two bits
Digital Watermarking Algorithm for Color Images
Abstract: Digital watermarking methods describe the technologies that allow hiding of information in digital media such as images, video and audio. Watermarking techniques embed information in images by introducing changes that are imperceptible to the human eye but recoverable by a computer program. Generally, the watermark is a code to identify the owner of the image. The locations in which the watermark is embedded are determined by a secret key. Doing so prevents possible pirates from easily removing the watermark. Furthermore it should be possible to recover the watermark from an altered image. Possible alterations of watermarked images include compression, filtering and cropping. These alterations are referred to as attacks. The first watermarking application that might come to mind is related to copyright protection of digital media Watermarking algorithms have been proposed to protect varieties of content, such as official documents
Robust recursive watermarking technique in discrete wavelet transform
Presently, data sharing and information searching is easier to perform on the internet and has resulted in the digital contents becoming widely available and easily accessible. However, many users abuse these contents through piracy and forgery practices, thus there is a need for copyright protection which can be achieved with digital watermarking. A robust digital watermark should be able to withstand intentional and unintentional attacks but the various available techniques for watermarking have yet to attain the best defence performance against these attacks. This study proposed an alternative watermarking technique referred as Recursive Watermarking Technique (RWT) on digital image content where multiple watermarks are embedded in the host image. In this technique, multisegmentation was carried out. Embedding and extracting of watermark was performed in the Discrete Wavelet Transform (DWT) domain, after the image segmentation process. Besides that, reconstruction image stage was carried out to get the most robust watermark. These multiple watermarking processes in RWT have the capability to minimize the effect of the attacks. The robustness of RWT against attacks was tested against motion blur, Gaussian noise (1%, 5% and 10%), salt and pepper noise (0.02), cropped image, JPEG compression, intensity adjustment, sharpen and mosaic tile attacks. The results showed that RWT has a higher NC value which is equal to 1. At the same time, Gaussian blur, salt and pepper noise (0.05 and 0.1), and histogram equalization attacks gained an NC value of 0.99. These results imply that RWT is able to withstand the attacks successfully and performs better than the other known techniques
Data wiping tool: ByteEditor Technique
This Wiping Tool is an anti-forensic tool that is
built to wipe data permanently from laptop’s storage. This tool
is capable to ensure the data from being recovered with any
recovery tools. The objective of building this wiping tool is to
maintain the confidentiality and integrity of the data from
unauthorized access. People tend to delete the file in normal
way, however, the file face the risk of being recovered. Hence,
the integrity and confidentiality of the deleted file cannot be
protected. Through wiping tools, the files are overwritten with
random strings to make the files no longer readable. Thus, the
integrity and the confidentiality of the file can be protected.
Regarding wiping tools, nowadays, lots of wiping tools face issue
such as data breach because the wiping tools are unable to delete
the data permanently from the devices. This situation might
affect their main function and a threat to their users. Hence, a
new wiping tool is developed to overcome the problem. A new
wiping tool named Data Wiping tool is applying two wiping
techniques. The first technique is Randomized Data while the
next one is enhancing wiping technique, known as ByteEditor.
ByteEditor is a combination of two different techniques, byte
editing and byte deletion. With the implementation of Object�Oriented methodology, this wiping tool is built. This
methodology consists of analyzing, designing, implementation
and testing. The tool is analyzed and compared with other
wiping tools before the designing of the tool start. Once the
designing is done, implementation phase take place. The code of
the tool is created using Visual Studio 2010 with C# language
and being tested their functionality to ensure the developed tool
meet the objectives of the project. This tool is believed able to
contribute to the development of wiping tools and able to solve
problems related to other wiping tools
Recommended from our members
Design and analysis of Discrete Cosine Transform-based watermarking algorithms for digital images. Development and evaluation of blind Discrete Cosine Transform-based watermarking algorithms for copyright protection of digital images using handwritten signatures and mobile phone numbers.
This thesis deals with the development and evaluation of blind discrete cosine transform-based watermarking algorithms for copyright protection of digital still images using handwritten signatures and mobile phone numbers. The new algorithms take into account the perceptual capacity of each low frequency coefficients inside the Discrete Cosine Transform (DCT) blocks before embedding the watermark information. They are suitable for grey-scale and colour images. Handwritten signatures are used instead of pseudo random numbers. The watermark is inserted in the green channel of the RGB colour images and the luminance channel of the YCrCb images. Mobile phone numbers are used as watermarks for images captured by mobile phone cameras. The information is embedded multiple-times and a shuffling scheme is applied to ensure that no spatial correlation exists between the original host image and the multiple watermark copies. Multiple embedding will increase the robustness of the watermark against attacks since each watermark will be individually reconstructed and verified before applying an averaging process. The averaging process has managed to reduce the amount of errors of the extracted information. The developed watermarking methods are shown to be robust against JPEG compression, removal attack, additive noise, cropping, scaling, small degrees of rotation, affine, contrast enhancements, low-pass, median filtering and Stirmark attacks. The algorithms have been examined using a library of approximately 40 colour images of size 512 512 with 24 bits per pixel and their grey-scale versions. Several evaluation techniques were used in the experiment with different watermarking strengths and different signature sizes. These include the peak signal to noise ratio, normalized correlation and structural similarity index measurements. The performance of the proposed algorithms has been compared to other algorithms and better invisibility qualities with stronger robustness have been achieved
Recommended from our members
Digital Watermarking of Images towards Content Protection.
With the rapid growth of the internet and digital media techniques over the last decade, multimedia data such as images, video and audio can easily be copied, altered and distributed over the internet without any loss in quality. Therefore, protection of ownership of multimedia data has become a very significant and challenging issue. Three novel image watermarking algorithms have been designed and implemented for copyright protection. The first proposed algorithm is based on embedding multiple watermarks in the blue channel of colour images to achieve more robustness against attacks. The second proposed algorithm aims to achieve better trade-offs between imperceptibility and robustness requirements of a digital watermarking system. It embeds a watermark in adaptive manner via classification of DCT blocks with three levels: smooth, edges and texture, implemented in the DCT domain by analyzing the values of AC coefficients. The third algorithm aims to achieve robustness against geometric attacks, which can desynchronize the location of the watermark and hence cause incorrect watermark detection. It uses geometrically invariant feature points and image normalization to overcome the problem of synchronization errors caused by geometric attacks.
Experimental results show that the proposed algorithms are robust and outperform related techniques found in literature