151 research outputs found

    Secure And Effective Image Authentication And Copyright Protection Using Integer Wavelet Transform

    Get PDF
    Widespread usage of the internet and digital communication technologies, multimedia data may be vulnerable to piracy as unauthorized users can easily alter multimedia data such as image. To increase the robustness and security of images, a dual watermarking system were introduced by combining multiple watermarks into a single content. The use of multiple watermarks enhances the ability to detect and identify the copyright owner in the case of unauthorized use or any altering on the content. In this study, IWT and SVD based on human visual characteristics are proposed, to embed the watermark in the image, making it more resistant to attacks while lower the distortion on image quality. The method helps to ensure that RGB supported digital images are protected by copyright and can be authenticated if there is any tampering. Various geometrical, compression, and image processing attacks are used to test the effectiveness of the proposed approach. Hence, the test results are compared to other dual watermarking systems

    A single watermark based scheme for both protection and authentication of identities

    Get PDF
    The security of a watermarking scheme is mainly categorised as either robust or fragile. The former can withstand an authorised alteration/attack, primarily used in copyright protection. The latter follows a zero tolerance towards any modification, used primarily in content authentication processes. The existing literature in the field projects that two separate watermarks are required to make a watermarking scheme robust and fragile, thus making the overall process cumbersome and complex. A novel image watermarking scheme that uses only one watermark while achieving both goals of copyright protection and authentication of identities is presented. An unconventional concept of checkpointing is introduced, which equips the proposed scheme to be either robust or fragile, making it superior in its application versatility. First, watermark embedding within the host/original image is achieved by a combination of transform domain techniques along with a novel median-based embedding block selection procedure. Second, checkpointing is performed in the spatial domain. The watermarked image in the absence of an attack is correlated to the one that is being attacked, using the template energy comparison-based approach. In the case of the robust watermark, such checkpointing can establish whether the carried out attack is authorised or not, determining the successful recovery of the watermark or vice-versa. Moreover, in the case of the fragile watermark, a sole confirmation of the occurrence of an attack is sufficient to make the watermark recovery impossible. Finally, the experimental analysis of the proposed scheme illustrates its excellent performance and superiority over state-of-the-art methods within the field

    A novel multipurpose watermarking scheme capable of protecting and authenticating images with tamper detection and localisation abilities

    Get PDF
    Technologies that fall under the umbrella of Industry 4.0 can be classified into one of its four significant components: cyber-physical systems, the internet of things (IoT), on-demand availability of computer system resources, and cognitive computing. The success of this industrial revolution lies in how well these components can communicate with each other, and work together in finding the most optimised solution for an assigned task. It is achieved by sharing data collected from a network of sensors. This data is communicated via images, videos, and a variety of other signals, attracting unwanted attention of hackers. The protection of such data is therefore pivotal, as is maintaining its integrity. To this end, this paper proposes a novel image watermarking scheme with potential applications in Industry 4.0. The strategy presented is multipurpose; one such purpose is authenticating the transmitted image, another is curtailing the illegal distribution of the image by providing copyright protection. To this end, two new watermarking methods are introduced, one of which is for embedding the robust watermark, and the other is related to the fragile watermark. The robust watermark's embedding is achieved in the frequency domain, wherein the frequency coefficients are selected using a novel mean-based coefficient selection procedure. Subsequently, the selected coefficients are manipulated in equal proportion to embed the robust watermark. The fragile watermark's embedding is achieved in the spatial domain, wherein self-generated fragile watermark(s) is embedded by directly altering the pixel bits of the host image. The effective combination of two domains results in a hybrid scheme and attains the vital balance between the watermarking requirements of imperceptibility, security and capacity. Moreover, in the case of tampering, the proposed scheme not only authenticates and provides copyright protection to images but can also detect tampering and localise the tampered regions. An extensive evaluation of the proposed scheme on typical images has proven its superiority over existing state-of-the-art methods

    A Study And Analysis Of Watermarking Algorithms For Medical Images

    Get PDF
    Digital watermarking techniques hide digital data into digital images imperceptibly for different purposes and applications such as copyright protection, authentication, and data hiding. Teknik-teknik pembenaman tera air menyembunyikan data digit ke dalam imej-imej digit untuk pelbagai keperluan dan aplikasi seperti perlindungan hak cipta, pengesahan, dan penyembunyian data

    Discrete Wavelet Transform (DWT) Based Dual Watermarking For Authentication And Copyright Protection

    Get PDF
    Digital media faces significant challenges related to unauthorized access, manipulation, and copyright infringement, necessitating effective authentication and copyright protection mechanisms. This thesis proposes a novel dual watermarking scheme based on the Discrete Wavelet Transform (DWT) to address these concerns. The primary objective of the proposed scheme is to provide robust copyright protection. A watermark, carrying ownership and copyright information, is embedded in the spatial domain using the DWT. This watermark acts as a digital signature, enabling the identification and tracing of the rightful owner of the content. The frequency domain embedding enhances the watermark's robustness against common attacks. In addition to copyright protection, the scheme incorporates a fragile watermark for authentication purposes. The fragile watermark is embedded in the least significant bit which is highly sensitive to any modifications or tampering. By extracting and comparing the fragile watermark, the integrity and authenticity of the content can be verified. Comprehensive experimental evaluations have been conducted to assess the performance of the proposed dual watermarking scheme. The results demonstrate its effectiveness in providing robust copyright protection and authentication capabilities. The scheme exhibits high imperceptibility, preserving the visual quality of the watermarked content, while ensuring a high level of sensitivity to unauthorized alterations
    corecore