923 research outputs found

    Perceptual Copyright Protection Using Multiresolution Wavelet-Based Watermarking And Fuzzy Logic

    Full text link
    In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying. This paper deals with a fuzzy inference filter to choose the larger entropy of coefficients to embed watermarks. Unlike most previous watermarking frameworks which embedded watermarks in the larger coefficients of inner coarser subbands, the proposed technique is based on utilizing a context model and fuzzy inference filter by embedding watermarks in the larger-entropy coefficients of coarser DWT subbands. The proposed approaches allow us to embed adaptive casting degree of watermarks for transparency and robustness to the general image-processing attacks such as smoothing, sharpening, and JPEG compression. The approach has no need the original host image to extract watermarks. Our schemes have been shown to provide very good results in both image transparency and robustness.Comment: 13 pages, 7 figure

    Spread spectrum-based video watermarking algorithms for copyright protection

    Get PDF
    Merged with duplicate record 10026.1/2263 on 14.03.2017 by CS (TIS)Digital technologies know an unprecedented expansion in the last years. The consumer can now benefit from hardware and software which was considered state-of-the-art several years ago. The advantages offered by the digital technologies are major but the same digital technology opens the door for unlimited piracy. Copying an analogue VCR tape was certainly possible and relatively easy, in spite of various forms of protection, but due to the analogue environment, the subsequent copies had an inherent loss in quality. This was a natural way of limiting the multiple copying of a video material. With digital technology, this barrier disappears, being possible to make as many copies as desired, without any loss in quality whatsoever. Digital watermarking is one of the best available tools for fighting this threat. The aim of the present work was to develop a digital watermarking system compliant with the recommendations drawn by the EBU, for video broadcast monitoring. Since the watermark can be inserted in either spatial domain or transform domain, this aspect was investigated and led to the conclusion that wavelet transform is one of the best solutions available. Since watermarking is not an easy task, especially considering the robustness under various attacks several techniques were employed in order to increase the capacity/robustness of the system: spread-spectrum and modulation techniques to cast the watermark, powerful error correction to protect the mark, human visual models to insert a robust mark and to ensure its invisibility. The combination of these methods led to a major improvement, but yet the system wasn't robust to several important geometrical attacks. In order to achieve this last milestone, the system uses two distinct watermarks: a spatial domain reference watermark and the main watermark embedded in the wavelet domain. By using this reference watermark and techniques specific to image registration, the system is able to determine the parameters of the attack and revert it. Once the attack was reverted, the main watermark is recovered. The final result is a high capacity, blind DWr-based video watermarking system, robust to a wide range of attacks.BBC Research & Developmen

    A study and some experimental work of digital image and video watermarking

    Get PDF
    The rapid growth of digitized media and the emergence of digital networks have created a pressing need for copyright protection and anonymous communications schemes. Digital watermarking (or data hiding in a more general term) is a kind of steganography technique by adding information into a digital data stream. Several most important watermarking schemes applied to multilevel and binary still images and digital videos were studied. They include schemes based on DCT (Discrete Cosine Transform), DWT (Discrete Wavelet Transform), and fractal transforms. The question whether these invisible watermarking techniques can resolve the issue of rightful ownership of intellectual properties was discussed. The watermarking schemes were further studied from malicious attack point of view, which is considered an effective way to advance the watermarking techniques. In particular, the StirMark robustness tests based on geometrical distortion were carried out. A binary watermarking scheme applied in the DCT domain is presented in this research project. The effect of the binarization procedure necessarily encountered in dealing with binary document images is found so strong that most of conventional embedding schemes fail in dealing with watermarking of binary document images. Some particular measures have to be taken. The initial simulation results indicate that the proposed technique is promising though further efforts need to be made

    The application of nonlinear bistable detectors to DCT-domain watermarking schemes

    Get PDF
    Copyright 2008 Society of Photo-Optical Instrumentation Engineers. This paper was published in Complex Systems II, edited by Derek Abbott, Tomaso Aste, Murray Batchelor, Robert Dewar, Tiziana Di Matteo, Tony Guttmann, Proc. of SPIE Vol. 6802, 680215 and is made available as an electronic reprint with permission of SPIE. One print or electronic copy may be made for personal use only. Systematic or multiple reproduction, distribution to multiple locations via electronic or other means, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper are prohibited.A DCT-domain watermarking scheme, based on nonlinear bistable detectors, is presented. A binary copyright character, i.e. watermark, is firstly reordered into a binary zig-zag sequence, and then mapped into pulse amplitude modulated waveforms. A certain desynchronization time delay can be arbitrarily placed into one code of the modulated signal, and is tolerated due to the superior robustness of nonlinear detectors over matched filters. The watermark signal is then embedded in a selected set of DCT coefficients of an image in a medium frequency range. The selected set of DCT coefficients is shuffled via the Arnold transform and looks more like background noise with respect to the watermark signal. The copyright character can be extracted by the nonlinear bistable detector without prior knowledge of the original image, i.e. blind watermark detection. Interestingly, a higher match between the original watermark character and the extracted one can be further achieved using a parallel array of bistable detectors via the mechanism of array stochastic resonance. Robustness of the proposed watermarking scheme is shown in the presence of noise, filtering, cropping and compression.Fabing Duan and Derek Abbot

    Diffractive triangulation of radiative point sources

    Get PDF
    We describe a general method to determine the location of a point source of waves relative to a twodimensional single-crystalline active pixel detector. Based on the inherent structural sensitivity of crystalline sensor materials, characteristic detector diffraction patterns can be used to triangulate the location of a wave emitter. The principle described here can be applied to various types of waves, provided that the detector elements are suitably structured. As a prototypical practical application of the general detection principle, a digital hybrid pixel detector is used to localize a source of electrons for Kikuchi diffraction pattern measurements in the scanning electron microscope. This approach provides a promising alternative method to calibrate Kikuchi patterns for accurate measurements of microstructural crystal orientations, strains, and phase distributions

    Hybrid chaotic map with L-shaped fractal Tromino for image encryption and decryption

    Get PDF
    Insecure communication in digital image security and image storing are considered as important challenges. Moreover, the existing approaches face problems related to improper security at the time of image encryption and decryption. In this research work, a wavelet environment is obtained by transforming the cover image utilizing integer wavelet transform (IWT) and hybrid discrete cosine transform (DCT) to completely prevent false errors. Then the proposed hybrid chaotic map with L-shaped fractal Tromino offers better security to maintain image secrecy by means of encryption and decryption. The proposed work uses fractal encryption with the combination of L-shaped Tromino theorem for enhancement of information hiding. The regions of L-shaped fractal Tromino are sensitive to variations, thus are embedded in the watermark based on a visual watermarking technique known as reversible watermarking. The experimental results showed that the proposed method obtained peak signal-to-noise ratio (PSNR) value of 56.82dB which is comparatively higher than the existing methods that are, Beddington, free, and Lawton (BFL) map with PSNR value of 8.10 dB, permutation substitution, and Boolean operation with PSNR value of 21.19 dB and deoxyribonucleic acid (DNA) level permutation-based logistic map with PSNR value of 21.27 dB

    Tree-Ring Watermarks: Fingerprints for Diffusion Images that are Invisible and Robust

    Full text link
    Watermarking the outputs of generative models is a crucial technique for tracing copyright and preventing potential harm from AI-generated content. In this paper, we introduce a novel technique called Tree-Ring Watermarking that robustly fingerprints diffusion model outputs. Unlike existing methods that perform post-hoc modifications to images after sampling, Tree-Ring Watermarking subtly influences the entire sampling process, resulting in a model fingerprint that is invisible to humans. The watermark embeds a pattern into the initial noise vector used for sampling. These patterns are structured in Fourier space so that they are invariant to convolutions, crops, dilations, flips, and rotations. After image generation, the watermark signal is detected by inverting the diffusion process to retrieve the noise vector, which is then checked for the embedded signal. We demonstrate that this technique can be easily applied to arbitrary diffusion models, including text-conditioned Stable Diffusion, as a plug-in with negligible loss in FID. Our watermark is semantically hidden in the image space and is far more robust than watermarking alternatives that are currently deployed. Code is available at https://github.com/YuxinWenRick/tree-ring-watermark.Comment: 16 pages, 8 figures, code is available at https://github.com/YuxinWenRick/tree-ring-watermark, fixed the repo lin

    Paper watermark imaging using electron and low energy x-ray radiography

    Get PDF
    Historians and librarians are interested in watermarks and mould surface patterns in historic papers, because they represent the “fingerprints” of antique papers. However, these features are usually covered or hidden by printing, writing or other media. Different techniques have been developed to extract the watermarks in the paper while avoiding interference from media on the paper. Beta radiography provides good results, but this method cannot be widely used because of radiation safety regulations and the long exposure times required due to weak isotope sources employed. In this work, two promising methods are compared which can be used to extract digital high-resolution images for paper watermarks and these are electron radiography and low energy X-ray radiography. For electron radiography a “sandwich” of a lead sheet, the paper object, and a film in a dark cassette, is formed and it is exposed at higher X-ray potentials (\u3e 300 kV). The photoelectrons escaping from the lead sheet penetrate the paper and expose the film. After development, the film captures the watermark and mould surface pattern images for the paper being investigated. These images are then digitized using an X-ray film digitizer. The film employed could potentially be replaced by a special type of imaging plate with a very thin protection layer to directly generate digital images using computed radiography (CR). For the second method, a low energy X-ray source is used with the specimen paper placed on a digital detector array (DDA). This method directly generates a low energy digital radiography (DR) image. Both methods provide high quality images without interference from the printing media, and provide the potential to generate a “fingerprint” database for historical papers. There were nevertheless found to be differences in the images obtained using the two methods. The second method, using a low energy X-ray source, has the potential to be integrated in a portable device with a small footprint incorporating user safety requirements. Differences obtained using the two methods are shown and discussed
    • …
    corecore