29 research outputs found

    Robust Logo Watermarking

    Get PDF
    Digital image watermarking is used to protect the copyright of digital images. In this thesis, a novel blind logo image watermarking technique for RGB images is proposed. The proposed technique exploits the error correction capabilities of the Human Visual System (HVS). It embeds two different watermarks in the wavelet/multiwavelet domains. The two watermarks are embedded in different sub-bands, are orthogonal, and serve different purposes. One is a high capacity multi-bit watermark used to embed the logo, and the other is a 1-bit watermark which is used for the detection and reversal of geometrical attacks. The two watermarks are both embedded using a spread spectrum approach, based on a pseudo-random noise (PN) sequence and a unique secret key. Robustness against geometric attacks such as Rotation, Scaling, and Translation (RST) is achieved by embedding the 1-bit watermark in the Wavelet Transform Modulus Maxima (WTMM) coefficients of the wavelet transform. Unlike normal wavelet coefficients, WTMM coefficients are shift invariant, and this important property is used to facilitate the detection and reversal of RST attacks. The experimental results show that the proposed watermarking technique has better distortion parameter detection capabilities, and compares favourably against existing techniques in terms of robustness against geometrical attacks such as rotation, scaling, and translation

    Watermarking for multimedia security using complex wavelets

    Get PDF
    This paper investigates the application of complex wavelet transforms to the field of digital data hiding. Complex wavelets offer improved directional selectivity and shift invariance over their discretely sampled counterparts allowing for better adaptation of watermark distortions to the host media. Two methods of deriving visual models for the watermarking system are adapted to the complex wavelet transforms and their performances are compared. To produce improved capacity a spread transform embedding algorithm is devised, this combines the robustness of spread spectrum methods with the high capacity of quantization based methods. Using established information theoretic methods, limits of watermark capacity are derived that demonstrate the superiority of complex wavelets over discretely sampled wavelets. Finally results for the algorithm against commonly used attacks demonstrate its robustness and the improved performance offered by complex wavelet transforms

    A Survey on Techniques to Protect Video files Using Watermarking

    Get PDF
    In this advanced age the principle issue with multimedia documents like picture and video is theft. The Radical increment in trades of information over the web and the incessant utilization of advanced medium has been watched. Computerized data can be shielded from unapproved get to and sharing through watermarking. Digital watermarking is the methodology of inserting some applicable data in the host signal. With the utilization of watermarking systems on unique medium, licensed innovation rights can be saved over web. An investigation deals with various elements and techniques for computerized watermarking has been carried out and introduced in this paper

    Robust Image Watermarking Using QR Factorization In Wavelet Domain

    Get PDF
    A robust blind image watermarking algorithm in wavelet transform domain (WT) based on QR factorization, and quantization index modulation (QIM) technique is presented for legal protection of digital images. The host image is decomposed into wavelet subbands, and then the approximation subband is QR factorized. The secret watermark bit is embedded into the R vector in QR using QIM. The experimental results show that the proposed algorithm preserves the high perceptual quality. It also sustains against JPEG compression, and other image processing attacks. The comparison analysis demonstrates the proposed scheme has better performance in imperceptibility and robustness than the previously reported watermarking algorithms

    Secretive Data Transactions Using Quantum Key in Wireless Networks

    Get PDF
    Currently uses of wireless devices are increased rapidly. In real time environment, secret communication between two wireless devices plays a major role. Generally in wireless network evaluation of private key extraction, involves to extract d bits having very low entropy in Received Signal Strength (RSS). But it is not suitable for moving devices. In an existing system use an adaptive secret key generation scheme for providing a secret communication between two wireless devices. The security of this scheme mainly follows reciprocity principle. It state that the process of identifying the channel fluctuation using adaptive lossy quantizer concurrent with Cascade-based information reconciliation and privacy amplification. In the proposed system, the Delay-bounded sink mobility problem of WSNs used to avoid the delay of data delivery. WSNs are arranged to monitor the adjacent environment and the data generation rate of sensors can be estimated accurately.to avoid the delay of data delivery. WSNs are arranged to monitor the adjacent environment and the data generation rate of sensors can be estimated accurately. The benefits of involving a mobile sink and the impact of network parameters are increased. Mainly the number of sensors used is reduced.

    Towards a Universal Multiresolution-Based Perceptual Model

    Get PDF
    Following a recently introduced perceptual model for balanced multiwavelets, we outline, in this paper, an extension of our previous work and propose a new perceptual model for scalar wavelets. The proposed model is derived using multiresolution domain extensions of our previous scheme. Unlike existing models, the proposed one depends only on the image activity and not the filter sets used by the transform. The perceptual redundancy, present in the image, is efficiently quantified through a just-noticeable distortion (JND) profile. In this model, a visibility threshold of distortion is assigned to each wavelet subband coefficient. Therefore, perceptually insignificant subband components can be clearly discriminated from perceptually significant ones. For instance, this discrimination can be constructively used to achieve the imperceptibility requirement often encountered in watermarking and data hiding applications. Furthermore, we illustrate, through simulation, the ability of the proposed model to efficiently capture the salient features of the underlying image regardless of the wavelet filters being used
    corecore