8 research outputs found

    Wide spread spectrum watermarking with side information and interference cancellation

    Full text link
    Nowadays, a popular method used for additive watermarking is wide spread spectrum. It consists in adding a spread signal into the host document. This signal is obtained by the sum of a set of carrier vectors, which are modulated by the bits to be embedded. To extract these embedded bits, weighted correlations between the watermarked document and the carriers are computed. Unfortunately, even without any attack, the obtained set of bits can be corrupted due to the interference with the host signal (host interference) and also due to the interference with the others carriers (inter-symbols interference (ISI) due to the non-orthogonality of the carriers). Some recent watermarking algorithms deal with host interference using side informed methods, but inter-symbols interference problem is still open. In this paper, we deal with interference cancellation methods, and we propose to consider ISI as side information and to integrate it into the host signal. This leads to a great improvement of extraction performance in term of signal-to-noise ratio and/or watermark robustness.Comment: 12 pages, 8 figure

    State-of-the-art application of artificial neural network in digital watermarking and the way forward

    Get PDF
    Several high-ranking watermarking schemes using neural networks have been proposed in order to make the watermark stronger to resist attacks.The ability of Artificial Neural Network, ANN to learn, do mapping, classify, and adapt has increased the interest of researcher in application of different types ANN in watermarking.In this paper, ANN based approached have been categorized based on their application to different components of watermarking such as; capacity estimate, watermark embedding, recovery of watermark and error rate detection. We propose a new component of water marking, Secure Region, SR in which, ANN can be used to identify such region within the estimated capacity. Hence an attack-proof watermarking system can be achieved

    Combating rotation, dilation and translation in digital watermarking.

    Get PDF
    by Yeung Siu Wai.Thesis (M.Phil.)--Chinese University of Hong Kong, 2000.Includes bibliographical references (leaves 59-[62]).Abstracts in English and Chinese.Chapter 1 --- Introduction --- p.1Chapter 2 --- Background --- p.4Chapter 2.1 --- Properties of a digital watermarking system --- p.5Chapter 2.2 --- Digital watermarking in still images: Spatial-domain vs Frequency- domain --- p.7Chapter 2.3 --- Capacity in digital watermarking --- p.8Chapter 3 --- A watermarking system --- p.10Chapter 3.1 --- Implementation of a watermarking system --- p.10Chapter 3.1.1 --- Embedding watermark --- p.11Chapter 3.1.2 --- Detecting watermark --- p.14Chapter 3.2 --- Robustness testing on the watermarking system --- p.18Chapter 3.3 --- Geometric attacks to the watermark system --- p.18Chapter 3.3.1 --- "The three distortions: Translation, Dilation and Rotation" --- p.19Chapter 3.3.2 --- The commutative property of rotation and dilation --- p.25Chapter 3.3.3 --- Implementation of geometric transform --- p.25Chapter 4 --- General Defense on Geometric Distortions --- p.28Chapter 4.1 --- Special designed watermark --- p.29Chapter 4.1.1 --- Ring-shaped watermark --- p.29Chapter 4.1.2 --- Phase Taylor invariance --- p.30Chapter 4.1.3 --- "Rotation, dilation and translation invariant watermark" --- p.31Chapter 4.2 --- Distortion detection --- p.34Chapter 4.2.1 --- Brute-force method --- p.35Chapter 4.2.2 --- Interactive method --- p.37Chapter 5 --- Specific Defense in Geometric Distortions - Phase angle com- parison --- p.43Chapter 5.1 --- Translation Detection --- p.44Chapter 5.2 --- Dilation Detection --- p.46Chapter 5.3 --- Rotation Detection --- p.49Chapter 6 --- Further work --- p.54Chapter 6.1 --- Large scale distortion detection --- p.54Chapter 6.2 --- Mixed geometric distortions --- p.55Chapter 7 --- Conclusion --- p.57Bibliography --- p.5

    Moment tabanlı normalleştirmeye dayalı sayısal görüntü damgalama yöntemleri

    Get PDF
    06.03.2018 tarihli ve 30352 sayılı Resmi Gazetede yayımlanan “Yükseköğretim Kanunu İle Bazı Kanun Ve Kanun Hükmünde Kararnamelerde Değişiklik Yapılması Hakkında Kanun” ile 18.06.2018 tarihli “Lisansüstü Tezlerin Elektronik Ortamda Toplanması, Düzenlenmesi ve Erişime Açılmasına İlişkin Yönerge” gereğince tam metin erişime açılmıştır.Bu çalışmada Moment Tabanlı Görüntü Normalleştirme kullanılarak iki boyutlu ayrık dalgacık ve karmaşık dalgacık dönüşüm uzaylarında dayanıklı sayısal görüntü damgalama algoritmaları geliştirilmiştir. Önerilen damgalama algoritmalarında normalleştirme işlemi geometrik bozunumlara karşı dayanıklılığı sağlarken, damganın dalgacık uzayında eklenmesi gürültü, doğrusal ve doğrusal olmayan filtreleme, JPEG sıkıştırması gibi saldırılara karşı damganın dayanıklılığını arttırmıştır. İnsan görme sisteminin özellikleri göz önünde bulundurularak, eklenen damganın hem algısal saydamlık hem de dayanıklılık gereksinimlerini aynı anda sağlaması başarılmıştır. Sunulan yöntem literatürde sıklıkla kullanılan iki yöntemle karşılaştırılmıştır. Simülasyon sonuçları, önerilen yöntemin, JPEG ve JPEG2000 sıkıştırması, çeşitli geometrik dönüşümler ve bazı görüntü işleme saldırılarına karşı her iki yöntemden de daha iyi sonuçlar verdiğini göstermiştir. Daha sonra, normalleştirmenin damgalama kapasitesi üzerindeki etkisi Moulin ve Mıhçak tarafından önerilen bilgi-teorisi tabanlı kapasite kestirim yöntemi kullanılarak ayrık kosinüs ve dalgacık uzaylarında araştırılmıştır. Kapasite analizi sonuçları, görüntünün dönüşümündeki sıfır değerli katsayıların sayısının kapasiteyi belirlediğini göstermiştir. Normalleştirme işlemi bir görüntünün dönüşümündeki sıfır değerli katsayı sayısını arttırdığından, damgalama algoritmalarında ön işlem olarak kullanıldığında daha iyi kapasite kestirim sonucu vermektedir. Bir görüntünün dalgacık dönüşümündeki sıfır değerli katsayı sayısı DCT dönüşümündekinden daha fazla olduğundan kapasite önemli olduğunda dalgacık dönüşümünün tercih edilmesi gereklidir.In this study, robust digital image watermarking algorithms in two dimensional discrete wavelet and complex wavelet domains were developed by using the moment based image normalization. In the proposed methods, while the normalization provides robustness against geometrical distortions, the fact that watermark is added in the wavelet domain achieves immunity for attacks such a noise, linear and non-linear filtering and JPEG compression. That the watermark meets transparency and robustness requirements simultaneously was obtained by taking the properties of the human visual system into account. The proposed method was compared to two commonly used digital image watermarking algorithms. Simulation results have shown that the proposed method gives better results that both of the commonly used algorithms in term of various geometrical distortions and several image processing attacks. Then, the effects of the normalization on watermarking capacity in discrete cosine and wavelet domains were investigated by using the information theory based capacity estimation method developed by Moulin and Mıhçak. The results of the capacity analysis have demonstrated that transform coefficients sparsity of an image determines the capacity. Since the normalization process increases transform coefficients sparsity of an image , it results in better capacity estimates when it is used as a preprocessing step watermarking algorithms. As the wavelet models capture sparsity better than the DCT models, wavelet transform must be preferred when capacity is the main concern

    Collusion-resistant fingerprinting for multimedia in a broadcast channel environment

    Get PDF
    Digital fingerprinting is a method by which a copyright owner can uniquely embed a buyer-dependent, inconspicuous serial number (representing the fingerprint) into every copy of digital data that is legally sold. The buyer of a legal copy is then deterred from distributing further copies, because the unique fingerprint can be used to trace back the origin of the piracy. The major challenge in fingerprinting is collusion, an attack in which a coalition of pirates compare several of their uniquely fingerprinted copies for the purpose of detecting and removing the fingerprints. The objectives of this work are two-fold. First, we investigate the need for robustness against large coalitions of pirates by introducing the concept of a malicious distributor that has been overlooked in prior work. A novel fingerprinting code that has superior codeword length in comparison to existing work under this novel malicious distributor scenario is developed. In addition, ideas presented in the proposed fingerprinting design can easily be applied to existing fingerprinting schemes, making them more robust to collusion attacks. Second, a new framework termed Joint Source Fingerprinting that integrates the processes of watermarking and codebook design is introduced. The need for this new paradigm is motivated by the fact that existing fingerprinting methods result in a perceptually undistorted multimedia after collusion is applied. In contrast, the new paradigm equates the process of collusion amongst a coalition of pirates, to degrading the perceptual characteristics, and hence commercial value of the multimedia in question. Thus by enforcing that the process of collusion diminishes the commercial value of the content, the pirates are deterred from attacking the fingerprints. A fingerprinting algorithm for video as well as an efficient means of broadcasting or distributing fingerprinted video is also presented. Simulation results are provided to verify our theoretical and empirical observations
    corecore