75 research outputs found

    Colour image watermarking based on wavelet and QR decomposition

    Get PDF
    In this work, a new image watermarking algorithm on colour images is proposed. The proposed algorithm divides a cover image into three colour bands of red, green and blue. Then the following tasks are done on all three channels separately. First, Each colour band is divided into patches of small sizes then the entropy of each patch is calculated. At this step a threshold is found based on the average entropy of all patches and following is applied to all patches which have entropy lower than the threshold. A wavelet representation of each patch are given by applying a discrete wavelet transform. Then Singular value decomposition, orthogonal-triangular decomposition, and a chirp z-transform are used to embed a watermark on the cover image. Several signal processing attacks are applied on watermarked images in order to robustness of the algorithm. The Proposed algorithm is compared with one conventional and two state-of-the-art algorithms. Experimental results show superiority of the proposed algorithm compare with other algorithm in the area of image watermarking

    Entropy Based Robust Watermarking Algorithm

    Get PDF
    Tänu aina kasvavale multimeedia andmeedastus mahtudele Internetis, on esile kerkinud mured turvalisusest ja piraatlusest. Digitaalse meedia paljundamise ja muutmise maht on loonud vajaduse digitaalse meedia vesimärgistamise järgi. Selles töös on tutvustatud vastupidavaid vesimärkide lisamise algoritme, mis lisavad vesimärgid madala entroopiaga pildi osadesse. Välja pakutud algoritmides jagatakse algne pilt blokkidesse ning arvutatakse iga bloki entroopia. Kõikide blokkide keskmine entroopia väärtus valitakse künniseks, mille järgi otsustatakse, millistesse blokkidesse vesimärk lisada. Kõik blokid, mille entroopia on väiksem kui künnis, viiakse signaali sageduse kujule kasutades Discrete Wavelet Transform algoritmi. Madala sagedusega sagedusvahemikule rakendatakse Chirp Z-Transform algoritmi ja saadud tulemusele LU-dekompositsiooni või QR-dekompositsiooni. Singular Value Decomposition meetodi rakendamisel diagonaalmaatriksile, mis saadi eelmisest sammust, saadakse iga bloki vastav väärtus. Vesimärk lisatakse pildile, liites iga bloki arvutatud väärtusele vesimärgi Singular Value Decomposition meetodi tulemused. Kirjeldatud algoritme testiti ning võrreldi teiste tavapärast ning uudsete vesimärkide lisamise tehnoloogiatega. Kvantitatiivsed ja kvalitatiivsed eksperimendid näitavad, et välja pakutud meetodid on tajumatud ning vastupidavad signaali töötlemise rünnakutele.With growth of digital media distributed over the Internet, concerns about security and piracy have emerged. The amount of digital media reproduction and tampering has brought a need for content watermarking. In this work, multiple robust watermarking algorithms are introduced. They embed watermark image into singular values of host image’s blocks with low entropy values. In proposed algorithms, host image is divided into blocks, and the entropy of each block is calculated. The average of all entropies indicates the chosen threshold value for selecting the blocks in which watermark image should be embedded. All blocks with entropy lower than the calculated threshold are decomposed into frequency subbands using discrete wavelet transform (DWT). Subsequently chirp z-transform (CZT) is applied to the low-frequency subband followed by an appropriate matrix decomposition such as lower and upper decomposition (LUD) or orthogonal-triangular decomposition (QR decomposition). By applying singular value decomposition (SVD) to diagonal matrices obtained by the aforementioned matrix decompositions, the singular values of each block are calculated. Watermark image is embedded by adding singular values of the watermark image to singular values of the low entropy blocks. Proposed algorithms are tested on many host and watermark images, and they are compared with conventional and other state-of-the-art watermarking techniques. The quantitative and qualitative experimental results are indicating that the proposed algorithms are imperceptible and robust against many signal processing attacks

    A novel QR-code based watermarking scheme for digital rights

    Get PDF
    This paper presents a digital rights protection scheme for both colour and grayscale images using a novel approach that combines watermarking and cryptography. The schema involves two parties: the owner of the digital rights and a generic user who acquired some rights on a copy of the image that will be watermarked. The watermark, a QR code derived from a signed “License Agreement”, is repeatedly inserted, and scrambled, by the image right’s owner, into the frequency components of the image, thus producing the watermarked image. The schema, a non-blind type, achieves good perceptive quality and fair robustness using the 3rd level of the Discrete Wavelet Transform. The experimental results show that, inserting more occurrences of a scrambled QR code, the proposed algorithm is quite resistant to JPEG compression, rotation, cropping and salt & peeper noise

    DWT and QR code based watermarking for document DRM

    Get PDF
    Questo articolo presenta uno schema per la protezione dei diritti digitali per ogni tipo di documento presentato come immagine, usando passi che usano la crittografia e il watermarking. Le entità coinvolte in questo processo sono due: il proprietario del documento che ne possiede i diritti digitali e un utente generico che può scaricare o vedere una versione con watermark del documento originale. La versione con watermark contiene un codice QR che è inserito ripetutamente, e criptato, dal proprietario dei diritti sul documento, nelle componenti in frequenza dell'immagine, così producendo l'immagine con watermark. Il codice QR contiene un identificativo firmato che univocamente identifica ogni utente che usa il sistema. Lo schema, di tipo non-cieco, raggiunge una buona qualità percettiva e una discreta robustezza usando il terzo livello della Trasformata Discreta basata su Wavelet. I risultati sperimentali mostrano che tramite l'inserzione di diverse occorrenze di un codice QR criptato otteniamo un approccio che è piuttosto resistente alla compressione JPEG, alla rotazione, al ritaglio, e al rumore sale e pepe.This paper presents a digital rights protection scheme for every type of document presented as an image, by using steps that use cryptography and watermarking. The entities involved in this process are two: the owner of the document that owns its digital rights and a generic user who can download or view a watermarked version of the original document. The watermarked version contains a QR code that is repeatedly inserted, and scrambled, by the document rights owner, into the frequency components of the image, thus producing the watermarked image. The QR code contains a signed ID that uniquely identifies every users using the system. The schema, a non-blind type, achieves good perceptive quality and fair robustness using the third level of the Discrete Wavelet Transform. The experimental results show that by inserting several occurrences of a scrambled QR code we get an approach that is quite resistant to JPEG compression, rotation, cropping, and salt and pepper noise

    A Robust Color Image Watermarking Scheme Using Entropy and QR Decomposition

    Get PDF
    Internet has affected our everyday life drastically. Expansive volumes of information are exchanged over the Internet consistently which causes numerous security concerns. Issues like content identification, document and image security, audience measurement, ownership, copyrights and others can be settled by using digital watermarking. In this work, robust and imperceptible non-blind color image watermarking algorithm is proposed, which benefit from the fact that watermark can be hidden in different color channel which results into further robustness of the proposed technique to attacks. Given method uses some algorithms such as entropy, discrete wavelet transform, Chirp z-transform, orthogonal-triangular decomposition and Singular value decomposition in order to embed the watermark in a color image. Many experiments are performed using well-known signal processing attacks such as histogram equalization, adding noise and compression. Experimental results show that proposed scheme is imperceptible and robust against common signal processing attacks

    Robust Image Watermarking Using QR Factorization In Wavelet Domain

    Get PDF
    A robust blind image watermarking algorithm in wavelet transform domain (WT) based on QR factorization, and quantization index modulation (QIM) technique is presented for legal protection of digital images. The host image is decomposed into wavelet subbands, and then the approximation subband is QR factorized. The secret watermark bit is embedded into the R vector in QR using QIM. The experimental results show that the proposed algorithm preserves the high perceptual quality. It also sustains against JPEG compression, and other image processing attacks. The comparison analysis demonstrates the proposed scheme has better performance in imperceptibility and robustness than the previously reported watermarking algorithms

    Wavelet based digital art protection

    Get PDF
    This thesis objective is to provide a robust watermarking algorithm to protect digital images. The proposed algorithm is using wavelet-based watermarking in which we are investigating how embedding in high-frequency subbands and low-frequency subbands would affect the robustness of the watermark while facing typical signal processing attacks

    Robust Logo Watermarking

    Get PDF
    Digital image watermarking is used to protect the copyright of digital images. In this thesis, a novel blind logo image watermarking technique for RGB images is proposed. The proposed technique exploits the error correction capabilities of the Human Visual System (HVS). It embeds two different watermarks in the wavelet/multiwavelet domains. The two watermarks are embedded in different sub-bands, are orthogonal, and serve different purposes. One is a high capacity multi-bit watermark used to embed the logo, and the other is a 1-bit watermark which is used for the detection and reversal of geometrical attacks. The two watermarks are both embedded using a spread spectrum approach, based on a pseudo-random noise (PN) sequence and a unique secret key. Robustness against geometric attacks such as Rotation, Scaling, and Translation (RST) is achieved by embedding the 1-bit watermark in the Wavelet Transform Modulus Maxima (WTMM) coefficients of the wavelet transform. Unlike normal wavelet coefficients, WTMM coefficients are shift invariant, and this important property is used to facilitate the detection and reversal of RST attacks. The experimental results show that the proposed watermarking technique has better distortion parameter detection capabilities, and compares favourably against existing techniques in terms of robustness against geometrical attacks such as rotation, scaling, and translation

    Visual secret sharing and related Works -A Review

    Get PDF
    The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used to protect private digital photos from illegal editing and copying. SIS can be classified into two types: single-secret sharing (SSS) and multi-secret sharing (MSS). In SSS, a single secret image is divided into multiple shares, while in MSS, multiple secret images are divided into multiple shares. Both SSS and MSS ensure that the original secret images cannot be reconstructed without the correct combination of shares. Therefore, several secret image-sharing methods have been developed depending on these two methods for example visual cryptography, steganography, discrete wavelet transform, watermarking, and threshold. All of these techniques are capable of randomly dividing the secret image into a large number of shares, each of which cannot provide any information to the intrusion team.  This study examined various visual secret-sharing schemes as unique examples of participant secret-sharing methods. Several structures that generalize and enhance VSS were also discussed in this study on covert image-sharing protocols and also this research also gives a comparative analysis of several methods based on various attributes in order to better concentrate on the future directions of the secret image. Generally speaking, the image quality generated employing developed methodologies is preferable to the image quality achieved through using the traditional visual secret-sharing methodology
    • …
    corecore