64 research outputs found

    Multiple Content Adaptive Intelligent Watermarking Schemes for the Protection of Blocks of a Document Image

    Get PDF
    Most of the documents contain different types of information such as white space, static information and dynamic information or mix of static and dynamic information. In this paper, multiple watermarking schemes are proposed for protection of the information content. The proposed approach comprises of three phases. In Phase-1, the edges of the source document image are extracted and the edge image is decomposed into blocks of uniform size. In Phase-2, GLCM features like energy, homogeneity, contrast and correlation are extracted from each block and the blocks are classified as no-information, static, dynamic and mix of static and dynamic information content blocks. The adjacent blocks of same type are merged together into a single block. Each block is watermarked in Phase-3. The type and amount of watermarking applied is decided intelligently and adaptively based on the classification of the blocks which results in improving embedding capacity and reducing time complexity incurred during watermarking. Experiments are conducted exhaustively on all the images in the corpus. The experimental evaluations exhibit better classification of segments based on information content in the block. The proposed technique also outperforms the existing watermarking schemes on document images in terms of robustness, accuracy of tamper detection and recovery

    Improved ECG watermarking technique using curvelet transform

    Get PDF
    Hiding data in electrocardiogram signals are a big challenge due to the embedded information that can hamper the accuracy of disease detection. On the other hand, hiding data into ECG signals provides more security for, and authenticity of, the patient\u27s data. Some recent studies used non-blind watermarking techniques to embed patient information and data of a patient into ECG signals. However, these techniques are not robust against attacks with noise and show a low performance in terms of parameters such as peak signal to noise ratio (PSNR), normalized correlation (NC), mean square error (MSE), percentage residual difference (PRD), bit error rate (BER), structure similarity index measure (SSIM). In this study, an improved blind ECG-watermarking technique is proposed to embed the information of the patient\u27s data into the ECG signals using curvelet transform. The Euclidean distance between every two curvelet coefficients was computed to cluster the curvelet coefficients and after this, data were embedded into the selected clusters. This was an improvement not only in terms of extracting a hidden message from the watermarked ECG signals, but also robust against image-processing attacks. Performance metrics of SSIM, NC, PSNR and BER were used to measure the superiority of presented work. KL divergence and PRD were also used to reveal data hiding in curvelet coefficients of ECG without disturbing the original signal. The simulation results also demonstrated that the clustering method in the curvelet domain provided the best performance-even when the hidden messages were large size

    Imperceptible Image Watermarking based on Chinese Remainder Theorem over the Edges

    Get PDF
    This paper introduced a watermarking method using the CRT and Canny Algorithm that able to improve the imperceptibility of watermarked image and preserving the robustness of watermark image as well. The classical CRT algorithm is spread the watermark bits evenly on the image area. It causes significant degradation when the embedding location lies on the least significant region or in the homogeny area. Otherwise, the proposed method embeds the watermark on the edges of the image which have significant difference value to maintain the imperceptibility. The Canny algorithm is used to indexing the embedding location based on the filtering output of host image. The watermark is then embedded into the host image using pair-wise coprime integers of 6 and 11 within the CRT modulo. The results show that the proposed method has significant improvement in the quality of watermarked image with the average value of 0.9995 compared to the CRT method which results in value of 0.9985. In compression and additive noise attacks the CRT has average values of 0.6618 and 0.9750, while the proposed method results in similar values of 0.6616 and 0.9752 respectively. These prove that the proposed method is able to preserve the robustness while improving the imperceptibility

    Digital Watermarking using Multiscale Ridgelet Transform

    Get PDF
    The multi-resolution watermarking method for digital images proposed in this work. The multiscale ridgelet coefficients of low and high frequency bands of the watermark is embedded to the most significant coefficients at low and high frequency bands of the multiscale ridgelet of an host image, respectively. A multi-resolution nature of multiscale ridgelet transform is exploiting in the process of edge detection. Experimental results of the proposed watermarking method are compared with the previously available watermarking algorithm wavelet transform. Moreover, the proposed watermarking method also tested on images attached by Discrete Cosine Transform (DCT) and wavelet based lossy image compression techniques

    Data Hiding In Contourlet Coefficients Based On Their Energy

    Get PDF
    The data hiding is one of the most important subject in field of computer science, so a lot of technique was developed and modified to satisfy the optimum lend of hiding. In this research the contourlet transformation coefficients were studied to decide which of them are suitable to embed data on it a lot of parameters of the contourlet coefficients can be discussed one of them is the coefficient energy.The research covered most of the suggested events which could be met during the embedding state, one of them the size of the cover in addition to the size of the information were studied. Applying the suggested idea on different type of image with different size (cover image and the message image) shows that the coefficients with low level of energy are suitable to embedded the information, and the retrieved cover and message are so closed to the original one
    • …
    corecore