2 research outputs found

    An attack proof intelligent digital watermarking based on safe region of fast fourier transform

    Get PDF
    Recent advancement in digital medium has created a need for secure transfer and transaction over the internet. The fact is that the current digital distribution and storage technologies are great threat to multimedia industries where unlimited number of perfect copies can be produce illegally. In this paper we discuss digital watermarking as a means of hiding ownerโ€™s copyright message in images. At the moment, the most critical issue faced by the watermarking system is determining the best place to hide watermark data. We propose a method, an attack proof intelligent system, in which Artificial Neural network is use to locate the Safe Region in the host image and the watermark is embedded based on the located Safe Region in Fast Fourier Transform domain. Experiment on a large set of natural images shows the robustness of the new scheme. The implementation results have shown that this watermarking algorithm has high level of imperceptibility and the watermark bit were all recovered correctly. Keywords: (Artificial Neural Network, Back Propagation algorithm, Fast Fourier Transform, FFT, Image watermarking, Safe Region,

    State-of-the-art application of artificial neural network in digital watermarking and the way forward

    Get PDF
    Several high-ranking watermarking schemes using neural networks have been proposed in order to make the watermark stronger to resist attacks.The ability of Artificial Neural Network, ANN to learn, do mapping, classify, and adapt has increased the interest of researcher in application of different types ANN in watermarking.In this paper, ANN based approached have been categorized based on their application to different components of watermarking such as; capacity estimate, watermark embedding, recovery of watermark and error rate detection. We propose a new component of water marking, Secure Region, SR in which, ANN can be used to identify such region within the estimated capacity. Hence an attack-proof watermarking system can be achieved
    corecore