19 research outputs found

    Fragile Watermarking using Chaotic Sequences *

    Get PDF
    Abstract I

    Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim

    Get PDF
    Image watermarking embeds identifying information in an image in such a manner that it cannot easily be removed. For the past several years, image digital watermarking has become a necessary element used for hid ing secret image and enabling secured communication such as privacy, confidentiality, authentication and data integrity. Although numerous watermarking schemes are present in grayscale images, the present work focuses on the RGB color image. This study proposed a new hybrid method that would satisfy the essential needs of modern image watermarking. The color image watermarking is based on the 2D Discrete Cosine Transform and Egamal cryptosystem.The 2D Discrete Cosine Transform depends on the matrix products, while the ElGamal cryptosystem depends on the discrete logarithm problem. The cryptosystem is combined with existing Arnold transform in watermarking algorithm to enhance the security of secret image. Value of Peak Signal to Noise Ratio was taken as performance evaluation parameters. On the whole, the performance evaluation shows that combining the two algorithms improved the performance of image watermarking

    A Simple Image-Adaptive Watermarking Algorithm with Blind Extraction

    Get PDF
    In this paper, we propose an adaptive, DCT based, blind image watermarking algorithm. The adaptability is developed, while exploring the properties of the human visual system (HVS), to embed robust watermarks in DCT matrices while making them the least visible in the space domain. In the algorithm, binary watermarks are embedded in image blocks having gray level variations sufficient to mask a certain level of signal alterations. The orientations of the variations in such a block are detected by examining the locations of the most significant DCT coefficients in the matrix and a particular DCT coefficient is then chosen for watermark embedding with a view to making the gray level changes resulting from the embedding have a similar orientation with the original image signal to mask the watermark better. Moreover, the embedding strength is made to depend on the DC component, as it indicates the brightness of the image block, to further reduce the visibility of the watermark. The algorithm is computationally simple because it extracts the needed features directly from the DCT coefficients. Simulation results show that the algorithm is highly robust against JPEG compression even at low quality factors while maintaining high visual quality. Furthermore, the computational simplicity of the algorithm makes it very useful in real-time applications

    Adaptive Watermarking Scheme Using Biased Shift of Quantization Index

    Get PDF

    Watermarks Technique in MPEG-1Video by B-spline

    Get PDF
    As the computers are more and more integrated via the network, thedistribution of digital media is becoming faster, easier, and requiring less effort tomake exact copies. One of the major impediments is the lack of effectiveintellectual property protection of digital media to discourage unauthorizedcopying and distribution.This paper aims to produce random and dynamic watermarking technique toprovide copyright protection for digital media (video) by embedding a digitalimage for video sequences compressed according to the MPEG-1 video codingstandard.Digital image is used to be embedded in one of the most widespread video codingstandard (MPEG-1), by implementing third degree B-spline curve equation on Iframesmacroblocks data to interpolate data and provide according to thecomparing condition effective points that represent the selected location wherewatermark image will be embedded.Using B-spline curve fitting equation will show distribution of watermark locationthrough secondary intra-frame of MPEG-1 standard by drawing curves dependingon watermarked points as control points.Test measurements will be used to prove robustness of the proposed techniqueagainst watermark attacks and control point for curve drawing illustrating howwatermark image is distributed among a number of video samples

    Application of Digital Fingerprinting: Duplicate Image Detection

    Get PDF
    Identifying the content automatically is the most necessary condition to detect and fight piracy. Watermarking the image is the most basic and common technique to fight piracy. But the effectiveness of watermark is limited. Image fingerprinting provides an alternate and efficient solution for managing and identifying the multimedia content. After registering the original image contents, by comparing the colluded image with the original one, the percentage of distortion can be calculated. In this paper presented are one such fingerprinting-based forensic application: Duplicate image detection. To authenticate image content perceptual hash is an efficient solution. Perceptual hashes of almost similar images or near duplicate images are very similar to each other making it easier to compare images unlike cryptographic hashes which vary very radically even in the case of small distortions. Potential applications are unlimited including digital forensics, protection of copyrighted material etc. However, conventional image hash algorithms only offer a limited authentication level for the protection of overall content. In this work, we compared and contrasted different perceptual hashes and proposed a image hashing algorithm which is an excellent trade off of accuracy and speed

    2D Watermarking: Non Conventional Approaches

    Get PDF

    A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression

    Full text link

    Contextual biometric watermarking of fingerprint images

    Get PDF
    This research presents contextual digital watermarking techniques using face and demographic text data as multiple watermarks for protecting the evidentiary integrity of fingerprint image. The proposed techniques embed the watermarks into selected regions of fingerprint image in MDCT and DWT domains. A general image watermarking algorithm is developed to investigate the application of MDCT in the elimination of blocking artifacts. The application of MDCT has improved the performance of the watermarking technique compared to DCT. Experimental results show that modifications to fingerprint image are visually imperceptible and maintain the minutiae detail. The integrity of the fingerprint image is verified through high matching score obtained from the AFIS system. There is also a high degree of correlation between the embedded and extracted watermarks. The degree of similarity is computed using pixel-based metrics and human visual system metrics. It is useful for personal identification and establishing digital chain of custody. The results also show that the proposed watermarking technique is resilient to common image modifications that occur during electronic fingerprint transmission
    corecore