211 research outputs found

    A Comprehensive Review on Digital Image Watermarking

    Full text link
    The advent of the Internet led to the easy availability of digital data like images, audio, and video. Easy access to multimedia gives rise to the issues such as content authentication, security, copyright protection, and ownership identification. Here, we discuss the concept of digital image watermarking with a focus on the technique used in image watermark embedding and extraction of the watermark. The detailed classification along with the basic characteristics, namely visual imperceptibility, robustness, capacity, security of digital watermarking is also presented in this work. Further, we have also discussed the recent application areas of digital watermarking such as healthcare, remote education, electronic voting systems, and the military. The robustness is evaluated by examining the effect of image processing attacks on the signed content and the watermark recoverability. The authors believe that the comprehensive survey presented in this paper will help the new researchers to gather knowledge in this domain. Further, the comparative analysis can enkindle ideas to improve upon the already mentioned techniques

    Hybrid multiple watermarking technique for securing medical images of modalities MRI, CT scan, and X-ray

    Get PDF
    In order to contribute to the security of sharing and transferring medical images, we had presented a multiple watermarking technique for multiple protections; it was based on the combination of three transformations: the discrete wavelet transform (DWT), the fast Walsh-Hadamard transform (FWHT) and, the singular value decomposition (SVD). In this paper, three watermark images of sizes 512x 512 were inserted into a single medical image of various modalities such as magnetic resonance imaging (MRI), computed tomography (CT), and X-Radiation (X-ray). After applying DWT up to the third level on the original image, the high-resolution sub-bands were being selected subsequently to apply FWHT and then SVD. The singular values of the three watermark images were inserted into the singular values of the cover medical image. The experimental results showed the effectiveness of the proposed method in terms of quality and robustness compared to other reported techniques cited in the literature

    Robust Video Watermarking Algorithm based on DCT-SVD approach and Encryption

    Get PDF
    Sharing of digital media content over the internet is increasing everyday .Digital watermarking is a technique used to protect the intellectual property rights of multimedia content owners. In this paper, we propose a robust video watermarking scheme that utilizes Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) for embedding a watermark into video frames. The proposed method uses encryption to make the watermark more robust against malicious attacks. The encryption key is used to modify the watermark before it is embedded in the video frames. The modified watermark is then embedded in the DCT and SVD coefficients of the video frames. The experimental results show that the proposed method provides better robustness against various attacks such as compression, noise addition, and filtering, while maintaining good perceptual quality of the watermarked video. The proposed method also shows better resistance against geometric attacks such as cropping, rotation, and scaling. Overall, the proposed method provides an effective solution for protecting the intellectual property rights of multimedia content owners in video distribution and transmission scenarios

    A Study on Invisible Digital Image and Video Watermarking Techniques

    Get PDF
    Digital watermarking was introduced as a result of rapid advancement of networked multimedia systems. It had been developed to enforce copyright technologies for cover of copyright possession. This technology is first used for still images however recently they need been developed for different multimedia objects like audio, video etc. Watermarking, that belong to the information hiding field, has seen plenty of research interest. There's a lot of work begin conducted in numerous branches in this field. The image watermarking techniques might divide on the idea of domain like spatial domain or transform domain or on the basis of wavelets. The copyright protection, capacity, security, strength etc are a number of the necessary factors that are taken in account whereas the watermarking system is intended. This paper aims to produce a detailed survey of all watermarking techniques specially focuses on image watermarking types and its applications in today’s world

    An Optimized Medical Image Watermarking Approach for E-Health Applications

    Get PDF
    Background: In recent years, information and communication technologies have been widely used in the healthcare sector. This development enables E-Health applications to transmit medical data, as well as their sharing and remote access by healthcare professionals. However, due to their sensitivity, medical data in general, and medical images in particular, are vulnerable to a variety of illegitimate attacks. Therefore, suitable security and effective protection are necessary during transmission. Method: In consideration of these challenges, we put forth a security system relying on digital watermarking with the aim of ensuring the integrity and authenticity of medical images. The proposed approach is based on Integer Wavelet Transform as an embedding algorithm; furthermore, Particles Swarm Optimization was employed to select the optimal scaling factor, which allows the system to be compatible with different medical imaging modalities. Results: The experimental results demonstrate that the method provides a high imperceptibility and robustness for both secret watermark and watermarked images. In addition, the proposed scheme performs better for medical images compared with similar watermarking algorithms. Conclusion: As it is suitable for a lossless-data application, IWT is the best choice for medical images integrity. Furthermore, using the PSO algorithm enables the algorithm to be compatible with different medical imaging modalities

    Discrete Cosine Transform and Singular Value Decomposition Based on Canny Edge Detection for Image Watermarking

    Get PDF
    The development of an increasingly sophisticated internet allows for the distribution of digital images that can be done easily. However, with the development of increasingly sophisticated internet networks, it becomes an opportunity for some irresponsible people to misuse digital images, such as taking copyrights, modification and duplicating digital images. Watermarking is an information embedding technique to show ownership descriptions that can be conveyed into text, video, audio, and digital images. There are 2 groups of watermarking based on their working domain, namely the spatial domain and the transformation domain. In this study, three domain transformation techniques were used, namely Singular Value Descomposition (SVD), Discrete Cosine Transform (DCT) and Canny Edge Detection Techniques. The proposed attacks are rotation, gaussian blurness, salt and pepper, histogram equalization, and cropping. The results of the experiment after inserting the watermark image were measured by the Peak Signal to Noise Ratio (PSNR). The results of the image robustness test were measured by the Correlation Coefficient (Corr) and Normalized Correlation (NC). The analysis and experimental results show that the results of image extraction are good with PSNR values from watermarked images above 50dB and Corr values reaching 0.95. The NC value obtained is also high, reaching 0.98. Some of the extracted images are of fairly good quality and are similar with the original image
    • …
    corecore