617 research outputs found

    Robust Watermarking Using FFT and Cordic QR Techniques

    Get PDF
    Digital media sharing and access in today’s world of the internet is very frequent for every user. The management of digital rights may come into threat easily as the accessibility of data through the internet become wide. Sharing digital information under security procedures can be easily compromised due to the various vulnerabilities floating over the internet. Existing research has been tied to protecting internet channels to ensure the safety of digital data. Researchers have investigated various encryption techniques to prevent digital rights management but certain challenges including external potential attacks cannot be avoided that may give unauthorized access to digital media. The proposed model endorsed the concept of watermarking in digital data to uplift media security and ensure digital rights management. The system provides an efficient procedure to conduct over-watermarking in digital audio signals and confirm the avoidance of ownership of the host data. The proposed technique uses a watermark picture as a signature that has been initially encrypted with Arnold's cat map and cyclic encoding before being embedded. The upper triangular R-matrix component of the energy band was then created by using the Fast Fourier transform and Cordic QR procedures to the host audio stream. Using PN random sequences, the encrypted watermarking image has been embedded in the host audio component of the R-matrix. The same procedure has been applied to extract the watermark image from the watermarked audio. The proposed model evaluates the quality of the watermarked audio and extracted watermark image. The average PSNR of the watermarked audio is found to be 37.01 dB. It has also been seen that the average PSNR, Normal cross-correlation, BER, SSMI (structure similarity index matric) value for the extracted watermark image is found to be 96.30 dB, 0.9042 units, 0.1033 units, and 0.9836 units respectively. Further, the model has been tested using various attacks to check its robustness. After applying attacks such as noising, filtering, cropping, and resampling on the watermarked audio, the watermark image has been extricated and its quality has been checked under the standard parameters. It has been found that the quality of the recovered watermark image satisfying enough to justify the digital ownership of the host audio. Hence, the proposed watermarking model attains a perfect balance between imperceptibility, payload, and robustness

    Image Compression and Watermarking scheme using Scalar Quantization

    Full text link
    This paper presents a new compression technique and image watermarking algorithm based on Contourlet Transform (CT). For image compression, an energy based quantization is used. Scalar quantization is explored for image watermarking. Double filter bank structure is used in CT. The Laplacian Pyramid (LP) is used to capture the point discontinuities, and then followed by a Directional Filter Bank (DFB) to link point discontinuities. The coefficients of down sampled low pass version of LP decomposed image are re-ordered in a pre-determined manner and prediction algorithm is used to reduce entropy (bits/pixel). In addition, the coefficients of CT are quantized based on the energy in the particular band. The superiority of proposed algorithm to JPEG is observed in terms of reduced blocking artifacts. The results are also compared with wavelet transform (WT). Superiority of CT to WT is observed when the image contains more contours. The watermark image is embedded in the low pass image of contourlet decomposition. The watermark can be extracted with minimum error. In terms of PSNR, the visual quality of the watermarked image is exceptional. The proposed algorithm is robust to many image attacks and suitable for copyright protection applications.Comment: 11 Pages, IJNGN Journal 201

    Quality scalability aware watermarking for visual content

    Get PDF
    Scalable coding-based content adaptation poses serious challenges to traditional watermarking algorithms, which do not consider the scalable coding structure and hence cannot guarantee correct watermark extraction in media consumption chain. In this paper, we propose a novel concept of scalable blind watermarking that ensures more robust watermark extraction at various compression ratios while not effecting the visual quality of host media. The proposed algorithm generates scalable and robust watermarked image code-stream that allows the user to constrain embedding distortion for target content adaptations. The watermarked image code-stream consists of hierarchically nested joint distortion-robustness coding atoms. The code-stream is generated by proposing a new wavelet domain blind watermarking algorithm guided by a quantization based binary tree. The code-stream can be truncated at any distortion-robustness atom to generate the watermarked image with the desired distortion-robustness requirements. A blind extractor is capable of extracting watermark data from the watermarked images. The algorithm is further extended to incorporate a bit-plane discarding-based quantization model used in scalable coding-based content adaptation, e.g., JPEG2000. This improves the robustness against quality scalability of JPEG2000 compression. The simulation results verify the feasibility of the proposed concept, its applications, and its improved robustness against quality scalable content adaptation. Our proposed algorithm also outperforms existing methods showing 35% improvement. In terms of robustness to quality scalable video content adaptation using Motion JPEG2000 and wavelet-based scalable video coding, the proposed method shows major improvement for video watermarking

    A survey of digital image watermarking techniques

    Get PDF
    Watermarking, which belong to the information hiding field, has seen a lot of research interest recently. There is a lot of work begin conducted in different branches in this field. Steganography is used for secret conmunication, whereas watermarking is used for content protection, copyright management, content authentication and tamper detection. In this paper we present a detailed survey of existing and newly proposed steganographic and watenmarking techniques. We classify the techniques based on different domains in which data is embedded. Here we limit the survey to images only

    An improved scaling factor for robust digital image watermarking scheme using DWT and SVD

    Get PDF
    As the internet has becoming very popular for digital media sharing, the digital media is easy to be accessed, downloaded and vulnerable to image processing attacks. Digital watermarking is a technique used to secure information by embedding an additional information known as watermark into the original data. The proposed scheme is approach to improve scale factor for robust image watermarking using two level of Discrete Wavelet Transform with Singular Value Decomposition. The first and second level of DWT decomposition are performed on HL and HL1 sub band respectively. One of the main contribution of this proposed approach is the decomposition of host image using two level DWT decomposition. The aim of this project primarily is to enhance the robustness of watermarking techniques by obtaining the most optimize scaling factor which increased and control the strength of watermarked image. Scale factor is a coefficient that can influence the quality and robustness of watermarked image. To achieve the research objectives, three phases of research framework are fulfilled; First phase is the analysis on scaling factor, DWT and SVD, secondly is the watermark encoding and the generation of scale factor value and lastly is the evaluation of watermarked image quality and robustness based on the scale factor. The highest PSNR recorded is 69.2112 with best scale factor 0.01. The experimental result shows significant improvement on the quality and robustness of the watermarked image using this proposed scheme

    Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness

    Full text link
    Image deep steganography (IDS) is a technique that utilizes deep learning to embed a secret image invisibly into a cover image to generate a container image. However, the container images generated by convolutional neural networks (CNNs) are vulnerable to attacks that distort their high-frequency components. To address this problem, we propose a novel method called Low-frequency Image Deep Steganography (LIDS) that allows frequency distribution manipulation in the embedding process. LIDS extracts a feature map from the secret image and adds it to the cover image to yield the container image. The container image is not directly output by the CNNs, and thus, it does not contain high-frequency artifacts. The extracted feature map is regulated by a frequency loss to ensure that its frequency distribution mainly concentrates on the low-frequency domain. To further enhance robustness, an attack layer is inserted to damage the container image. The retrieval network then retrieves a recovered secret image from a damaged container image. Our experiments demonstrate that LIDS outperforms state-of-the-art methods in terms of robustness, while maintaining high fidelity and specificity. By avoiding high-frequency artifacts and manipulating the frequency distribution of the embedded feature map, LIDS achieves improved robustness against attacks that distort the high-frequency components of container images

    Defending Against Local Adversarial Attacks through Empirical Gradient Optimization

    Get PDF
    Deep neural networks (DNNs) are susceptible to adversarial attacks, including the recently introduced locally visible adversarial patch attack, which achieves a success rate exceeding 96%. These attacks pose significant challenges to DNN security. Various defense methods, such as adversarial training, robust attention modules, watermarking, and gradient smoothing, have been proposed to enhance empirical robustness against patch attacks. However, these methods often have limitations concerning patch location requirements, randomness, and their impact on recognition accuracy for clean images.To address these challenges, we propose a novel defense algorithm called Local Adversarial Attack Empirical Defense using Gradient Optimization (LAAGO). The algorithm incorporates a low-pass filter before noise suppression to effectively mitigate the interference of high-frequency noise on the classifier while preserving the low-frequency areas of the images. Additionally, it emphasizes the original target features by enhancing the image gradients. Extensive experimental results demonstrate that the proposed method improves defense performance by 3.69% for 80 × 80 noise patches (representing approximately 4% of the images), while experiencing only a negligible 0.3% accuracy drop on clean images. The LAAGO algorithm provides a robust defense mechanism against local adversarial attacks, overcoming the limitations of previous methods. Our approach leverages gradient optimization, noise suppression, and feature enhancement, resulting in significant improvements in defense performance while maintaining high accuracy for clean images. This work contributes to the advancement of defense strategies against emerging adversarial attacks, thereby enhancing the security and reliability of deep neural networks

    Hybrid chaotic map with L-shaped fractal Tromino for image encryption and decryption

    Get PDF
    Insecure communication in digital image security and image storing are considered as important challenges. Moreover, the existing approaches face problems related to improper security at the time of image encryption and decryption. In this research work, a wavelet environment is obtained by transforming the cover image utilizing integer wavelet transform (IWT) and hybrid discrete cosine transform (DCT) to completely prevent false errors. Then the proposed hybrid chaotic map with L-shaped fractal Tromino offers better security to maintain image secrecy by means of encryption and decryption. The proposed work uses fractal encryption with the combination of L-shaped Tromino theorem for enhancement of information hiding. The regions of L-shaped fractal Tromino are sensitive to variations, thus are embedded in the watermark based on a visual watermarking technique known as reversible watermarking. The experimental results showed that the proposed method obtained peak signal-to-noise ratio (PSNR) value of 56.82dB which is comparatively higher than the existing methods that are, Beddington, free, and Lawton (BFL) map with PSNR value of 8.10 dB, permutation substitution, and Boolean operation with PSNR value of 21.19 dB and deoxyribonucleic acid (DNA) level permutation-based logistic map with PSNR value of 21.27 dB

    Security and Privacy on Generative Data in AIGC: A Survey

    Full text link
    The advent of artificial intelligence-generated content (AIGC) represents a pivotal moment in the evolution of information technology. With AIGC, it can be effortless to generate high-quality data that is challenging for the public to distinguish. Nevertheless, the proliferation of generative data across cyberspace brings security and privacy issues, including privacy leakages of individuals and media forgery for fraudulent purposes. Consequently, both academia and industry begin to emphasize the trustworthiness of generative data, successively providing a series of countermeasures for security and privacy. In this survey, we systematically review the security and privacy on generative data in AIGC, particularly for the first time analyzing them from the perspective of information security properties. Specifically, we reveal the successful experiences of state-of-the-art countermeasures in terms of the foundational properties of privacy, controllability, authenticity, and compliance, respectively. Finally, we summarize the open challenges and potential exploration directions from each of theses properties
    corecore