126 research outputs found

    Watermarking for multimedia security using complex wavelets

    Get PDF
    This paper investigates the application of complex wavelet transforms to the field of digital data hiding. Complex wavelets offer improved directional selectivity and shift invariance over their discretely sampled counterparts allowing for better adaptation of watermark distortions to the host media. Two methods of deriving visual models for the watermarking system are adapted to the complex wavelet transforms and their performances are compared. To produce improved capacity a spread transform embedding algorithm is devised, this combines the robustness of spread spectrum methods with the high capacity of quantization based methods. Using established information theoretic methods, limits of watermark capacity are derived that demonstrate the superiority of complex wavelets over discretely sampled wavelets. Finally results for the algorithm against commonly used attacks demonstrate its robustness and the improved performance offered by complex wavelet transforms

    Image Watermarking in Higher-Order Gradient Domain

    Get PDF

    Rank-based image watermarking method with high embedding capacity and robustness

    Get PDF
    This paper presents a novel rank-based method for image watermarking. In the watermark embedding process, the host image is divided into blocks, followed by the 2-D discrete cosine transform (DCT). For each image block, a secret key is employed to randomly select a set of DCT coefficients suitable for watermark embedding. Watermark bits are inserted into an image block by modifying the set of DCT coefficients using a rank-based embedding rule. In the watermark detection process, the corresponding detection matrices are formed from the received image using the secret key. Afterward, the watermark bits are extracted by checking the ranks of the detection matrices. Since the proposed watermarking method only uses two DCT coefficients to hide one watermark bit, it can achieve very high embedding capacity. Moreover, our method is free of host signal interference. This desired feature and the usage of an error buffer in watermark embedding result in high robustness against attacks. Theoretical analysis and experimental results demonstrate the effectiveness of the proposed method

    High capacity data embedding schemes for digital media

    Get PDF
    High capacity image data hiding methods and robust high capacity digital audio watermarking algorithms are studied in this thesis. The main results of this work are the development of novel algorithms with state-of-the-art performance, high capacity and transparency for image data hiding and robustness, high capacity and low distortion for audio watermarking.En esta tesis se estudian y proponen diversos métodos de data hiding de imágenes y watermarking de audio de alta capacidad. Los principales resultados de este trabajo consisten en la publicación de varios algoritmos novedosos con rendimiento a la altura de los mejores métodos del estado del arte, alta capacidad y transparencia, en el caso de data hiding de imágenes, y robustez, alta capacidad y baja distorsión para el watermarking de audio.En aquesta tesi s'estudien i es proposen diversos mètodes de data hiding d'imatges i watermarking d'àudio d'alta capacitat. Els resultats principals d'aquest treball consisteixen en la publicació de diversos algorismes nous amb rendiment a l'alçada dels millors mètodes de l'estat de l'art, alta capacitat i transparència, en el cas de data hiding d'imatges, i robustesa, alta capacitat i baixa distorsió per al watermarking d'àudio.Societat de la informació i el coneixemen

    Скрытная цифровая модуляция звуковых сигналов

    Get PDF
    Розроблені алгоритми вбудовування цифрових водяних знаків у звукові сигнали із збереженням норми сигналу. У якості параметру квантування застосовується коефіцієнт кореляції сигнального вектору і випадкової послідовності. Досліджені КАМ і АМ подібні види модуляції коефіцієнту кореляції в області дискретного перетворення Фур’є для каналів з адитивним білим гаусівським шумом і міжсимвольними спотвореннями.Introduction. A modern methods of digital signal processing are capable to embed imperceptibly an additional information into audio signals using so called digital watermarks (DWM). DWM are characterized by the main parameters: payload, fidelity and robustness. One of the most important methods for DWM is based on quantization of certain signal parameters. But quantization methods are very sensitive to amplitude scaling and doesn’t proved appropriate fidelity and robustness. The main part. The designed embedding algorithm is based on quantization of correlation coefficient between signal vector generally in a complex L-dimensional space and real random vector. Algorithm keeps signal norm that allows signal normalization in modulation and demodulation processes and minimizes the embedding distortions. Variants of correlation coefficient quantization in the forms of Quadrature Amplitude Modulation and Amplitude Modulation in the frequency domain of discrete Fourier transform are considered. The proposed multichannel algorithm provides robustness against intersymbol interference (ISI). It is proved advantages of data embedding in the frequency domain versus time domain and row-wise forming of signal vector for ISI resistance. It is shown by computer simulation the ability of flexible regulation of watermark performances by means of appropriate choosing of algorithm parameters. Practical implementation of the proposed algorithm is based on sliding processing in the whole and comparison of received and calculated hash functions. Conclusion. The proposed algorithm demonstrates watermarks inaudibility because of preserving signal power before and after data embedding and proportional watermarking according to instantaneous carrier signal power. Watermark payload – fidelity – robustness compromise is provided by appropriate parameters choosing N, L, K, Δ in watermarking algorithm. The designed algorithms are applicable in mobile maritime and aeronautical radiotelephone services and resolving "analog hole" problem in the digital rights management for copy control of audio files.Разработан алгоритм встраивания цифровых водяных знаков в звуковые сигналы с сохранением нормы сигнала. В качестве параметра квантования используется коэффициент корреляции сигнального вектора и случайной последовательности. Исследованы КАМ и АМ подобные виды модуляции коэффициента корреляции в области дискретного преобразования Фурье для каналов с аддитивным белым гауссовским шумом и межсимвольными искажениями

    On the data hiding theory and multimedia content security applications

    Get PDF
    This dissertation is a comprehensive study of digital steganography for multimedia content protection. With the increasing development of Internet technology, protection and enforcement of multimedia property rights has become a great concern to multimedia authors and distributors. Watermarking technologies provide a possible solution for this problem. The dissertation first briefly introduces the current watermarking schemes, including their applications in video,, image and audio. Most available embedding schemes are based on direct Spread Sequence (SS) modulation. A small value pseudo random signature sequence is embedded into the host signal and the information is extracted via correlation. The correlation detection problem is discussed at the beginning. It is concluded that the correlator is not optimum in oblivious detection. The Maximum Likelihood detector is derived and some feasible suboptimal detectors are also analyzed. Through the calculation of extraction Bit Error Rate (BER), it is revealed that the SS scheme is not very efficient due to its poor host noise suppression. The watermark domain selection problem is addressed subsequently. Some implications on hiding capacity and reliability are also studied. The last topic in SS modulation scheme is the sequence selection. The relationship between sequence bandwidth and synchronization requirement is detailed in the work. It is demonstrated that the white sequence commonly used in watermarking may not really boost watermark security. To address the host noise suppression problem, the hidden communication is modeled as a general hypothesis testing problem and a set partitioning scheme is proposed. Simulation studies and mathematical analysis confirm that it outperforms the SS schemes in host noise suppression. The proposed scheme demonstrates improvement over the existing embedding schemes. Data hiding in audio signals are explored next. The audio data hiding is believed a more challenging task due to the human sensitivity to audio artifacts and advanced feature of current compression techniques. The human psychoacoustic model and human music understanding are also covered in the work. Then as a typical audio perceptual compression scheme, the popular MP3 compression is visited in some length. Several schemes, amplitude modulation, phase modulation and noise substitution are presented together with some experimental results. As a case study, a music bitstream encryption scheme is proposed. In all these applications, human psychoacoustic model plays a very important role. A more advanced audio analysis model is introduced to reveal implications on music understanding. In the last part, conclusions and future research are presented

    Robust digital image watermarking

    Full text link
    This research presents a novel rank based image watermarking method and improved moment based and histogram based image watermarking methods. A high-frequency component modification step is also proposed to compensate the side effect of commonly used Gaussian pre-filtering. The proposed methods outperform the latest image watermarking methods

    Data hiding in multimedia - theory and applications

    Get PDF
    Multimedia data hiding or steganography is a means of communication using subliminal channels. The resource for the subliminal communication scheme is the distortion of the original content that can be tolerated. This thesis addresses two main issues of steganographic communication schemes: 1. How does one maximize the distortion introduced without affecting fidelity of the content? 2. How does one efficiently utilize the resource (the distortion introduced) for communicating as many bits of information as possible? In other words, what is a good signaling strategy for the subliminal communication scheme? Close to optimal solutions for both issues are analyzed. Many techniques for the issue for maximizing the resource, viz, the distortion introduced imperceptibly in images and video frames, are proposed. Different signaling strategies for steganographic communication are explored, and a novel signaling technique employing a floating signal constellation is proposed. Algorithms for optimal choices of the parameters of the signaling technique are presented. Other application specific issues like the type of robustness needed are taken into consideration along with the established theoretical background to design optimal data hiding schemes. In particular, two very important applications of data hiding are addressed - data hiding for multimedia content delivery, and data hiding for watermarking (for proving ownership). A robust watermarking protocol for unambiguous resolution of ownership is proposed
    corecore