91 research outputs found

    A Comprehensive Review on Digital Image Watermarking

    Full text link
    The advent of the Internet led to the easy availability of digital data like images, audio, and video. Easy access to multimedia gives rise to the issues such as content authentication, security, copyright protection, and ownership identification. Here, we discuss the concept of digital image watermarking with a focus on the technique used in image watermark embedding and extraction of the watermark. The detailed classification along with the basic characteristics, namely visual imperceptibility, robustness, capacity, security of digital watermarking is also presented in this work. Further, we have also discussed the recent application areas of digital watermarking such as healthcare, remote education, electronic voting systems, and the military. The robustness is evaluated by examining the effect of image processing attacks on the signed content and the watermark recoverability. The authors believe that the comprehensive survey presented in this paper will help the new researchers to gather knowledge in this domain. Further, the comparative analysis can enkindle ideas to improve upon the already mentioned techniques

    Embedding distortion analysis in wavelet-domain watermarking

    Get PDF
    Imperceptibility and robustness are two complementary fundamental requirements of any watermarking algorithm. Low-strength watermarking yields high imperceptibility, but exhibits poor robustness. High-strength watermarking schemes achieve good robustness but often infuse distortions resulting in poor visual quality in host images. This article analyses the embedding distortion for wavelet-based watermarking schemes. We derive the relationship between distortion, measured in mean square error (MSE), and the watermark embedding modification and propose the linear proportionality between MSE and the sum of energy of the selected wavelet coefficients for watermark embedding modification. The initial proposition assumes the orthonormality of discrete wavelet transform. It is further extended for non-orthonormal wavelet kernels using a weighting parameter that follows the energy conservation theorems in wavelet frames. The proposed analysis is verified by experimental results for both non-blind and blind watermarking schemes. Such a model is useful to find the optimum input parameters, including the wavelet kernel, coefficient selection, and subband choices for wavelet domain image watermarking

    A Color Image Watermarking Scheme Based On QR Factorization, Logistic and Lorentz Chaotic Maps

    Get PDF
    Most of the existing color image watermarking schemes use grayscale or binary image as watermark because color image watermark has more data than grayscale or binary watermark. Therefore, it is a challenging issue to design a color image-watermarking scheme. This paper proposes a novel color image watermarking scheme to embed color image watermark into color host image. In watermarking schemes, first divide the host and watermark image into non-overlapping blocks, apply the Discrete Cosine Transformation (DCT) on each blocks of both watermark, and host image. After that QR Factorization, apply on the each blocks of watermark. In this paper, Logistic and Lorentz chaotic maps are usedfor estimating the embedding strength and location. The experimental results reveal that this watermarking scheme is robust against different image processing attacks viz. cropping, contrast adjustment and coloring

    Analysis of Digital Watermarking Techniques Using Transform-Based Function

    Get PDF
    Security and protection of digital data is always a challenging job over the internet. For the protection and copyright of digital multimedia data used digital watermarking techniques. The digital watermarking techniques protect the copyright protection of digital multimedia data. Digital watermarking techniques used to transform based function for the processing of watermark embedding. The transform-based function is a texture feature dominated property. The texture feature is the most important part of the digital image. In this paper study and analysis of transform-based digital image watermarking. The transform-based digital image watermarking using the function of DCT, DWT, IWT and SHIFT. In the family of transform, the function used the layered transform function is wavelet transform function, and other is the shift key point transform function. For simulation used MATLAB software and used standard image dataset and symbol for the process of embedding. For the validation of transform function estimate, four well know parameter such as encoding time, decoding time, PSNR, and the value of NC

    Data hiding in multimedia - theory and applications

    Get PDF
    Multimedia data hiding or steganography is a means of communication using subliminal channels. The resource for the subliminal communication scheme is the distortion of the original content that can be tolerated. This thesis addresses two main issues of steganographic communication schemes: 1. How does one maximize the distortion introduced without affecting fidelity of the content? 2. How does one efficiently utilize the resource (the distortion introduced) for communicating as many bits of information as possible? In other words, what is a good signaling strategy for the subliminal communication scheme? Close to optimal solutions for both issues are analyzed. Many techniques for the issue for maximizing the resource, viz, the distortion introduced imperceptibly in images and video frames, are proposed. Different signaling strategies for steganographic communication are explored, and a novel signaling technique employing a floating signal constellation is proposed. Algorithms for optimal choices of the parameters of the signaling technique are presented. Other application specific issues like the type of robustness needed are taken into consideration along with the established theoretical background to design optimal data hiding schemes. In particular, two very important applications of data hiding are addressed - data hiding for multimedia content delivery, and data hiding for watermarking (for proving ownership). A robust watermarking protocol for unambiguous resolution of ownership is proposed

    An Efficient Digital Image Watermarking Based on DCT and Advanced Image Data Embedding Method

    Get PDF
    Digital image enhancement and digital content or data image secure using DCT and advanced image data embedding method (AIDEM). AIDEM improved robustness based on particle shifting concept is reproduced secure image data and manipulated there’s a robust would like for a digital image copyright mechanism to be placed in secure image data. There’s a necessity for authentication of the content because of the owner. It’s become more accessible for malicious parties to create scalable copies of proprietary content with any compensation to the content owner. Advanced Watermarking is being viewed as a potential goal to the current downside. Astounding watermarking plans are arranged assaults on the watermarked picture are twisted and proposed to give insurance of proprietorship freedoms, information treating, and information uprightness. These methods guarantee unique information recuperation from watermarked information, while irreversible watermarking plans safeguard proprietorship freedoms. This attribute of reversible watermarking has arisen as an applicant answer for the assurance of proprietorship freedoms of information, unfortunate to alterations, for example, clinical information, genetic information, Visa, and financial balance information. These attacks are also intentional or unintentional. The attacks are classified as geometric attacks. This research presents a comprehensive and old method of these techniques that are developed and their effectiveness. Digital watermarking was developed to supply copyright protection and owners’ authentication. Digital image watermarking may be a methodology for embedding some information into digital image sequences, like text image, image data, during this research analysis on image watermarking and attacks on watermarking process time image data, classification of watermarking and applications. We aim to secure image data using advanced image data embedding method (AIDEM) improved robustness based particle shifting concept is reproduced secure image data. To develop compelling digital image watermarking methodology using mat lab tool and reliable and robust

    DWT-Based Data Hiding Technique for Videos Ownership Protection

    Get PDF
    This chapter proposes a wavelet data hiding scheme for video authentication and ownership protection. A watermark in the shape of a logo image will be hidden. In this research, a discrete wavelet transform (DWT) process is implemented using orthonormal filter banks, where the Y components of the YUV color space of the video frames are decomposed using DWT, and a watermark is inserted in one or more of the resulting sub-bands in a way that is fully controlled by the owner. Then, the watermarked video is reconstructed. The filters used for the DWT decompositions are randomly generated to increase the security of the algorithm. An enhanced detection technique is developed to increase the reliability of the system. The overall robustness of this scheme is measured when common attacks are applied to the test videos. Moreover, the proposed algorithm is used with the high-efficiency video coding (HEVC) technique to examine the whole performance. Furthermore, a selective denoising filter is built to eliminate the effect of the noise. The simulation results show that the proposed algorithm achieves well under both the visual and the metric tests. Moreover, it performed well against intentional and unintentional attacks. The average normalized correlation achieved is 97%, while the mean peak signal-to-noise ratio (PSNR) is 45 dB
    • …
    corecore