1,497 research outputs found
Review of Robust Video Watermarking Algorithms
There has been a remarkable increase in the data exchange over web and the
widespread use of digital media. As a result, multimedia data transfers also
had a boost up. The mounting interest with reference to digital watermarking
throughout the last decade is certainly due to the increase in the need of
copyright protection of digital content. This is also enhanced due to
commercial prospective. Applications of video watermarking in copy control,
broadcast monitoring, fingerprinting, video authentication, copyright
protection etc is immensely rising. The main aspects of information hiding are
capacity, security and robustness. Capacity deals with the amount of
information that can be hidden. The skill of anyone detecting the information
is security and robustness refers to the resistance to modification of the
cover content before concealed information is destroyed. Video watermarking
algorithms normally prefers robustness. In a robust algorithm it is not
possible to eliminate the watermark without rigorous degradation of the cover
content. In this paper, we introduce the notion of Video Watermarking and the
features required to design a robust watermarked video for a valuable
application. We review several algorithms, and introduce frequently used key
techniques. The aim of this paper is to focus on the various domains of video
watermarking techniques. The majority of the reviewed methods based on video
watermarking emphasize on the notion of robustness of the algorithm.Comment: IEEE Publication format, ISSN 1947 5500,
http://sites.google.com/site/ijcsis
Image Authentication Technique in Frequency Domain based on Discrete Fourier Transformation (IATFDDFT)
In this paper a novel data embedding technique in frequency domain has been
proposed using Discrete Fourier Transform (DFT) for image authentication and
secured message transmission based on hiding a large volume of data into gray
images. Image authentication is done by embedding message or image in frequency
domain by choosing image blocks of size 2 x 2, called mask, from the source
image in row major order and transform it into the frequency domain using DFT.
Three bits of authenticating message/image/message-digest are fabricated within
the real parts of each source image byte except first frequency component of
each mask. The dimension of authenticating image followed by message digest
(MD) and the content of authenticating message/image are also embedded. Inverse
DFT (IDFT) is performed on embedded data to transform embedded frequency
component to spatial component. In order to keep the quantum value positive and
non negative in spatial domain a strong and robust technique is incorporated
mainly on the first frequency component and sometimes on other component
depends upon situations. The decoding is done by applying the reverse
algorithm. Experimental results conform that the proposed algorithm performs
better than DCT, QFT and SCDFT schemes.Comment: 7 page paper in Proceeding of International Conference on Computing
and Systems ICCS 2010, ISBN 93-80813-01-5, pp 151-155, University of Burdwan,
19th, 20th November, 201
High Resilience Diverse Domain Multilevel Audio Watermarking with Adaptive Threshold
A novel diverse domain (DCT-SVD & DWT-SVD) watermarking scheme is proposed in
this paper. Here, the watermark is embedded simultaneously onto the two
domains. It is shown that an audio signal watermarked using this scheme has
better subjective and objective quality when compared with other watermarking
schemes. Also proposed are two novel watermark detection algorithms viz., AOT
(Adaptively Optimised Threshold) and AOTx (AOT eXtended). The fundamental idea
behind both is finding an optimum threshold for detecting a known character
embedded along with the actual watermarks in a known location, with the
constraint that the Bit Error Rate (BER) is minimum. This optimum threshold is
used for detecting the other characters in the watermarks. This approach is
shown to make the watermarking scheme less susceptible to various signal
processing attacks, thus making the watermarks more robust
TRLF: An Effective Semi-fragile Watermarking Method for Tamper Detection and Recovery based on LWT and FNN
This paper proposes a novel method for tamper detection and recovery using
semi-fragile data hiding, based on Lifting Wavelet Transform (LWT) and
Feed-Forward Neural Network (FNN). In TRLF, first, the host image is decomposed
up to one level using LWT, and the Discrete Cosine Transform (DCT) is applied
to each 2*2 blocks of diagonal details. Next, a random binary sequence is
embedded in each block as the watermark by correlating coefficients. In
authentication stage, first, the watermarked image geometry is reconstructed by
using Speeded Up Robust Features (SURF) algorithm and extract watermark bits by
using FNN. Afterward, logical exclusive-or operation between original and
extracted watermark is applied to detect tampered region. Eventually, in the
recovery stage, tampered regions are recovered by image digest which is
generated by inverse halftoning technique. The performance and efficiency of
TRLF and its robustness against various geometric, non-geometric and hybrid
attacks are reported. From the experimental results, it can be seen that TRLF
is superior in terms of robustness and quality of the digest and watermarked
image respectively, compared to the-state-of-the-art fragile and semi-fragile
watermarking methods. In addition, imperceptibility has been improved by using
different correlation steps as the gain factor for flat (smooth) and texture
(rough) blocks
ISWAR: An Imaging System with Watermarking and Attack Resilience
With the explosive growth of internet technology, easy transfer of digital
multimedia is feasible. However, this kind of convenience with which authorized
users can access information, turns out to be a mixed blessing due to
information piracy. The emerging field of Digital Rights Management (DRM)
systems addresses issues related to the intellectual property rights of digital
content. In this paper, an object-oriented (OO) DRM system, called "Imaging
System with Watermarking and Attack Resilience" (ISWAR), is presented that
generates and authenticates color images with embedded mechanisms for
protection against infringement of ownership rights as well as security
attacks. In addition to the methods, in the object-oriented sense, for
performing traditional encryption and decryption, the system implements methods
for visible and invisible watermarking. This paper presents one visible and one
invisible watermarking algorithm that have been integrated in the system. The
qualitative and quantitative results obtained for these two watermarking
algorithms with several benchmark images indicate that high-quality watermarked
images are produced by the algorithms. With the help of experimental results it
is demonstrated that the presented invisible watermarking techniques are
resilient to the well known benchmark attacks and hence a fail-safe method for
providing constant protection to ownership rights
WSMN: An optimized multipurpose blind watermarking in Shearlet domain using MLP and NSGA-II
Digital watermarking is a remarkable issue in the field of information
security to avoid the misuse of images in multimedia networks. Although access
to unauthorized persons can be prevented through cryptography, it cannot be
simultaneously used for copyright protection or content authentication with the
preservation of image integrity. Hence, this paper presents an optimized
multipurpose blind watermarking in Shearlet domain with the help of smart
algorithms including MLP and NSGA-II. In this method, four copies of the robust
copyright logo are embedded in the approximate coefficients of Shearlet by
using an effective quantization technique. Furthermore, an embedded random
sequence as a semi-fragile authentication mark is effectively extracted from
details by the neural network. Due to performing an effective optimization
algorithm for selecting optimum embedding thresholds, and also distinguishing
the texture of blocks, the imperceptibility and robustness have been preserved.
The experimental results reveal the superiority of the scheme with regard to
the quality of watermarked images and robustness against hybrid attacks over
other state-of-the-art schemes. The average PSNR and SSIM of the dual
watermarked images are 38 dB and 0.95, respectively; Besides, it can
effectively extract the copyright logo and locates forgery regions under severe
attacks with satisfactory accuracy
A dwt, dct and svd based watermarking technique to protect the image piracy
With the rapid development of information technology and multimedia, the use
of digital data is increasing day by day. So it becomes very essential to
protect multimedia information from piracy and also it is challenging. A great
deal of Copyright owners is worried about protecting any kind of illegal
repetition of their information. Hence, facing all these kinds of problems
development of the techniques is very important. Digital watermarking
considered as a solution to prevent the multimedia data. In this paper, an idea
of watermarking is proposed and implemented. In proposed watermarking method,
the original image is rearranged using zigzag sequence and DWT is applied on
rearranged image. Then DCT and SVD are applied on all high bands LH, HL and HH.
Watermark is then embedded by modifying the singular values of these bands.
Extraction of watermark is performed by the inversion of watermark embedding
process. For choosing of these three bands it gives facility of mid-band and
pure high band that ensures good imperceptibility and more robustness against
different kinds of attacks.Comment: 12 pages, 12 figures and 1 tabl
A reversible high embedding capacity data hiding technique for hiding secret data in images
As the multimedia and internet technologies are growing fast, the
transmission of digital media plays an important role in communication. The
various digital media like audio, video and images are being transferred
through internet. There are a lot of threats for the digital data that are
transferred through internet. Also, a number of security techniques have been
employed to protect the data that is transferred through internet. This paper
proposes a new technique for sending secret messages securely, using
steganographic technique. Since the proposed system uses multiple level of
security for data hiding, where the data is hidden in an image file and the
stego file is again concealed in another image. Previously, the secret message
is being encrypted with the encryption algorithm which ensures the achievement
of high security enabled data transfer through internet.Comment: IEEE Publication format, International Journal of Computer Science
and Information Security, IJCSIS, Vol. 7 No. 3, March 2010, USA. ISSN 1947
5500, http://sites.google.com/site/ijcsis
BlessMark: A Blind Diagnostically-Lossless Watermarking Framework for Medical Applications Based on Deep Neural Networks
Nowadays, with the development of public network usage, medical information
is transmitted throughout the hospitals. The watermarking system can help for
the confidentiality of medical information distributed over the internet. In
medical images, regions-of-interest (ROI) contain diagnostic information. The
watermark should be embedded only into non-regions-of-interest (NROI) to keep
diagnostic information without distortion. Recently, ROI based watermarking has
attracted the attention of the medical research community. The ROI map can be
used as an embedding key for improving confidentiality protection purposes.
However, in most existing works, the ROI map that is used for the embedding
process must be sent as side-information along with the watermarked image. This
side information is a disadvantage and makes the extraction process non-blind.
Also, most existing algorithms do not recover NROI of the original cover image
after the extraction of the watermark. In this paper, we propose a framework
for blind diagnostically-lossless watermarking, which iteratively embeds only
into NROI. The significance of the proposed framework is in satisfying the
confidentiality of the patient information through a blind watermarking system,
while it preserves diagnostic/medical information of the image throughout the
watermarking process. A deep neural network is used to recognize the ROI map in
the embedding, extraction, and recovery processes. In the extraction process,
the same ROI map of the embedding process is recognized without requiring any
additional information. Hence, the watermark is blindly extracted from the
NROI.Comment: Drs. Soroushmehr and Najarian declared that they had not
contributions to the paper. I removed their name
The Robust Digital Image Watermarking using Quantization and Fuzzy Logic Approach in DWT Domain
In this paper a novel approach to embed watermark into the host image using
quantization with the help of Dynamic Fuzzy Inference System (DFIS) is
proposed. The cover image is decomposed up to 3- levels using quantization and
Discrete Wavelet Transform (DWT). A bitmap of size 64x64 pixels is embedded
into the host image using DFIS rule base. The DFIS is utilized to generate the
watermark weighting function to embed the imperceptible watermark. The
implemented watermarking algorithm is imperceptible and robust to some normal
attacks such as JPEG Compression, salt&pepper noise, median filtering, rotation
and cropping.
Keywords: Watermark, Quantization, Dynamic Fuzzy Inference System,
Imperceptible, Robust, JPEG Compression, Cropping.Comment: 7 pages, 11 figures, IJCSN Journa
- …