17 research outputs found

    Towards Optimal Copyright Protection Using Neural Networks Based Digital Image Watermarking

    Get PDF
    In the field of digital watermarking, digital image watermarking for copyright protection has attracted a lot of attention in the research community. Digital watermarking contains varies techniques for protecting the digital content. Among all those techniques,Discrete Wavelet Transform (DWT) provides higher image imperceptibility and robustness. Over the years, researchers have been designing watermarking techniques with robustness in mind, in order for the watermark to be resistant against any image processing techniques. Furthermore, the requirements of a good watermarking technique includes a tradeoff between robustness, image quality (imperceptibility) and capacity. In this paper, we have done an extensive literature review for the existing DWT techniques and those combined with other techniques such as Neural Networks. In addition to that, we have discuss the contribution of Neural Networks in copyright protection. Finally we reached our goal in which we identified the research gaps existed in the current watermarking schemes. So that, it will be easily to obtain an optimal techniques to make the watermark object robust to attacks while maintaining the imperceptibility to enhance the copyright protection

    Robust Logo Watermarking

    Get PDF
    Digital image watermarking is used to protect the copyright of digital images. In this thesis, a novel blind logo image watermarking technique for RGB images is proposed. The proposed technique exploits the error correction capabilities of the Human Visual System (HVS). It embeds two different watermarks in the wavelet/multiwavelet domains. The two watermarks are embedded in different sub-bands, are orthogonal, and serve different purposes. One is a high capacity multi-bit watermark used to embed the logo, and the other is a 1-bit watermark which is used for the detection and reversal of geometrical attacks. The two watermarks are both embedded using a spread spectrum approach, based on a pseudo-random noise (PN) sequence and a unique secret key. Robustness against geometric attacks such as Rotation, Scaling, and Translation (RST) is achieved by embedding the 1-bit watermark in the Wavelet Transform Modulus Maxima (WTMM) coefficients of the wavelet transform. Unlike normal wavelet coefficients, WTMM coefficients are shift invariant, and this important property is used to facilitate the detection and reversal of RST attacks. The experimental results show that the proposed watermarking technique has better distortion parameter detection capabilities, and compares favourably against existing techniques in terms of robustness against geometrical attacks such as rotation, scaling, and translation

    Design and development of digital watermarking for color images

    Get PDF
    ได้ทุนอุดหนุนการวิจัยจากมหาวิทยาลัยเทคโนโลยีสุรนารี ปีงบประมาณ พ.ศ.255

    Enhancement of digital grayscale image watermarking using sparse matrix

    Get PDF
    Watermarking is a form of steganography that proved its worth in successfully protecting copyright information. It is the process of embedding data inside an audio or video or image message such that the embedded data is possible to be detected or extracted later. The core focus in watermarking techniques is their performance which is determined by imperceptibility along with robustness and capacity. These properties are often conflicting, which needs to accept some trade-offs between them. Despite the successes recorder in the area of digital watermarking, several challenges continue to persist particularly in the Areas of balancing these factors. This research aims to enhance the the processes in the watermarking technique for archieving imperceptibility with an acceptable balancing and enhance the security. The research proposed a new scheme using sparse matrix for improving the effectiveness of watermarked image using digital wavelet transform and inverse discrete wavelet transform to locate the best place and level in the image to embed the watermark. Sparse matrix is used to enhance the embedding process by selecting the proper coefficient. For more secure watermarking, additional encryption layer is utilized to increase the difficulty towards unauthorized extraction. The proposed technique generated the proper message size for each sub image based on the PSNR, which is used as an indicator for selecting the suitable level of embedding and for detecting the possibility of attacks. The proposed scheme improves watermarking quality by using the sparse matrix to select the appropriate coefficient for embedding. The experiments showed that the proposed scheme enhances 2.8479 dB of quality (PSNR) or equivalent to 5.3 % of improvements. The research proposed scheme achieved better PSNR in comparison with other research

    An improvement of RGB color image watermarking technique using ISB stream bit and Hadamard matrix

    Get PDF
    In the past half century, the advancement of internet technology has been rapid and widespread. The innovation provides an efficient platform for human communication and other digital applications. Nowadays, everyone can easily access, copy, modify and distribute digital contents for personal or commercial gains. Therefore, a good copyright protection is required to discourage the illicit activities. On way is to watermark the assets by embedding an owner's identity which could later on be used for authentication. Thus far, many watermarking techniques have been proposed which focus on improving three standard measures, visual quality or imperceptibility, robustness and capacity. Although their performances are encouraging, there are still plenty of rooms for improvements. Thus, this study proposes a new watermarking technique using Least Significant Bit (LSB) insertion approach coupled with Hadamard matrix. The technique involves four main stages: Firstly, the cover image is decomposed into three separate channels, Red, Green and Blue. Secondly, the Blue channel is chosen and converted into an eight bit stream. Thirdly, the second least signification bit is selected from the bit stream for embedding. In order to increase the imperceptibility a Hadamard matrix is used to find the best pixels of the cover image for the embedding task. Experimental results on standard dataset have revealed that average PSNR value is greater than 58db, which indicates the watermarked image is visually identical to its original. However, the proposed technique suffers from Gaussian and Poisson noise attacks

    Design and development of digital color image watermarking for android devices

    Get PDF
    ได้ทุนอุดหนุนการวิจัยจากมหาวิทยาลัยเทคโนโลยีสุรนารี ปีงบประมาณ พ.ศ. 255

    Watermarking scheme using slantlet transform and enhanced knight tour algorithm for medical images

    Get PDF
    Digital watermarking has been employed as an alternative solution to protect the medical healthcare system with a layer of protection applied directly on top of data stored. Medical image that is highly sensitive to the image processing and cannot tolerate any visual degradation has become the focus of digital watermarking. However, since watermarking introduces some changes on medical images, it is a challenge for medical image watermarking to maintain high imperceptibility and robustness at the same time. Research to date has tended to focus on the embedding method instead of the sequence of embedding of the watermarking itself. Also, although watermarking has been introduced into medical images as a layer of protection, it still cannot prevent a knowledgeable hacker from retrieving the watermark. Therefore, this research proposes a robust watermarking scheme with high imperceptibility for medical images to increase the effectiveness of the medical healthcare system in terms of perceptibility, embedding technique, embedding region and embedding sequence of the watermarking scheme. To increase imperceptibility of a watermark, this research introduces Dynamic Visibility Threshold, a new parameter that increases visual quality in terms of imperceptibility. It is a unique number which differs for each host image using descriptive statistics. In addition, two new concepts of embedding region, namely Embeddable zone (EBD) and Non-Embeddable zone (NEBD) to function as a non-parametric decision region to complicate the estimate of the detection function are also proposed. The sequence of embedding is shuffled using enhanced Knight Tour algorithm based on Slantlet Transform to increase the complexity of the watermarking scheme. A significant result from the Peak Signal-to-Noise Ratio (PSNR) evaluation showing approximately 270 dB was obtained, suggesting that this proposed medical image watermarking technique outperforms other contemporary techniques in the same working domain. Based on the experimental result using the standard dataset, all host images are resilient to Salt and Pepper Noise, Speckle Noise, Poisson Noise, Rotation and Sharpen Filter with minimum Bit Error Rate (BER) of 0.0426 and Normalized Cross-Correlation (NCC) value of as high as 1. Since quartile theory is used, this experiment has shown that among all three quartiles, the Third Quartile performs the best in functioning as Dynamic Visibility Threshold (DVT) with 0 for BER and 1 for NCC evaluation

    ИНТЕЛЛЕКТУАЛЬНЫЙ числовым программным ДЛЯ MIMD-компьютер

    Get PDF
    For most scientific and engineering problems simulated on computers the solving of problems of the computational mathematics with approximately given initial data constitutes an intermediate or a final stage. Basic problems of the computational mathematics include the investigating and solving of linear algebraic systems, evaluating of eigenvalues and eigenvectors of matrices, the solving of systems of non-linear equations, numerical integration of initial- value problems for systems of ordinary differential equations.Для більшості наукових та інженерних задач моделювання на ЕОМ рішення задач обчислювальної математики з наближено заданими вихідними даними складає проміжний або остаточний етап. Основні проблеми обчислювальної математики відносяться дослідження і рішення лінійних алгебраїчних систем оцінки власних значень і власних векторів матриць, рішення систем нелінійних рівнянь, чисельного інтегрування початково задач для систем звичайних диференціальних рівнянь.Для большинства научных и инженерных задач моделирования на ЭВМ решение задач вычислительной математики с приближенно заданным исходным данным составляет промежуточный или окончательный этап. Основные проблемы вычислительной математики относятся исследования и решения линейных алгебраических систем оценки собственных значений и собственных векторов матриц, решение систем нелинейных уравнений, численного интегрирования начально задач для систем обыкновенных дифференциальных уравнений

    Metodologia para medidas objetivas de qualidade de vídeo em sistemas de difusão de conteúdos audiovisuais

    Get PDF
    Tese (doutorado) - Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2013.Este trabalho apresenta uma metodologia para a verificação da qualidade de vídeos em sistemas de difusão em massa. A metodologia proposta apresenta uma nova forma de medir a qualidade de vídeo de forma objetiva sem a utilização de referência para comparação entre as sequências de vídeo original e processada. As medidas no ambiente do usuário são feitas independentemente dos processamentos e da tecnologia da rede de distribuição. A medida da qualidade é feita por meio da inserção de marcas de testes nos vídeos, logo após a produção destes. O processamento e distribuição desses vídeos em um sistema de difusão em massa podem causar degradações que afetam as marcas inseridas. Os vídeos recebidos no ambiente do usuário são captados por meio de uma câmera de vídeo disponível em conjunto com o terminal, que identifica a marca inserida anteriormente à distribuição. Esta captura é feita pelo sistema óptico do ambiente do usuário após uma calibração do sistema. As marcas recebidas passam por um processamento de uma função de qualidade que tem como resultado um valor numérico indicando a qualidade deste vídeo. Como resultados da metodologia, são apresentadas comparações com sistemas de medição de qualidade de vídeo de referência completa utilizados em testes por organismos de padronização. As comparações com os sistemas VQM (Video Quality Metrics) e SSIM (Structural SIMilarity) foram feitas utilizando várias sequências de vídeo de testes, onde foi alcançada uma correlação estatística maior que 80% entre as medidas de qualidade resultantes da nova metodologia e as desses sistemas de referência. ______________________________________________________________________________ ABSTRACTThis work presents a method for verifying the quality of videos on mass broadcasting systems. The proposed method presents a new way of measuring the objective video quality without reference. The measurements in the user’s environment are made regardless of the processing and the broadcasting network technology. A quality measure is made by the insertion of test marks on videos, immediately after the content production. The processing and distribution of these videos on a mass broadcasting system can cause degradations that affect the inserted marks. The video received in the user’s environment is captured by a video camera available along with the video terminal. The captured video should identify the mark inserted before the distribution. This capture is made by the optical system in the user environment after a system calibration. The mark is decoded by the processing of a quality function which results in a numerical value indicating the quality of the video. The results of video quality metrics using this methodology were compared to stan- dardized full reference metrics, VQM (Video Quality Metrics) and SSIM (Structural Similarity), and the linear correlation between this proposed new metrics and the other two metrics was greater than 80%, indicating convergence between these metrics

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others
    corecore