68 research outputs found

    Joint watermarking and encryption of color images in the Fibonacci-Haar domain

    Get PDF
    A novel method for watermarking and ciphering color images, based on the joint use of a key-dependent wavelet transform with a secure cryptographic scheme, is presented. The system allows to watermark encrypted data without requiring the knowledge of the original data and also to cipher watermarked data without damaging the embedded signal. Since different areas of the proposed transform domain are used for encryption and watermarking, the extraction of the hidden information can be performed without deciphering the cover data and it is also possible to decipher watermarked data without removing the watermark. Experimental results show the effectiveness of the proposed scheme

    Security of Electronic Patient Record using Imperceptible DCT-SVD based Audio Watermarking Technique

    Get PDF
    Abstract—A robust and highly imperceptible audio watermarkingtechnique is presented to secure the electronic patientrecord of Parkinson’s Disease (PD) affected patient. The proposedDCT-SVD based watermarking technique introduces minimalchanges in speech such that the accuracy in classification of PDaffected person’s speech and healthy person’s speech is retained.To achieve high imperceptibility the voiced part of the speech isconsidered for embedding the watermark. It is shown that theproposed watermarking technique is robust to common signalprocessing attacks. The practicability of the proposed technique istested: by creating an android application to record & watermarkthe speech signal. The classification of PD affected speech is doneusing Support Vector Machine (SVM) classifier in cloud server

    A NOVEL JOINT PERCEPTUAL ENCRYPTION AND WATERMARKING SCHEME (JPEW) WITHIN JPEG FRAMEWORK

    Get PDF
    Due to the rapid growth in internet and multimedia technologies, many new commercial applications like video on demand (VOD), pay-per-view and real-time multimedia broadcast etc, have emerged. To ensure the integrity and confidentiality of the multimedia content, the content is usually watermarked and then encrypted or vice versa. If the multimedia content needs to be watermarked and encrypted at the same time, the watermarking function needs to be performed first followed by encryption function. Hence, if the watermark needs to be extracted then the multimedia data needs to be decrypted first followed by extraction of the watermark. This results in large computational overhead. The solution provided in the literature for this problem is by using what is called partial encryption, in which media data are partitioned into two parts - one to be watermarked and the other is encrypted. In addition, some multimedia applications i.e. video on demand (VOD), Pay-TV, pay-per-view etc, allow multimedia content preview which involves „perceptual‟ encryption wherein all or some selected part of the content is, perceptually speaking, distorted with an encryption key. Up till now no joint perceptual encryption and watermarking scheme has been proposed in the literature. In this thesis, a novel Joint Perceptual Encryption and Watermarking (JPEW) scheme is proposed that is integrated within JPEG standard. The design of JPEW involves the design and development of both perceptual encryption and watermarking schemes that are integrated in JPEG and feasible within the „partial‟ encryption framework. The perceptual encryption scheme exploits the energy distribution of AC components and DC components bitplanes of continuous-tone images and is carried out by selectively encrypting these AC coefficients and DC components bitplanes. The encryption itself is based on a chaos-based permutation reported in an earlier work. Similarly, in contrast to the traditional watermarking schemes, the proposed watermarking scheme makes use of DC component of the image and it is carried out by selectively substituting certain bitplanes of DC components with watermark bits. vi ii Apart from the aforesaid JPEW, additional perceptual encryption scheme, integrated in JPEG, has also been proposed. The scheme is outside of joint framework and implements perceptual encryption on region of interest (ROI) by scrambling the DCT blocks of the chosen ROI. The performances of both, perceptual encryption and watermarking schemes are evaluated and compared with Quantization Index modulation (QIM) based watermarking scheme and reversible Histogram Spreading (RHS) based perceptual encryption scheme. The results show that the proposed watermarking scheme is imperceptible and robust, and suitable for authentication. Similarly, the proposed perceptual encryption scheme outperforms the RHS based scheme in terms of number of operations required to achieve a given level of perceptual encryption and provides control over the amount of perceptual encryption. The overall security of the JPEW has also been evaluated. Additionally, the performance of proposed separate perceptual encryption scheme has been thoroughly evaluated in terms of security and compression efficiency. The scheme is found to be simpler in implementation, have insignificant effect on compression ratios and provide more options for the selection of control factor

    Improved Watermarking Algorithm Based on Discrete Wavelet Transform and Fibonacci Permutation

    Get PDF
    Digital image watermark is an imperceptible, robust, secure message embedded into the image, which identify one or more owner, distributor, or recipient of the image, origin or status of the data or transaction dates. Watermarking is also used for data hiding, content labeling, broadcast monitoring, and integrity control applications. Digital watermarking resembles communication systems. Watermark is the sent message. Image is the watermark channel or carrier. Image pixels and possible attacks on marked image constitute the noise. Only the authorized parties' extracts the watermark message from the marked image by using detector. Digital watermarking has three major requirements. Watermark should be robust against noise and attacks, imperceptible and has the required capacity. These three requirements conflict with each other. To illustrate, increasing the watermark strength makes the system more robust but unfortunately decreases the perceptual quality. As a second example, increasing the capacity of the watermark decreases the robustness. In this thesis, the goal was to study digital image watermarking and develop watermarking algorithm that can achieve high imperceptibility, maximum capacity, and high robustness against image manipulation at the same time. This algorithm is based on the combination of Fibonacci permutation and discrete wavelet transforms (DWT). A binary image is used as the watermark and inserted into a mid-frequency wavelet subband of the permuted image. The watermarked image is reproduced by taking the inverse DWT and the inverse permutation. In extraction process the watermark is extracted from the watermarked image directly without using the original image. The experimental results have shown that the proposed watermark is invisible to human eyes and very robust against image manipulation, such as JPEG compression, median filtering, wiener filtering, and noises

    Image Hiding on Audio Subband Based On Centroid in Frequency Domain

    Get PDF
    ABSTRAK Audio watermarking adalah mekanisme penyembunyian data pada audio. Metode penyembunyian data yang digunakan dalam penulisan ini adalah Lifting Wavelet Transform (LWT), Fast Fourier Transform (FFT), Centroid dan Quantization Index Modulation (QIM). Langkah pertama adalah host audio tersegmentasi menjadi beberapa frame. Kemudian sub-band terpilih diubah oleh FFT dengan mengubah domain sub-band dari waktu ke frekuensi. Proses centroid digunakan untuk menemukan titik pusat frekuensi untuk lokasi penyisipan untuk mendapatkan output yang lebih stabil. Proses penyematan dilakukan dengan QIM. Kinerja watermarking oleh parameter yang disesuaikan memperoleh nilai imperceptibility dengan Signal to Noise Ratio (SNR) > 21 dB, Mean Opinion Score (MOS)> 3.8 dengan kapasitas = 86.13 bps. Selain itu, untuk sebagian besar file audio terwatermark yang diserang, metode ini tahan terhadap beberapa serangan seperti Low Pass Filter (LPF) dengan fco> 6 kHz, Band Pass Filter (BPF) dengan fco 50 Hz - 6 kHz, Linear Speed Change (LSC) dan MP4 Compression dengan Bit Error Rate (BER) kurang dari 20%. Kata kunci: FFT, subband, LWT, Centroid, Audio Watermarking, QIM   ABSTRACT Audio watermarking is a mechanism for hiding data on audio. Data hiding methods used in this paper are Lifting Wavelet Transform (LWT), Fast Fourier Transform (FFT), Centroid and Quantization Index Modulation (QIM). The first step is to segment host audio into several frames, then the selected sub-band is changed by the FFT by changing the sub-band domain from time to frequency. The centroid process is used to find the center of frequency for the insertion location to get a more stable output. The embedding process is done by QIM. The watermarking performance by adjusted parameters obtains the imperceptibility value with Signal to Noise Ratio (SNR)> 21 dB, Mean Opinion Score (MOS)> 3.8 with a capacity = 86.13 bps. In addition, for most of attacked watermarked audio files, this method is resistant to several attacks such as Low Pass Filter (LPF) with fco> 6 kHz, Band Pass Filter (BPF) with fco 50 Hz - 6 kHz, Linear Speed Change (LSC) and MP4 Compression with Bit Error Rate (BER) less than 20%. Keywords: FFT, subband, LWT, Centroid, Audio Watermarking, QI

    An Expert system solution to watermarking

    Get PDF
    The watermarking system proposed in this paper offers an expert system technique to help solve the ownership claim on digital images. The watermarking system is based on fuzzy logic and was designed with the intent of embedding watermark features such that they are undetectable to the human visual system. To achieve this objective, the development and design of the watermarking scheme was targeted to utilize three of the five perceptual holes of the human visual system: intensity resolution, intensity sensitivity and spatial masking. Basing the design on these characteristics, the resulting watermarking scheme proved to be resilient to several image processing techniques that are typical for the accidental attack process. The results of the evaluation of the accidental attacks are compared to another spatial watermarking technique. The evaluation of the embedded watermark was subjected to a limited sample of human visual system observers
    corecore