267 research outputs found

    Robust Digital Video Watermarking using Reversible Data Hiding and Visual Cryptography

    Get PDF
    Watermarking is a major image processing application used to authenticate user documents by embedding and hiding some authenticated piece of information behind an image, audio or the video file. For example, copyright symbols or signatures are often used. Our proposed work is to develop and implement an improved layered approach to video watermarking. The traditional watermarking approach tends to embed an entire watermark image within each video frame or within random video frames to give the appearance of a hidden watermark to the casual observer. This work proposes a more efficient and secure approach to perform watermarking, by using sub image classification. That is to say, selected frames only will contain a fractional number of pixels from the watermark image. We take k bits from the watermark and store then within a video frame, depending on the size of that watermark image. Our algorithm is capable of hiding high capacity information over video frames. The novel approach is to partially distribute the watermarking data over a set of frames until the entire watermark is eventually distributed throughout the entire video. The originality our technique is that it is a histogram inspired and reversible watermarking approach as defined with visual cryptography. Our approach hides similar watermarking pixels with frames of a similar appearance. Differing sets of watermark pixels are thus embedded within dissimilar frames, thus making the system more robust. It will provide a high degree of authentication, as the extraction of information from a single frame only will not reveal the entire watermarking data, or even give any obvious indication that it contains a fraction of the watermark pixels. The resilience of our technique will be tested by performing various systematic attacks upon a series of videos watermarked in this manner

    Digital Watermarking using Multiscale Ridgelet Transform

    Get PDF
    The multi-resolution watermarking method for digital images proposed in this work. The multiscale ridgelet coefficients of low and high frequency bands of the watermark is embedded to the most significant coefficients at low and high frequency bands of the multiscale ridgelet of an host image, respectively. A multi-resolution nature of multiscale ridgelet transform is exploiting in the process of edge detection. Experimental results of the proposed watermarking method are compared with the previously available watermarking algorithm wavelet transform. Moreover, the proposed watermarking method also tested on images attached by Discrete Cosine Transform (DCT) and wavelet based lossy image compression techniques

    Application of Stochastic Diffusion for Hiding High Fidelity Encrypted Images

    Get PDF
    Cryptography coupled with information hiding has received increased attention in recent years and has become a major research theme because of the importance of protecting encrypted information in any Electronic Data Interchange system in a way that is both discrete and covert. One of the essential limitations in any cryptography system is that the encrypted data provides an indication on its importance which arouses suspicion and makes it vulnerable to attack. Information hiding of Steganography provides a potential solution to this issue by making the data imperceptible, the security of the hidden information being a threat only if its existence is detected through Steganalysis. This paper focuses on a study methods for hiding encrypted information, specifically, methods that encrypt data before embedding in host data where the ‘data’ is in the form of a full colour digital image. Such methods provide a greater level of data security especially when the information is to be submitted over the Internet, for example, since a potential attacker needs to first detect, then extract and then decrypt the embedded data in order to recover the original information. After providing an extensive survey of the current methods available, we present a new method of encrypting and then hiding full colour images in three full colour host images with out loss of fidelity following data extraction and decryption. The application of this technique, which is based on a technique called ‘Stochastic Diffusion’ are wide ranging and include covert image information interchange, digital image authentication, video authentication, copyright protection and digital rights management of image data in general

    Survey on 2D-DCT Based Image Watermarking with High Implanting Limit and Robustness

    Get PDF
    The proposed strategy displays a novel rank-based image watermarking. In watermark installing process, the host picture is separated into squares, trailed by 2-D Discrete Cosine Transform (DCT). For every picture block, a mystery key is produced utilizing RFC 2898, which incorporates techniques for making a key and introduction vector (IV) from a secret word and salt. The inserting of watermark bits is completed by adjusting the arrangement of DCT coefficients utilizing a rank-based installing rule.The created mystery key is imparted to the receiver while sending the picture.On watermark location process, with the utilization of accessible mystery key, the watermarked bits are distinguished and are extricated inview of positions of discovery lattices. The pictures transferred for general visibility is shown by DCT which assumes a vital part in keeping up the measure of the picture amid this procedure. Since the proposed watermarking strategy just uses two DCT coefficients to shroud one watermark bit, high installing limit can be accomplished. Also, this strategy is free of host signalinterference. This sought component andthe use of a blunder cushion in watermarkinserting can bring about high vigor against assaults. Hypothetical examination and trial results will exhibit the adequacy of the proposed strategy

    A New Digital Video Watermarking Using Decimated Wavelet and Principle Component Analysis in YCbCr Domain

    Full text link
    Digital watermarking is a technology used for security and for the copyright protection of digital media application. In this letter, we introduced “A New Digital Video Watermarking Using Decimated Wavelet and Principle Component Analysis in YCbCr domain”. First, the input video stream will be divided into number of frames and then select one frame to embed the information into it. Now convert it into YCbCr color space and apply DWT followed by PCA to get the watermarked frame then replace this frame with the original frame to obtain the watermarked video. It has also tested for various attacks such asRST, cropping, compression, filtering and Gaussian noise successfully with reduced bit error. Peak signal to noise ratio (PSNR) and structural similarity index (SSIM) used to measure the quality of watermarked frame. Simulated results had shown that the proposed algorithm gives more superior results and higher imperceptibility over existing algorithm in terms of quality metrics

    Data hiding techniques in steganography using fibonacci sequence and knight tour algorithm

    Get PDF
    The foremost priority in the information and communication technology era, is achieving an efficient and accurate steganography system for hiding information. The developed system of hiding the secret message must capable of not giving any clue to the adversaries about the hidden data. In this regard, enhancing the security and capacity by maintaining the Peak Signal-to-Noise Ratio (PSNR) of the steganography system is the main issue to be addressed. This study proposed an improved for embedding secret message into an image. This newly developed method is demonstrated to increase the security and capacity to resolve the existing problems. A binary text image is used to represent the secret message instead of normal text. Three stages implementations are used to select the pixel before random embedding to select block of (64 × 64) pixels, follows by the Knight Tour algorithm to select sub-block of (8 × 8) pixels, and finally by the random pixels selection. For secret embedding, Fibonacci sequence is implemented to decomposition pixel from 8 bitplane to 12 bitplane. The proposed method is distributed over the entire image to maintain high level of security against any kind of attack. Gray images from the standard dataset (USC-SIPI) including Lena, Peppers, Baboon, and Cameraman are implemented for benchmarking. The results show good PSNR value with high capacity and these findings verified the worthiness of the proposed method. High complexities of pixels distribution and replacement of bits will ensure better security and robust imperceptibility compared to the existing systems in the literature
    corecore