28 research outputs found

    Data hiding in images based on fractal modulation and diversity combining

    Get PDF
    The current work provides a new data-embedding infrastructure based on fractal modulation. The embedding problem is tackled from a communications point of view. The data to be embedded becomes the signal to be transmitted through a watermark channel. The channel could be the image itself or some manipulation of the image. The image self noise and noise due to attacks are the two sources of noise in this paradigm. At the receiver, the image self noise has to be suppressed, while noise due to the attacks may sometimes be predicted and inverted. The concepts of fractal modulation and deterministic self-similar signals are extended to 2-dimensional images. These novel techniques are used to build a deterministic bi-homogenous watermark signal that embodies the binary data to be embedded. The binary data to be embedded, is repeated and scaled with different amplitudes at each level and is used as the wavelet decomposition pyramid. The binary data is appended with special marking data, which is used during demodulation, to identify and correct unreliable or distorted blocks of wavelet coefficients. This specially constructed pyramid is inverted using the inverse discrete wavelet transform to obtain the self-similar watermark signal. In the data embedding stage, the well-established linear additive technique is used to add the watermark signal to the cover image, to generate the watermarked (stego) image. Data extraction from a potential stego image is done using diversity combining. Neither the original image nor the original binary sequence (or watermark signal) is required during the extraction. A prediction of the original image is obtained using a cross-shaped window and is used to suppress the image self noise in the potential stego image. The resulting signal is then decomposed using the discrete wavelet transform. The number of levels and the wavelet used are the same as those used in the watermark signal generation stage. A thresholding process similar to wavelet de-noising is used to identify whether a particular coefficient is reliable or not. A decision is made as to whether a block is reliable or not based on the marking data present in each block and sometimes corrections are applied to the blocks. Finally the selected blocks are combined based on the diversity combining strategy to extract the embedded binary data

    Digital watermarking and novel security devices

    Get PDF
    EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    A New Digital Watermarking Algorithm Using Combination of Least Significant Bit (LSB) and Inverse Bit

    Full text link
    In this paper, we introduce a new digital watermarking algorithm using least significant bit (LSB). LSB is used because of its little effect on the image. This new algorithm is using LSB by inversing the binary values of the watermark text and shifting the watermark according to the odd or even number of pixel coordinates of image before embedding the watermark. The proposed algorithm is flexible depending on the length of the watermark text. If the length of the watermark text is more than ((MxN)/8)-2 the proposed algorithm will also embed the extra of the watermark text in the second LSB. We compare our proposed algorithm with the 1-LSB algorithm and Lee's algorithm using Peak signal-to-noise ratio (PSNR). This new algorithm improved its quality of the watermarked image. We also attack the watermarked image by using cropping and adding noise and we got good results as well.Comment: 8 pages, 6 figures and 4 tables; Journal of Computing, Volume 3, Issue 4, April 2011, ISSN 2151-961

    Watermarking digital image and video data. A state-of-the-art overview

    Full text link

    The Impact of the theoretical properties of the Logistic Function on the generation of optically detectable watermarks

    Get PDF
    A digital watermark is a visible, or preferably invisible, identification code that is permanently embedded in digital media, to prove owner authentication and provide protection for security or defence documents.In this paper, we present an approach for the generation of watermarks using a logistic chaotic function. Using this function in conjunction with seed management, it is possible to generate chaotic sequences that may be used to create highpass or lowpass digital watermarks. A slight change in the initial conditions will quickly lead to a significant change in the subsequent states of the system, and thus will generate substantially different watermarks. This technique has been shown to offer an added security advantage over the more traditionally generated watermarks created from pseudorandom sequences, in that only the function seed needs to be stored. We have previously presented a study where an optical correlator was suitable for the detection of chaotically generated watermarks.We have also studied the impact of shot noise present in an optical detector for watermarks generated using the logistic function. The logistic function presented in this paper is ill-defined for certained seed values and has not been fully investigated for the purpose of watermark generation. We consider the impact of the theoretical properties of the logistic function on watermark generation and their highpass and lowpass properties, which when embedded in digital media, are suitable for optical detection

    Generation and Detection of Watermarks Derived from Chaotic Functions

    Get PDF
    A digital watermark is a visible, or preferably invisible, identification code that is permanently embedded in digital media, to prove owner authentication thereby providing a level of document protection. In this paper, we review several approaches for the generation of watermarks using chaotic functions, and in particular, the logistic chaotic function. Using this function, in conjunction with seed management, it is to generate chaotic sequences that may be used to create highpass or lowpass digital watermarks.A slight change in the initial conditions will quickly lead to a significant change in the subsequent states of the system, and thus will generate substantially different watermarks. This technique has been shown to offer an added security advantage over tha more traditionally generated watermarks created from pseudorandom sequences, in that only the function seed needs to be stored. It also has the advantage that , through examination of the theoretical properties of the function, it is possible to choose seeds that lead to robust, lowpass watermarks. We review various detection techniques including correlation and statistical methods, and present an analysis of the impact of noise present in a model optical detector. The logistic function presented in this paper is ill defined for certain seed values and has not been fully investigated for the purpose of watermark generation. We consider the impact of the theoretical properties of the logistic function for several chaos-based watermark generation techniques, in particular, their highpass and low pass properties, which when embedded in digital media, are suitable for correlation and statistical based detection methods

    Optical and Digital Technique for Watermark Detection

    Get PDF
    A digital watermark is a visible, or preferably invisible, identification code that is permanently embedded in some digital data to prove owner authentication and provide protection of that document. In this paper we utilize a watermark generation technique based on the use of chaotic functions and the motivation for using these functions is presented. The technique used for watermark embedding is also described, together with a watermark detection scheme based on an optical Matched Filter correlator. We provide results of optical simulations of the watermark detection scheme and show that correlation-based detection is an excellent method for detecting chaotically-generated watermarks embedded in the Fourier domain using multiplicative embedding.We also show that it is possible to detect chaotically-generated watermarks in images that have been subjected to noise

    Optical and Digital Technique for Watermark Detection

    Get PDF
    A digital watermark is a visible, or preferably invisible, identification code that is permanently embedded in some digital data to prove owner authentication and provide protection of that document. In this paper we utilize a watermark generation technique based on the use of chaotic functions and the motivation for using these functions is presented. The technique used for watermark embedding is also described, together with a watermark detection scheme based on an optical Matched Filter correlator. We provide results of optical simulations of the watermark detection scheme and show that correlation-based detection is an excellent method for detecting chaotically-generated watermarks embedded in the Fourier domain using multiplicative embedding.We also show that it is possible to detect chaotically-generated watermarks in images that have been subjected to noise

    Tamper detection of qur'anic text watermarking scheme based on vowel letters with Kashida using exclusive-or and queueing technique

    Get PDF
    The most sensitive Arabic text available online is the digital Holy Qur’an. This sacred Islamic religious book is recited by all Muslims worldwide including the non-Arabs as part of their worship needs. It should be protected from any kind of tampering to keep its invaluable meaning intact. Different characteristics of the Arabic letters like the vowels ( أ . و . ي ), Kashida (extended letters), and other symbols in the Holy Qur’an must be secured from alterations. The cover text of the al-Qur’an and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio (PSNR), Embedding Ratio (ER), and Normalized Cross-Correlation (NCC), thus the location for tamper detection gets low accuracy. Watermarking technique with enhanced attributes must therefore be designed for the Qur’an text using Arabic vowel letters with Kashida. Most of the existing detection methods that tried to achieve accurate results related to the tampered Qur’an text often show various limitations like diacritics, alif mad surah, double space, separate shapes of Arabic letters, and Kashida. The gap addressed by this research is to improve the security of Arabic text in the Holy Qur’an by using vowel letters with Kashida. The purpose of this research is to enhance Quran text watermarking scheme based on exclusive-or and reversing with queueing techniques. The methodology consists of four phases. The first phase is pre-processing followed by the embedding process phase to hide the data after the vowel letters wherein if the secret bit is ‘1’, insert the Kashida but do not insert it if the bit is ‘0’. The third phase is extraction process and the last phase is to evaluate the performance of the proposed scheme by using PSNR (for the imperceptibility), ER (for the capacity), and NCC (for the security of the watermarking). The experimental results revealed the improvement of the NCC by 1.77 %, PSNR by 9.6 %, and ER by 8.6 % compared to available current schemes. Hence, it can be concluded that the proposed scheme has the ability to detect the location of tampering accurately for attacks of insertion, deletion, and reordering
    corecore