898 research outputs found

    Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service

    Get PDF
    Homomorphic encryption has been widely used to preserve the privacy of watermarking process on blockchain-driven watermarking services. It offers transparent and traceable encrypted watermarking without revealing sensitive data such as original images or watermark data to the public. Nevertheless, the existing works suffer from enormous memory storage and extensive computing power. This study proposed an approximation-based homomorphic encryption for resource-efficient encrypted watermarking without sacrificing watermarking quality. We demonstrated the efficiency of the Cheon-Kim-Kim-Son (CKKS) encrypted watermarking process using discrete cosine transform-singular value decomposition (DCT-SVD) embedding. The evaluation results showed that it could preserve the watermarking quality similar to non-encrypted watermark embedding, even after geometrical and filtering attacks. Compared to existing homomorphic encryption, such as Brakerski-Gentry-Vaikuntanathan (BFV) encryption, it has superior performance regarding resource utilization and watermarking quality preservation

    New Digital Audio Watermarking Algorithms for Copyright Protection

    Get PDF
    This thesis investigates the development of digital audio watermarking in addressing issues such as copyright protection. Over the past two decades, many digital watermarking algorithms have been developed, each with its own advantages and disadvantages. The main aim of this thesis was to develop a new watermarking algorithm within an existing Fast Fourier Transform framework. This resulted in the development of a Complex Spectrum Phase Evolution based watermarking algorithm. In this new implementation, the embedding positions were generated dynamically thereby rendering it more difficult for an attacker to remove, and watermark information was embedded by manipulation of the spectral components in the time domain thereby reducing any audible distortion. Further improvements were attained when the embedding criteria was based on bin location comparison instead of magnitude, thereby rendering it more robust against those attacks that interfere with the spectral magnitudes. However, it was discovered that this new audio watermarking algorithm has some disadvantages such as a relatively low capacity and a non-consistent robustness for different audio files. Therefore, a further aim of this thesis was to improve the algorithm from a different perspective. Improvements were investigated using an Singular Value Decomposition framework wherein a novel observation was discovered. Furthermore, a psychoacoustic model was incorporated to suppress any audible distortion. This resulted in a watermarking algorithm which achieved a higher capacity and a more consistent robustness. The overall result was that two new digital audio watermarking algorithms were developed which were complementary in their performance thereby opening more opportunities for further research

    Watermarking based on DWT and SVD Algorithmin Medical Image

    Get PDF
    Medical images and accompanying reports have requirement of protecting the privacy of patient. The paper deals with the use of watermarking technique to increase the security of medical images and preserve patient?s privacy.The operation of embedding and extraction of watermark are done by using different watermarking algorithmsi.e Discrete Wavelet Transform, Singular Value Decomposition. Watermark is a normal image to be generated every time and which is to be embedded inside medical images. Then the quality of watermarked images which is obtained after embedding the watermark is to be accessed by calculating Peak Signal to Noise Ratio (between original and watermarked image) and Normalized Correlation (between the original watermark and extracted watermark)

    Improving the Watermarking Technique to Generate Blind Watermark by Using PCA & GLCM Algorithm

    Get PDF
    For making sure that the multimedia information is not accessed or modified by unauthorized users, several digital techniques have been proposed as per the growth of internet applications. However, the most commonly used technique is the watermarking technique. The spatial domain method and frequency domain method are the two broader categorizations of several watermarking techniques proposed over the time. The lower order bits of cover image are improved for embedding a watermark through the spatial domain technique. Minimizing the complexity and including minimum computational values are the major benefits achieved through this technique. However, in the presence of particular security attacks, the robustness of this technique is very high. Further, the techniques that use some invertible transformations such as Discrete Cosine Transform (DCT) are known as the frequency domain transform techniques. The image is hosted by applying Discrete Fourier transforms (DFT) and Discrete Wavelet Transform (DWT) techniques. The coefficient value of these transforms is modified as per the watermark for embedding the watermark within the image easily. Further, on the original image, the inverse transform is applied. The complexity of these techniques is very high. Also, the computational power required here is high. The security attacks are provided with more reverts through these methods. GLCM (Gray Level Co Occurrence Matrix) technique is better approach compare with other approach. In this work, GLCM (Gray Level Co Occurrence Matrix) and PCA (Principal Component Analysis) algorithms are used to improve the work capability of the neural networks by using watermarking techniques. PCA selects the extracted images and GLCM is used to choose the features extracted from the original image. The output of the PCA algorithm is defined by using scaling factor which is further used in the implementation. In this work, the proposed algorithm performs well in terms of PSNR (Peak Signal to Noise Ratio), MSE (Mean Squared Error), and Correlation Coefficient values. The proposed methods values are better from the previous work

    QAM-DWT-SVD Based Watermarking Scheme for Medical Images

    Get PDF
    This paper presents a new semi-blind image watermarking system for medical applications. The new scheme utilizes Singular Value Decomposition (SVD) and Discrete Wavelet Transform (DWT) to embed a textual data into original medical images. In particular, text characters are encoded by a Quadrature Amplitude Modulation (QAM-16). In order to increase the security of the system and protect then the watermark from several attacks, the embedded data is submitted to Arnold Transform before inserting it into the host medical image. To evaluate the performances of the scheme, several medical images have been used in the experiments. Simulation results show that the proposed watermarking system ensures good imperceptibility and high robustness against several attacks

    Protecting Ownership Rights of Videos Against Digital Piracy: An Efficient Digital Watermarking Scheme

    Get PDF
    Violation of one’s intellectual ownership rights by the others is a common problem which entertainment industry frequently faces now-a-days. Sharing of information over social media platforms such as Instagram, WhatsApp and twitter without giving credit the owner causes huge financial losses to the owner and hence needs an immediate attention. Digital watermarking is a promising technique to protect owners’ right against digital piracy. Most of the state-of-the-art techniques does not provides adequate level of resilience against majority of video specific attacks and other commonly applied attacks. Therefore, this paper proposes a highly transparent and robust video watermarking solution to protect the owners rights by first convert each video frame into YCbCr color components and then select twenty five strongest speeded-up robust features (SURF) points of the normalized luminance component as points for both watermark embedding and extraction. After applying variety of geometric, simple signal processing and video specific attacks on the watermarked video meticulous analysis is performed using popular metrics which reveals that the proposed scheme possesses high correlation value which makes it superior for practical applications against these attacks. The scheme also proposes a novel three-level impairment scale for subjective analysis which gives stable results to derive correct conclusions

    Analysis of Digital Watermarking Techniques Using Transform-Based Function

    Get PDF
    Security and protection of digital data is always a challenging job over the internet. For the protection and copyright of digital multimedia data used digital watermarking techniques. The digital watermarking techniques protect the copyright protection of digital multimedia data. Digital watermarking techniques used to transform based function for the processing of watermark embedding. The transform-based function is a texture feature dominated property. The texture feature is the most important part of the digital image. In this paper study and analysis of transform-based digital image watermarking. The transform-based digital image watermarking using the function of DCT, DWT, IWT and SHIFT. In the family of transform, the function used the layered transform function is wavelet transform function, and other is the shift key point transform function. For simulation used MATLAB software and used standard image dataset and symbol for the process of embedding. For the validation of transform function estimate, four well know parameter such as encoding time, decoding time, PSNR, and the value of NC
    • …
    corecore