215 research outputs found

    Improved digital watermarking schemes using DCT and neural techniques

    Get PDF
    The present thesis investigates the copyright protection by utilizing the digital watermarking of images. The basic spatial domain technique DCT based frequency based technique were studied and simulated. Most recently used Neural Network based DCT Scheme is also studied and simulated. The earlier used Back Propagation Network (BPN) is replaced by Radial Basis Function Neural Network (RBFNN) in the proposed scheme to improve the robustness and overall computation requirements. Since RBFNN requires less number of weights during training, the memory requirement is also less as compared to BPN. Keywords : Digital Watermarking, Back Propagation Network (BPN), Hash Function, Radial Basis Function Neural Network (RBFNN), and Discrete Cosine Transform (DCT). Watermarking can be considered as a special technique of steganography where one message is embedded in another and the two messages are related to each other in some way. The most common examples of watermarking are the presence of specific patterns in currency notes, which are visible only when the note is held to light, and logos in the background of printed text documents. The watermarking techniques prevent forgery and unauthorized replication of physical objects. In digital watermarking a low-energy signal is imperceptibly embedded in another signal. The low-energy signal is called the watermark and it depicts some metadata, like security or rights information about the main signal. The main signal in which the watermark is embedded is referred to as the cover signal since it covers the watermark. In recent years the ease with which perfect copies can be made has lead large-scale unauthorized copying, which is a great concern to the music, film, book and software publishing industries. Because of this concern over copyright issues, a number of technologies are being developed to protect against illegal copying. One of these technologies is the use of digital watermarks. Watermarking embeds an ownership signal directly into the data. In this way, the signal is always present with the data. Analysis Digital watermarking techniques were implemented in the frequency domain using Discrete Cosine Transform (DCT). The DCT transforms a signal or image from the spatial domain to the frequency domain. Also digital watermarking was implemented using Neural Networks such as: 1. Back Propagation Network (BPN) 2. Radial Basis Function Neural Network (RBFNN) Digital watermarking using RBFNN was proposed which improves both security and robustness of the image. It is based on the Cover’s theorem which states that nonlinearly separable patterns can be separated linearly if the pattern is cast nonlinearly into a higher dimensional space. RBFNN contains an input layer, a hidden layer with nonlinear activation functions and an output layer with linear activation functions. Results The following results were obtained:- 1. The DCT based method is more robust than that of the LSB based method in the tested possible attacks. DCT method can achieve the following two goals: The first is that illegal users do not know the location of the embedded watermark in the image. The second is that a legal user can retrieve the embedded watermark from the altered image. 2. The RBFNN network is easier to train than the BPN network. The main advantage of the RBFNN over the BPN is the reduced computational cost in the training stage, while maintaining a good performance of approximation. Also less number of weights are required to be stored or less memory requirements for the verification and testing in a later stage

    Secure and Robust Fragile Watermarking Scheme for Medical Images

    Get PDF
    Over the past decade advances in computer-based communication and health services, the need for image security becomes urgent to address the requirements of both safety and non-safety in medical applications. This paper proposes a new fragile watermarking based scheme for image authentication and self-recovery for medical applications. The proposed scheme locates image tampering as well as recovers the original image. A host image is broken into 4×4 blocks and Singular Value Decomposition (SVD) is applied by inserting the traces of block wise SVD into the Least Significant Bit (LSB) of the image pixels to figure out the transformation in the original image. Two authentication bits namely block authentication and self-recovery bits were used to survive the vector quantization attack. The insertion of self-recovery bits is determined with Arnold transformation, which recovers the original image even after a high tampering rate. SVD-based watermarking information improves the image authentication and provides a way to detect different attacked area. The proposed scheme is tested against different types of attacks such are text removal attack, text insertion attack, and copy and paste attack

    Detecting image manipulations without the original, 2008

    Get PDF
    This study examines whether image manipulations can be detected without the original image present. The idea for the study was based on the premise that there is currently no existing benchmark for determining if an image was manipulated. A case study analysis approach was used to analyze data gathered in order to determine if noticeable differences could be recognized between the original image and the altered images based on the defmed tests. The researcher found that there are significant differences between the test images and based on the defmed tests, there possibly exists criteria to defme an altered image. The conclusions drawn from the findings suggest that there exists specific tests that can indicate an altered image

    Wavelet based Watermarking approach in the Compressive Sensing Scenario

    Full text link
    Due to the wide distribution and usage of digital media, an important issue is protection of the digital content. There is a number of algorithms and techniques developed for the digital watermarking.In this paper, the invisible image watermark procedure is considered. Watermark is created as a pseudo random sequence, embedded in the certain region of the image, obtained using Haar wavelet decomposition. Generally, the watermarking procedure should be robust to the various attacks-filtering, noise etc. Here we assume the Compressive sensing scenario as a new signal processing technique that may influence the robustness. The focus of this paper was the possibility of the watermark detection under Compressive Sensing attack with different number of available image coefficients. The quality of the reconstructed images has been evaluated using Peak Signal to Noise Ratio (PSNR).The theory is supported with experimental results
    corecore