121 research outputs found

    Towards Optimal Copyright Protection Using Neural Networks Based Digital Image Watermarking

    Get PDF
    In the field of digital watermarking, digital image watermarking for copyright protection has attracted a lot of attention in the research community. Digital watermarking contains varies techniques for protecting the digital content. Among all those techniques,Discrete Wavelet Transform (DWT) provides higher image imperceptibility and robustness. Over the years, researchers have been designing watermarking techniques with robustness in mind, in order for the watermark to be resistant against any image processing techniques. Furthermore, the requirements of a good watermarking technique includes a tradeoff between robustness, image quality (imperceptibility) and capacity. In this paper, we have done an extensive literature review for the existing DWT techniques and those combined with other techniques such as Neural Networks. In addition to that, we have discuss the contribution of Neural Networks in copyright protection. Finally we reached our goal in which we identified the research gaps existed in the current watermarking schemes. So that, it will be easily to obtain an optimal techniques to make the watermark object robust to attacks while maintaining the imperceptibility to enhance the copyright protection

    AN INVESTIGATION OF DIFFERENT VIDEO WATERMARKING TECHNIQUES

    Get PDF
    Watermarking is an advanced technology that identifies to solve the problem of illegal manipulation and distribution of digital data. It is the art of hiding the copyright information into host such that the embedded data is imperceptible. The covers in the forms of digital multimedia object, namely image, audio and video. The extensive literature collected related to the performance improvement of video watermarking techniques is critically reviewed and presented in this paper. Also, comprehensive review of the literature on the evolution of various video watermarking techniques to achieve robustness and to maintain the quality of watermarked video sequences

    A Study of Image Fingerprinting by Using Visual Cryptography

    Get PDF
    As digital media has made our life more colourful because of its advantages like easier to access, copy and distribute. But as what we have seen, series of malice activities like copyright infringement, counterfeiting, piracy and information distortion make damages to both the producers and the users of digital products. So we really need some technology to protect the copyright, authenticity, integrity of the digital products and the intellectual property of the users. There are many techniques such as Digital watermarking and Visual Cryptography both have been widely used for protection of data either in text, video, sound or digital images form in modern network time. Digital watermarking is an evolving field that requires continuous effort to find for the best possible method in protecting multimedia content. But Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. Both techniques addresses the growing concerns of theft and tampering of digital media through the use of advanced signal processing strategies to embed copyright and authentication information within media content in their respective manner. In this paper we have discussed image fingerprinting with the help of visual cryptography technique. Keywords: Authentication, Digital Media, Digital Watermarking, Fingerprinting, Image, Piracy, Visual Cryptograph

    Secured Mechanism Towards Integrity of Digital Images Using DWT, DCT, LSB and Watermarking Integrations

    Get PDF
    "Watermarking" is one method in which digital information is buried in a carrier signal; the hidden information should be related to the carrier signal. There are many different types of digital watermarking, including traditional watermarking that uses visible media (such as snaps, images, or video), and a signal may be carrying many watermarks. Any signal that can tolerate noise, such as audio, video, or picture data, can have a digital watermark implanted in it. A digital watermark must be able to withstand changes that can be made to the carrier signal in order to protect copyright information in media files. The goal of digital watermarking is to ensure the integrity of data, whereas steganography focuses on making information undetectable to humans. Watermarking doesn't alter the original digital image, unlike public-key encryption, but rather creates a new one with embedded secured aspects for integrity. There are no residual effects of encryption on decrypted documents. This work focuses on strong digital image watermarking algorithms for copyright protection purposes. Watermarks of various sorts and uses were discussed, as well as a review of current watermarking techniques and assaults. The project shows how to watermark an image in the frequency domain using DCT and DWT, as well as in the spatial domain using the LSB approach. When it comes to noise and compression, frequency-domain approaches are far more resilient than LSB. All of these scenarios necessitate the use of the original picture to remove the watermark. Out of the three, the DWT approach has provided the best results. We can improve the resilience of our watermark while having little to no extra influence on image quality by embedding watermarks in these places.

    A robust region-adaptive digital image watermarking system

    Get PDF
    Digital image watermarking techniques have drawn the attention of researchers and practitioners as a means of protecting copyright in digital images. The technique involves a subset of information-hiding technologies, which work by embedding information into a host image without perceptually altering the appearance of the host image. Despite progress in digital image watermarking technology, the main objectives of the majority of research in this area remain improvements in the imperceptibility and robustness of the watermark to attacks. Watermark attacks are often deliberately applied to a watermarked image in order to remove or destroy any watermark signals in the host data. The purpose of the attack is. aimed at disabling the copyright protection system offered by watermarking technology. Our research in the area of watermark attacks found a number of different types, which can be classified into a number of categories including removal attacks, geometry attacks, cryptographic attacks and protocol attacks. Our research also found that both pixel domain and transform domain watermarking techniques share similar levels of sensitivity to these attacks. The experiment conducted to analyse the effects of different attacks on watermarked data provided us with the conclusion that each attack affects the high and low frequency part of the watermarked image spectrum differently. Furthermore, the findings also showed that the effects of an attack can be alleviated by using a watermark image with a similar frequency spectrum to that of the host image. The results of this experiment led us to a hypothesis that would be proven by applying a watermark embedding technique which takes into account all of the above phenomena. We call this technique 'region-adaptive watermarking'. Region-adaptive watermarking is a novel embedding technique where the watermark data is embedded in different regions of the host image. The embedding algorithms use discrete wavelet transforms and a combination of discrete wavelet transforms and singular value decomposition, respectively. This technique is derived from the earlier hypothesis that the robustness of a watermarking process can be improved by using watermark data in the frequency spectrum that are not too dissimilar to that of the host data. To facilitate this, the technique utilises dual watermarking technologies and embeds parts of the watermark images into selected regions of the host image. Our experiment shows that our technique improves the robustness of the watermark data to image processing and geometric attacks, thus validating the earlier hypothesis. In addition to improving the robustness of the watermark to attacks, we can also show a novel use for the region-adaptive watermarking technique as a means of detecting whether certain types of attack have occurred. This is a unique feature of our watermarking algorithm, which separates it from other state-of-the-art techniques. The watermark detection process uses coefficients derived from the region-adaptive watermarking algorithm in a linear classifier. The experiment conducted to validate this feature shows that, on average, 94.5% of all watermark attacks can be correctly detected and identified
    corecore