965 research outputs found

    Optimum Watermark Detection and Embedding in Digital Images

    Get PDF
    This work concentrates on the problem of watermarking of still images using the luminance component, through the use of spread spectrum techniques, both in space (direct sequence spread spectrum or DSSS) and frequency (frequency hopping or FH), following the guidelines of Delaigle et al. (1998). The system described is able to embed watermarks and recover them with zero probability of error. The problem is faced from a statistical detection point of view through the analysis of the density function of the image to be marked. A Cauchy model is found to be very accurate and some tests are performed in order to assess improved detection quality. The resulting system turns out to be easy to encrypt and very robust to filtering and JPEG compression.Peer ReviewedPostprint (published version

    Robust Object-Based Watermarking Using SURF Feature Matching and DFT Domain

    Get PDF
    In this paper we propose a robust object-based watermarking method, in which the watermark is embedded into the middle frequencies band of the Discrete Fourier Transform (DFT) magnitude of the selected object region, altogether with the Speeded Up Robust Feature (SURF) algorithm to allow the correct watermark detection, even if the watermarked image has been distorted. To recognize the selected object region after geometric distortions, during the embedding process the SURF features are estimated and stored in advance to be used during the detection process. In the detection stage, the SURF features of the distorted image are estimated and match them with the stored ones. From the matching result, SURF features are used to compute the Affine-transformation parameters and the object region is recovered. The quality of the watermarked image is measured using the Peak Signal to Noise Ratio (PSNR), Structural Similarity Index (SSIM) and the Visual Information Fidelity (VIF). The experimental results show the proposed method provides robustness against several geometric distortions, signal processing operations and combined distortions. The receiver operating characteristics (ROC) curves also show the desirable detection performance of the proposed method. The comparison with a previously reported methods based on different techniques is also provided

    Fast watermarking of MPEG-1/2 streams using compressed-domain perceptual embedding and a generalized correlator detector

    Get PDF
    A novel technique is proposed for watermarking of MPEG-1 and MPEG-2 compressed video streams. The proposed scheme is applied directly in the domain of MPEG-1 system streams and MPEG-2 program streams (multiplexed streams). Perceptual models are used during the embedding process in order to avoid degradation of the video quality. The watermark is detected without the use of the original video sequence. A modified correlation-based detector is introduced that applies nonlinear preprocessing before correlation. Experimental evaluation demonstrates that the proposed scheme is able to withstand several common attacks. The resulting watermarking system is very fast and therefore suitable for copyright protection of compressed video

    A New Method For Digital Watermarking Based on Combination of DCT and PCA

    Full text link
    In the digital watermarking with DCT method,the watermark is located within a range of DCT coefficients of the cover image. In this paper to use the low-frequency band, a new method is proposed by using a combination of the DCT and PCA transform. The proposed method is compared to other DCT methods, our method is robust and keeps the quality of cover image, also increases capacity of the watermarking.Comment: Telecommunications Forum Telfor (TELFOR), 2014 22n

    A constructive and unifying framework for zero-bit watermarking

    Get PDF
    In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the presence of this particular weak signal in content. The article looks at this problem from a classical detection theory point of view, but with side information enabled at the embedding side. This means that the watermark signal is a function of the host content. Our study is twofold. The first step is to design the best embedding function for a given detection function, and the best detection function for a given embedding function. This yields two conditions, which are mixed into one `fundamental' partial differential equation. It appears that many famous watermarking schemes are indeed solution to this `fundamental' equation. This study thus gives birth to a constructive framework unifying solutions, so far perceived as very different.Comment: submitted to IEEE Trans. on Information Forensics and Securit
    corecore