DT CWT and Schur decomposition based robust watermarking algorithm to geometric attacks

Author(s):  
Pei Liu ◽  
Hao Wu ◽  
Lan Luo ◽  
Dao-Shun Wang
Author(s):  
Chauhan Usha ◽  
Singh Rajeev Kumar

Digital Watermarking is a technology, to facilitate the authentication, copyright protection and Security of digital media. The objective of developing a robust watermarking technique is to incorporate the maximum possible robustness without compromising with the transparency. Singular Value Decomposition (SVD) using Firefly Algorithm provides this objective of an optimal robust watermarking technique. Multiple scaling factors are used to embed the watermark image into the host by multiplying these scaling factors with the Singular Values (SV) of the host image. Firefly Algorithm is used to optimize the modified host image to achieve the highest possible robustness and transparency. This approach can significantly increase the quality of watermarked image and provide more robustness to the embedded watermark against various attacks such as noise, geometric attacks, filtering attacks etc.


Author(s):  
Muhammad Tahir Naseem ◽  
Ijaz Mansoor Qureshi ◽  
Atta-ur-Rahman ◽  
Muhammad Zeeshan Muzaffar

2018 ◽  
Vol 8 (12) ◽  
pp. 2617 ◽  
Author(s):  
Zhen Yue ◽  
Zichen Li ◽  
Hua Ren ◽  
Yixian Yang

The histogram watermark, which performs watermark embedding by slightly modifying the histogram of the original image, has been a hot research topic in information hiding technology due to the superiority of its pixel modification during the watermark embedding process, which is independent of the pixel position. This property makes the histogram-based watermark strong resistant to geometric attacks, such as cropping attack, crossed attack, rotation attack, etc. In this paper, we propose a large capacity histogram-based robust watermarking algorithm based on three consecutive bins for the first time. In our scheme, we divide the shape of three consecutive bins into eight cases. According to these cases, we embed Information Number 0, 1, 2, 3, 4, 5, 6, or 7, respectively. The embedded information capacity reaches one bit per bin (bpb), and the amount of embedded information is equal to 200% of the previous existing algorithms. Experimental results show that the new algorithm not only has a large capacity of embedding information, but also has strong robustness to geometric attacks, as well as common image processing operations.


2014 ◽  
Vol 269 ◽  
pp. 94-105 ◽  
Author(s):  
Sasan Golabi ◽  
Mohammad Sadegh Helfroush ◽  
Habibollah Danyali ◽  
Mehri Owjimehr

2015 ◽  
Vol 10 (11) ◽  
pp. 1127
Author(s):  
Nidaa Hasan Abbas ◽  
Sharifah Mumtazah Syed Ahmad ◽  
Wan Azizun Wan Adnan ◽  
Abed Rahman Bin Ramli ◽  
Sajida Parveen

Sign in / Sign up

Export Citation Format

Share Document