Adaptive Image Watermarking Scheme Using Fuzzy Entropy and GA-ELM Hybridization in DCT Domain for Copyright Protection

2015 ◽  
Vol 84 (2) ◽  
pp. 265-281 ◽  
Author(s):  
Rajesh Mehta ◽  
Navin Rajpal ◽  
Virendra P. Vishwakarma
2018 ◽  
Vol 78 (7) ◽  
pp. 8075-8089 ◽  
Author(s):  
Han Fang ◽  
Hang Zhou ◽  
Zehua Ma ◽  
Weiming Zhang ◽  
Nenghai Yu

2013 ◽  
Vol 278-280 ◽  
pp. 1366-1373 ◽  
Author(s):  
Zi Teng ◽  
Xiu Feng Qiu ◽  
Jian Wei Liu

The copyright protection of multimedia information is more and more important in the digital age, digital watermarking is a solution to address the topic. This paper proposes a new robust image watermarking scheme based on discrete ridgelet transform (DRT) and discrete wavelet transform (DWT). The scheme respectively embeds a copy of color image watermark into DWT domain and DRT domain, and uses a conception of semi-watermark. Experiment results demonstrate that the watermark can resist various attacks such as adding Gaussian or Union Distribution Noise, JPEG compression, brightness adjustment, contrast adjustment, altering color balance, lens blur, zooming in or out, cropping and some combined attacks etc.


2011 ◽  
Vol 20 (05) ◽  
pp. 801-819
Author(s):  
ALIMOHAMMAD LATIF ◽  
AHMAD REZA NAGHSH-NILCHI

In this paper, an adaptive digital image watermarking technique using fuzzy gradient on DCT domain is presented. In our approach, the image is divided into separate blocks and the DCT is applied on each block individually. Then, the watermark is inserted in the transform domain and the inverse transform is carried out. We increase the robustness of the watermark by increasing the watermark strength. However, this reduces the fidelity of the watermarking scheme. This is because the fidelity and robustness of watermarking are generally in conflict with each other. To improve the fidelity, a new fuzzy-based method is introduced. In this method, a fuzzy gradient-based mask is generated from the host image. Then, as a post-processing stage, the generated mask is combined with the watermarked image. Experimental results show that the proposed technique has high fidelity as well as high robustness against a variety of attacks.


Sign in / Sign up

Export Citation Format

Share Document