Digital watermarking techniques for image security: a review

2019 ◽  
Vol 11 (8) ◽  
pp. 3221-3229 ◽  
Author(s):  
A. Mohanarathinam ◽  
S. Kamalraj ◽  
G. K. D. Prasanna Venkatesan ◽  
Renjith V. Ravi ◽  
C. S. Manikandababu
2021 ◽  
Vol 320 ◽  
pp. 110691
Author(s):  
Narima Zermi ◽  
Amine Khaldi ◽  
Redouane Kafi ◽  
Fares Kahlessenane ◽  
Salah Euschi

2010 ◽  
Vol 174 ◽  
pp. 144-147
Author(s):  
Xin Ying Hu ◽  
Xiu Ping Zhao

Digital watermarking has been proposed as a way to claim the ownership of the source and owner of the digital image data. In this paper, A robust algorithm based on DCT region is proposed to improve the image security. The main transforming is based on DCT (Discrete Cosine Transform). The algorithm was processed in the MATLAB software. In this paper, images of gray scale and RGB color scale were researched respectively. For color images, in order to get the best image quality, the RGB scale was transformed to YcbCr scale. Then, the Y channel (brightness channel) was separated, in which the watermark was embedded and extracted. The results show that the algorithm embedded a certain size of black and white Bitmap image into gray and color images. The watermark can’t be seen by the naked eye. The robustness detection experiment was also carried out. The watermark can still be extracted after certain amount of tailoring, defacing, Gaussian noise, and format changes. The similarity is more than 0.7. It confirmed that the algorithm is highly robust.


2013 ◽  
Vol 5 (1) ◽  
pp. 18-23
Author(s):  
L. Venkateswarlu ◽  
◽  
Dr. N V Rao ◽  

2016 ◽  
Vol 2016 (1) ◽  
pp. 213-218
Author(s):  
Kazushige Banzawa ◽  
Kazuma Shinoda ◽  
Madoka Hasegawa

Author(s):  
S. Thabasu Kannan ◽  
S. Azhagu Senthil

Now-a-days watermarking plays a pivotal role in most of the industries for providing security to their own as well as hired or leased data. This paper its main aim is to study the multiresolution watermarking algorithms and also choosing the effective and efficient one for improving the resistance in data compression. Computational savings from such a multiresolution watermarking framework is obvious. The multiresolutional property makes our watermarking scheme robust to image/video down sampling operation by a power of two in either space or time. There is no common framework for multiresolutional digital watermarking of both images and video. A multiresolution watermarking based on the wavelet transformation is selected in each frequency band of the Discrete Wavelet Transform (DWT) domain and therefore it can resist the destruction of image processing.   The rapid development of Internet introduces a new set of challenging problems regarding security. One of the most significant problems is to prevent unauthorized copying of digital production from distribution. Digital watermarking has provided a powerful way to claim intellectual protection. We proposed an idea for enhancing the robustness of extracted watermarks. Watermark can be treated as a transmitted signal, while the destruction from attackers is regarded as a noisy distortion in channel.  For the implementation, we have used minimum nine coordinate positions. The watermarking algorithms to be taken for this study are Corvi algorithm and Wang algorithm. In all graph, we have plotted X axis as peak signal to noise ratio (PSNR) and y axis as Correlation with original watermark. The threshold value ά is set to 5. The result is smaller than the threshold value then it is feasible, otherwise it is not.


Author(s):  
Matthew N.O. Sadiku ◽  
◽  
Adebowale E. Shadare ◽  
Sarhan M. Musa ◽  
◽  
...  
Keyword(s):  

Author(s):  
Ali Saleh Al Najjar

Absolute protection is a difficult issue to maintain the confidentiality of images through their transmission over open channels such as internet or networks and is a major concern in the media, so image Cryptography becomes an area of attraction and interest of research in the field of information security. The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text. This approach provides high security and it will be suitable for secured transmission of images over the networks or Internet.


Sign in / Sign up

Export Citation Format

Share Document