Secure, robust and imperceptible image watermarking scheme based on sharp frequency localized contourlet transform

Author(s):  
Esmaeil Najafi
Entropy ◽  
2019 ◽  
Vol 21 (5) ◽  
pp. 460 ◽  
Author(s):  
Chuying Yu ◽  
Xiaowei Li ◽  
Xinan Chen ◽  
Jianzhong Li

A novel adaptive secure holographic image watermarking method in the sharp frequency localized contourlet transform (SFLCT) domain is presented. Based upon the sine logistic modulation map and the logistic map, we develop an encrypted binary computer-generated hologram technique to fabricate a hologram of a watermark first. Owing to the enormous key space of the encrypted hologram, the security of the image watermarking system is increased. Then the hologram watermark is embedded into the SFLCT coefficients with Schur decomposition. To obtain better imperceptibility and robustness, the entropy and the edge entropy are utilized to select the suitable watermark embedding positions adaptively. Compared with other watermarking schemes, the suggested method provides a better performance with respect to both imperceptibility and robustness. Experiments show that our watermarking scheme for images is not only is secure and invisible, but also has a stronger robustness against different kinds of attack.


Author(s):  
Jinan N. Shehab ◽  
Hussein A. Abdulkadhim ◽  
Yousif Allbadi

<span>The widespread of global internet has led to the need for developing new methods of protecting multimedia information from exploitation, alteration or forgery, illegal distribution, and manipulation. An attacker is quickly and illegally distributing or changing multimedia information by using various means of computer technology. For detecting this manipulation, this paper suggests blind watermark image inside a host image for observing in the receiver. If the watermark image was retrieved, then the host image was not attacked or manipulated. While if not retrieved, in this case, the image was attacked. The proposed method is depending on a decomposition of the host image using lowest energy sub-bands of Contourlet transform (4-levels), with scrambling by Ikeda map of the watermark image, and selecting new positions by modified Arnold Cat map. This will produce more security and safety, as well as provide more difficulty or prevent hacking. The obtained results confirm the robustness against attacks and more effectiveness of the presented scheme compared with the other similar works. Also, using lowest energy sub-bands will expand area of embedding and this part will be considered in the future works with the color images.</span>


Entropy ◽  
2021 ◽  
Vol 23 (2) ◽  
pp. 255
Author(s):  
Mario Gonzalez-Lee ◽  
Hector Vazquez-Leal ◽  
Luis J. Morales-Mendoza ◽  
Mariko Nakano-Miyatake ◽  
Hector Perez-Meana ◽  
...  

In this paper, we explore the advantages of a fractional calculus based watermarking system for detecting Gaussian watermarks. To reach this goal, we selected a typical watermarking scheme and replaced the detection equation set by another set of equations derived from fractional calculus principles; then, we carried out a statistical assessment of the performance of both schemes by analyzing the Receiver Operating Characteristic (ROC) curve and the False Positive Percentage (FPP) when they are used to detect Gaussian watermarks. The results show that the ROC of a fractional equation based scheme has 48.3% more Area Under the Curve (AUC) and a False Positives Percentage median of 0.2% whilst the selected typical watermarking scheme has 3%. In addition, the experimental results suggest that the target applications of fractional schemes for detecting Gaussian watermarks are as a semi-fragile image watermarking systems robust to Gaussian noise.


Sign in / Sign up

Export Citation Format

Share Document