scholarly journals A Robust Watermarking Scheme in YCbCr Color Space Based on Channel Coding

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 25026-25036 ◽  
Author(s):  
Yun Tan ◽  
Jiaohua Qin ◽  
Xuyu Xiang ◽  
Wentao Ma ◽  
Wenyan Pan ◽  
...  

Digital image watermarking is a significant one for copyright protection. In this work, a robust watermarking method that can be utilized to ensure copyright is proposed. The proposed technique improves the power of the watermark with the end goal that it very well may be utilized to secure the intellectual property considerably after genuine assaults on the watermark picture. A YCbCr model can be utilized as the ideal color model, the Y part being the ideal color channel here. Frequency domain methods give more robustness. Changes like DCT, Wavelet changes and Singular Values Decomposition (SVD) are some all around investigated transform domain procedures in watermarking. DKT-DCT hybrid wavelet transform is investigated by applying on have and utilized for embedding singular values of watermark. The proposed plan perceptually enhanced one and more strong in opposition to attacks and rotation invariant. The test outcomes show the perceptually enhanced condition as well as the efficiency of the proposed method when compared with traditional methodologies.


2018 ◽  
Vol 18 (03) ◽  
pp. 1850015 ◽  
Author(s):  
Aniket Roy ◽  
Arpan Kumar Maiti ◽  
Kuntal Ghosh

Digital Watermarking is an important tool for copyright protection. A good quality watermarking scheme should provide both perceptual transparency as well as robustness against attacks. Many efficient schemes exist for grayscale image watermarking, but relatively less attention has been paid to watermarking for color images. Moreover, the existing works do not provide adequate justification for the possible choice of color space. In this paper, justification is provided for the choice of YCbCr color space for watermark embedding. A human visual system (HVS)-inspired image-adaptive non-blind watermarking scheme in the YCbCr space has subsequently been proposed. This new algorithm has been referred to as the Additive Embedding Scheme (AES). It comprises of a modified watermarking strength parameter ([Formula: see text]), in combination with the discrete wavelet transform and singular value decomposition (DWT-SVD). Experimental results demonstrate that the proposed watermarking scheme in YCbCr color space provides better perceptual quality as well as robustness against attacks as compared to existing schemes. We have further improvised the aforementioned scheme to come up with a Multiplicative Embedding Scheme (MES) for additional robustness against a special type of attack, viz. the Singular Value Exchange Attack.


2018 ◽  
Vol 31 (1) ◽  
pp. 277 ◽  
Author(s):  
Methaq Talib Gaata

  With the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming  the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data. The digital map is separated into the isolated parts.Watermark data are embedded within the nominated magnitudes in each part when satisfied the definite criteria. The efficiency of proposed watermarking scheme is assessed within statistical measures based on two factors which are fidelity and robustness. Experimental results demonstrate the proposed watermarking scheme representing ideal trade off for disagreement issue between distortion amount and robustness. Also, the proposed scheme shows  robust resistance for many kinds of attacks.


2014 ◽  
Vol 543-547 ◽  
pp. 2873-2878
Author(s):  
Hui Yong Li ◽  
Hong Xu Jiang ◽  
Ping Zhang ◽  
Han Qing Li ◽  
Qian Cao

Modern embedded portable devices usually have to deal with large amounts of video data. Due to massive floating-point multiplications, the color space conversion is inefficient on the embedded processor. Considering the characteristics of RGB to YCbCr color space conversion, this paper proposed a strategy for truncated-based LUT Multiplier (T-LUT Multiplier). On this base, an original approach converting RGB to YCbCr is presented which employs the T-LUT Multiplier and the pipeline-based adder. Experimental results demonstrate that the proposed method can obtain maximum operating frequency of 358MHz, 3.5 times faster than the direct method. Furthermore, the power consumption is less than that of the general method approximately by 15%~27%.


Author(s):  
Wenbing Wang ◽  
Shengli Liu ◽  
Liu Feng

Generic polar complex exponential transform (GPCET), as continuous orthogonal moment, has the advantages of computational simplicity, numerical stability, and resistance to geometric transforms, which make it suitable for watermarking. However, errors in kernel function discretization can degrade these advantages. To maximize the GPCET utilization in robust watermarking, this paper proposes a secondary grid-division (SGD)-based moment calculation method that divides each grid corresponding to one pixel into nonoverlapping subgrids and increases the number of sampling points. Using the accurate moment calculation method, a nonsubsampled contourlet transform (NSCT)–GPCET-based watermarking scheme with resistance to image processing and geometrical attacks is proposed. In this scheme, the accurate moment calculation can reduce the numerical error and geometrical error of the traditional methods, which is verified by an image reconstruction comparison. Additionally, NSCT and accurate GPCET are utilized to achieve watermark stability. Subsequent experiments test the proposed watermarking scheme for its invisibility and robustness, and verify that the robustness of the proposed scheme outperforms that of other schemes when its level of invisibility is significantly higher.


Sign in / Sign up

Export Citation Format

Share Document