Protect digital images based on matrix norm quantization of digital, watermarking algorithm

Author(s):  
Liu Xin ◽  
Lv Xiaoqi ◽  
Luo Qiang
2013 ◽  
pp. 691-712
Author(s):  
Dumitru Dan Burdescu ◽  
Liana Stanescu ◽  
Marian Cristian Mihaescu

The rapid growth of digital multimedia technologies brings tremendous attention to the field of digital authentication. Digital watermarking has become widely recognized as an effective measure for copyright protection of multimedia data. The owner or the distributor of the digital images can insert a unique watermark into copies for different customers or receivers, which will be helpful to identify the source of illegal copies. In this chapter the authors present two original spatial authentication techniques for digital images. These new algorithms yield an invisible watermark that is robust to various kinds of attacks. The main principle is the utilization of a virtual (2D or 3D) graph embedded into the digital images. Then, the colors of some vertices of the virtual graph are slightly modified for obtaining the watermark. The proposed techniques modify pixels or voxels of the object by a spatial watermark insertion scheme. These techniques can be used for all kinds of digital images, color or black and white, and the new algorithms produce an invisible robust watermark. The techniques lower the computational complexity that normally rises with the traditional watermarking algorithms. This approach reduces computation and implementation complexity of the algorithms. These techniques seem to replace advantages of the transform domain techniques with those of the spatial domain techniques.


Author(s):  
Manmit Kaur ◽  
H. P. Sinha

The multi-resolution watermarking method for digital images proposed in this work. The multiscale ridgelet coefficients of low and high frequency bands of the watermark is embedded to the most significant coefficients at low and high frequency bands of the multiscale ridgelet of an host image, respectively. A multi-resolution nature of multiscale ridgelet transform is exploiting in the process of edge detection. Experimental results of the proposed watermarking method are compared with the previously available watermarking algorithm wavelet transform. Moreover, the proposed watermarking method also tested on images attached by Discrete Cosine Transform (DCT) and wavelet based lossy image compression techniques.


2017 ◽  
Vol 3 (2) ◽  
Author(s):  
Adi Suheryadi

Digital watermarking is an important field of technological development that has now grown in the digital era. Digital era encourage the spread digital images on internet by the websites with a large scale. On the other hand, digital images are objects that are very easy to change or manipulate, and even copied irresponsibly. Meanwhile it is very difficult to prove the image has been changed by existing equipment at this time, and it is difficult to prove its ownership. This is an important issue, when the image is one of the evidences for legal cases, news reporting and medical filing, where the image must be ensured that the digital image is not subject to change or manipulation. In this paper, we present the application of digital watermarking to authentication and ownership validation of digital image so the image can be ascertained its validity. This research applies blind watermark scheme by using secret key that inserted at least-significant bits (LSB) of host image therefore the watermark is invisible watermark. The result of watermarked image has a small decrease in quality with the mean value of PSNR and MSE about 34.08 and 14.62.


Author(s):  
Eberhard Stickel

Conventional photographs may easily be used in court as evidence. The complete negative may be inspected. Subsequent numbers are a reliable proof that sequences of pictures have been generated. Modifications are usually quickly detected without major technical efforts. This is not true anymore for digital images, since they may easily be manipulated. This poses a problem, for example, for surveillance cameras of automatic teller machines in financial institutions. Digital watermarking techniques have been proposed to address this problem. In this chapter, a new public-key watermarking system will be presented. In contrast to digital signatures and other public-key watermarking techniques, it is two-dimensional and, hence, especially well-suited for applications involving digital images.


Author(s):  
Mohammed A. Otair

Due to the swift growth of the using of the digital multimedia in the internet these days, the security in digital images has become a very important issue. Lately, significant attentions are given by many researchers in the field of the security for digital images, and several image encryption techniques have been developed to improve the security levels of these images. Different techniques can be applied to protect intellectual property rights for digital images and prohibit illegal copying. The aim of this chapter is to introduce the most important techniques that have been developed to implement the security in digital images such as digital watermarking and image steganography.


2018 ◽  
Vol 132 ◽  
pp. 1441-1448 ◽  
Author(s):  
Poonam ◽  
Shaifali M. Arora

2015 ◽  
Vol 738-739 ◽  
pp. 674-677
Author(s):  
Li Jun Fan

Due to the problem that the many digital images can be modified more and more easily, watermarking algorithms are proposed. There are many types of digital watermarking algorithms, such as robust digital watermarking algorithms, watermarking schemes for authentication, and reversible digital watermarking algorithms. However, there are some special images, such as the digital medical images for remote treatment, the military images for tracking object, and the remote sensing images, and they are so sensitive to any modification that we should authenticate the copyright by special technique. And this technique is zero-bit watermarking algorithms. In this paper, about zero-bit watermarking algorithms are surveyed. The basic procedures of these classical algorithms are analyzed, and some suggestion about the zero-bit algorithms is given.


Sign in / Sign up

Export Citation Format

Share Document