Watermark embedding in optimal color direction

2013 ◽  
Author(s):  
Robert Lyons ◽  
Alastair Reed ◽  
John Stach
Keyword(s):  
2013 ◽  
Vol 416-417 ◽  
pp. 1210-1213
Author(s):  
Hua Wen Ai ◽  
Ping Feng Liu ◽  
Sheng Cong Dong

In order to resist print and scan attacks, a kind of digital halftone image watermarking algorithm is proposed, which is based on the edge detection and improved error diffusion. The edge of gray image is gotten using canny detection. Calculate the noise visibility function values of the edge points. Then, sort the values in ascending order and select the size that equal to the length of watermark as the location of watermark embedding. While the grayscale image turns to halftone image using the improved error diffusion algorithm, binary watermark is embedded in the edge position. Watermark is pretreated with Arnold before embedding to improve the safety of watermark. Experiment results show that the algorithm is good resistance to print and scan attacks, while resistance to shearing, noise and jpeg compression attacks.


2012 ◽  
Author(s):  
Bijan G. Mobasseri ◽  
Nagarjun Chakilam ◽  
Robert S. Lynch

2020 ◽  
Vol 7 (1) ◽  
pp. 3-13
Author(s):  
Alexander Kozachok ◽  
Sergey Kopylov

 Abstract— This article presents an approach to protection of printed text data by watermark embedding in the printing process. Data protection is based on robust watermark embedding that is invariant to text data format converting into image. The choice of a robust watermark within the confines of the presented classification of digital watermark is justified. The requirements to developed robust watermark have been formed. According to the formed requirements and existing restrictions, an approach to robust watermark embedding into text data based on a steganographic algorithm of line spacing shifting has been developed. The block diagram and the description of the developed algorithm of data embedding into text data are given. An experimental estimation of the embedding capacity and perceptual invisibility of the developed data embedding approach was carried out. An approach to extract embedded information from images containing a robust watermark has been developed. The limits of the retrieval, extraction accuracy and robustness evaluation of embedded data to various transformations have been experimentally established.Tóm tắt— Bài báo trình bày cách tiếp cận để bảo vệ dữ liệu văn bản in bằng cách nhúng vào văn bản một đoạn thủy vân trong quá trình in. Bảo vệ dữ liệu dựa trên việc sử dụng thủy vân bền vững có khả năng chống lại sự chuyển đổi định dạng dữ liệu văn bản sang dữ liệu hình ảnh. Sau quá trình phân tích các hệ thống thủy vân số hiện có, nhận thấy việc lựa chọn một mô hình thủy vân bền vững là hợp lý. Do yêu cầu thực tế và các hạn chế của phương pháp nhúng thủy vân vào dữ liệu văn bản hiện có, bài báo đưa ra phương pháp nhúng mới được phát triển dựa trên một thuật toán ẩn mã sử dụng cách thay đổi khoảng cách giữa các dòng trong văn bản. Bài báo đưa ra một sơ đồ khối và mô tả thuật toán nhúng thông tin vào dữ liệu văn bản. Các thực nghiệm về khả năng nhúng và khả năng che giấu thông tin với tri giác thông thường của dữ liệu nhúng cũng được trình bày. Bài báo cũng nêu cách tiếp cận để trích xuất thông tin được nhúng từ các hình ảnh có chứa thủy vân bền vững. Bên cạnh đó, chúng tôi cũng đưa ra các giới hạn về khả năng ứng dụng của phương pháp dựa trên các thực nghiệm, các đánh giá về độ chính xác của việc trích xuất được dữ liệu và độ mạnh của phương pháp nhúng mới này đối với các phép biến đổi ảnh khác nhau. 


Cryptography ◽  
2020 ◽  
pp. 480-497
Author(s):  
Lin Gao ◽  
Tiegang Gao ◽  
Jie Zhao

This paper proposed a reversible medical image watermarking scheme using Redundant Discrete Wavelet Transform (RDWT) and sub-sample. To meet the highly demand of the perceptional quality, the proposed scheme embedding the watermark by modifying the RDWT coefficients. The sub-sample scheme is introduced to the proposed scheme for the enhancement of the embedding capacity. Moreover, to meet the need of security, a PWLCM based image encryption algorithm is introduced for encrypting the image after the watermark embedding. The experimental results suggests that the proposed scheme not only meet the highly demand of the perceptional quality, but also have better embedding capacity than former DWT based scheme. Also the encryption scheme could protect the image contents efficiently.


2011 ◽  
Vol 145 ◽  
pp. 552-556 ◽  
Author(s):  
Grace C.W. Ting ◽  
Bok Min Goi ◽  
S. W. Lee

H.264/AVC is a widespread standard for high definition video (HD) for example DVD and HD videos on the internet. To prevent unauthorized modifications, video authentication can be used. In this paper, we present a cryptanalysis of a H.264/AVC video authentication scheme proposed by Saadi et al. [1] at EUSIPCO 2009. Our result will prevent situations where newer schemes are developed from the scheme thus amplifying the flaw. The designers claimed that the scheme can detect modifications on watermarked video. However, we show that an attacker can modify the watermarked video and compute a valid watermark such that the recipient will retrieve a watermark from the modified watermarked video that will match what the recipient computes during video authentication check. Thus, the recipient will think the tampered video is authentic. The first main problem of the scheme is its use of hash functions for watermark generation. Since hash functions are public functions not depending on any secret, the attacker can modify the watermarked video and feed this through the hash function to compute a new watermark. The second problem is that it is possible for the attacker to perform watermark embedding thus producing a modified watermarked video. On receiving the modified video, the recipient recomputes the watermark and compares this with the watermark extracted from the video. They will match because the embedded watermark and recomputed watermark use the same hash function based watermark generation and the same input i.e. the modified video. Our cryptanalysis strategy applies to any watermarking based video authentication scheme where the watermark and embedding are not functions of secrets. As countermeasure, the functions should be designed so that only legitimate parties can perform them. We present two improved schemes that solve this problem based on private key signing functions and message authentication functions respectively.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 15816-15822 ◽  
Author(s):  
Yuan-Gen Wang ◽  
Dongqing Xie ◽  
Brij B. Gupta

2021 ◽  
Author(s):  
Praveen Kumar Mannepalli ◽  
Vineet Richhariya ◽  
Susheel Kumar Gupta ◽  
Piyush Kumar Shukla ◽  
Pushan Kumar Dutta

Abstract Image protection is essential part of the scientific community today. The invisible watermark is widely being used in past to secure the medical imaging data from copyright protection. In this paper novel hybrid combination of the invisible image watermarking and the Blockchain based encryption is proposed to design. The watermarking is implemented using edge detection (ED) of discrete wavelet transform (DWT) coefficient. The medical image is decomposed using L level DWT transform to generate multi-resolution coefficients. The edge detection is applied to HH wavelet band to generate the edge coefficients. To improve robustness difference of dilation and edge coefficient are used for watermark embedding. The watermark image is encrypted using Blockchain based hash algorithm for medical images. Then at the decoding end first decryption is achieved and then image is reconstructed. The results are sequentially presented for both stages. The PSNR performance is compared with additional level of security.


Sign in / Sign up

Export Citation Format

Share Document