Wavelet domain invisible watermarking technique for color image copyright protection and user identification

2000 ◽  
Author(s):  
Marcello Caramma ◽  
Rosa C. Lancini ◽  
Francesco Mapelli ◽  
Stefano Tubaro
2018 ◽  
Vol 7 (3.29) ◽  
pp. 65
Author(s):  
P Sivananthamaitrey ◽  
P Rajesh Kumar

Dual digital watermarking has emerged as a successful solution for copyright protection, tamper detection and localization. However, several problems related to the robustness, capacity, tampered area detection still mystifying. This paper presents a high capacity dual watermarking mechanism for digital color image. An invisible robust watermark is embedded in the Green component of the host image by using a hybrid combination of Stationary Wavelet Transform (SWT) and Singular Value Decomposition (SVD) for copyright protection. A fragile invisible watermark based on the Least Significant Bit (LSB) replacement approach is embedded in the Blue component of the image for tamper detection and localization. The proposed technique focuses on robustness and imperceptibility while maximizing embedding capacity that makes this technique a multipurpose watermarking scheme.


Author(s):  
Sajjad Bagheri Baba Ahmadi ◽  
Gongxuan Zhang ◽  
Mahdi Rabbani ◽  
Lynda Boukela ◽  
Hamed Jelodar

2013 ◽  
Vol 278-280 ◽  
pp. 1366-1373 ◽  
Author(s):  
Zi Teng ◽  
Xiu Feng Qiu ◽  
Jian Wei Liu

The copyright protection of multimedia information is more and more important in the digital age, digital watermarking is a solution to address the topic. This paper proposes a new robust image watermarking scheme based on discrete ridgelet transform (DRT) and discrete wavelet transform (DWT). The scheme respectively embeds a copy of color image watermark into DWT domain and DRT domain, and uses a conception of semi-watermark. Experiment results demonstrate that the watermark can resist various attacks such as adding Gaussian or Union Distribution Noise, JPEG compression, brightness adjustment, contrast adjustment, altering color balance, lens blur, zooming in or out, cropping and some combined attacks etc.


Sign in / Sign up

Export Citation Format

Share Document