REVERSIBLE WATERMARKING ALGORITHM BASED ON WAVELET LIFTING SCHEME

Author(s):  
TIEGANG GAO ◽  
QIAOLUN GU

Nowadays, digital watermarking algorithms are widely applied to ownership protection and tampering detection of digital images. In this paper, a new reversible watermarking algorithm based on wavelet lifting scheme is proposed. In the algorithm, the image is firstly divided into some no-overlapping blocks, and then the wavelet lifting scheme where on every block, is performed watermarking data is embedded into the image according to the attribute of the subband of every block. In order to guarantee the security of algorithm, chaotic system is used to shuffle the position of blocks. The interesting point and usefulness of the algorithm lies in the fact that the watermarked image can be exactly restored into the original image, and the watermarking is robust to cropping. The experimental results show the effectiveness of this scheme.

2005 ◽  
Vol 05 (01) ◽  
pp. 135-148 ◽  
Author(s):  
QIBIN SUN ◽  
SHUIMING YE ◽  
CHING-YUNG LIN ◽  
SHIH-FU CHANG

With the ambient use of digital images and the increasing concern on their integrity and originality, consumers are facing an emergent need of authenticating degraded images despite lossy compression and packet loss. In this paper, we propose a scheme to meet this need by incorporating watermarking solution into traditional cryptographic signature scheme to make the digital signatures robust to these image degradations. Due to the unpredictable degradations, the pre-processing and block shuffling techniques are applied onto the image at the signing end to stabilize the feature extracted at the verification end. The proposed approach is compatible with traditional cryptographic signature scheme except that the original image needs to be watermarked in order to guarantee the robustness of its derived digital signature. We demonstrate the effectiveness of this proposed scheme through practical experimental results.


2012 ◽  
Vol 546-547 ◽  
pp. 410-415
Author(s):  
Chun Ge Tang ◽  
Tie Sheng Fan ◽  
Lei Liu ◽  
Zhi Hui Li

A new blind digital watermarking algorithm based on the chain code is proposed. The chain code is obtained by the characteristics of the original image -the edge contour. The feather can reflect the overall correlation of the vector image, and chain code expression can significantly reduce the boundary representation of the amount of data required. For the watermarking embedding, the original vector image is divided into sub-block images, and two bits of the watermarking information are embedded into sub-block images repeatedly by quantization. For watermarking extracting, the majority decision method is employed to determine the size of the extracted watermark. Experimental results show that the image quality is not significantly lowered after watermarking. The algorithm can resist the basic conventional attacks and has good robustness on the shear attacks.


2019 ◽  
Vol 11 (1) ◽  
pp. 100-113
Author(s):  
Jian Li ◽  
Jinwei Wang ◽  
Shuang Yu ◽  
Xiangyang Luo

This article proposes a novel robust reversible watermarking algorithm. The proposed watermarking scheme is reversible because the original image can be recovered after extracting watermarks from the watermarked image, as long as it is not processed by an attacker. The scheme is robust because watermarks can still be extracted from watermarked images, even if it is undergone some malicious or normal operations like rotation and JPEG compression. It first selects two circles, which are centred at the centroid and the centre of image. Then, statistic quantities of these two circles are employed for robust watermark embedding by altering the pixels' value. The side information generated by above embedding process will be embedded as fragile watermarks at another stage to ensure the recovery of original image. Experimental results verify the high performance of the proposed algorithm in resisting various attacks, including JPEG compression and geometric transformation.


Author(s):  
Manmit Kaur ◽  
H. P. Sinha

The multi-resolution watermarking method for digital images proposed in this work. The multiscale ridgelet coefficients of low and high frequency bands of the watermark is embedded to the most significant coefficients at low and high frequency bands of the multiscale ridgelet of an host image, respectively. A multi-resolution nature of multiscale ridgelet transform is exploiting in the process of edge detection. Experimental results of the proposed watermarking method are compared with the previously available watermarking algorithm wavelet transform. Moreover, the proposed watermarking method also tested on images attached by Discrete Cosine Transform (DCT) and wavelet based lossy image compression techniques.


2013 ◽  
Vol 443 ◽  
pp. 566-570 ◽  
Author(s):  
Xin Wang ◽  
Chao Liang ◽  
Zhi Gang Liu

Informed coding and informed embedding have received considerable attention as a method of digital watermarking with side information in resent years. We designed a new type of codes called structured dirty-paper trellis in which each message is replaced by amount of alternative vectors. This method is very efficient to prevent brightness scaling. A Viterbi decoder is used in the detecting part to find out the highest correlation path. The correct message will be detected no mater how the brightness has been changed for it has no relativity with brightness. In embedding part, watermarking message is adapted by SNR. The original image is divided into several blocks which are transformed by DCT and the adaptive parameter is calculated based on SNR for each block, then watermarking components with different strength are inserted into some middle-frequency coefficients. The experimental results demonstrate that the watermarks generated with the proposed algorithm in this paper have good imperceptibility and robustness.


Author(s):  
N.R. BRINTA ◽  
P.R. BIPIN

This paper presents a blind watermarking algorithm for digital images based on contourlet transform. After Contourlet transform, original image is decomposed into a series of multiscale, local and directional sub images. Each blocks of Arnold transformed watermark image, is embedded into suitable blocks of low pass coefficients of the contourlet transformed original image. Watermark is embedded using module arithmetic and odd-even quantization. The retrieving watermark algorithm is a blind detecting process, and it does not need original image. The experimental results show that the proposed watermarking algorithm is able to resist attacks, such as JPEG compression, noising, cropping and other attacks, and the watermarking is invisible and robust.


Author(s):  
Minh Thanh Tạ

This paper proposes a new watermarking method for digital image by composing the DWT-QIM based embedding with visual secret sharing (VSS) method. Firstly, the watermark image is separated into $n$ shares by using the $k-out-of-n$ method, called $(k,n)$ visual secret sharing. One of share is employed in order to embed into the original image for copyright protection. Another $(n-1)$ of shares are registered with Vietnam Copyright Department. When the dispute happens, the verifier can extract the watermark information from the watermarked image, then, decode it with $(k-1)$ shares chosen from $(n-1)$ shares to achieve the copyright information. Our experimental results show that our proposed method works efficiently on the digital images.


2014 ◽  
Vol 484-485 ◽  
pp. 418-422
Author(s):  
Lu Qiong ◽  
Chong Ying Wang

In recent years, the digital watermarking technology has been widely used for the copyright protection of the digital images, and a lot of the digital watermarking schemes are proposed. This paper studies the application of shuffling techniques in the digital watermarking and proposes a standard measure of the scrambling degree. The criterion measure can help us judge to what extent an image should be scrambled in order to obtain the best robustness. Finally, this paper puts forward two kinds of scrambling technologies applied in the watermarking system, and the experimental results show that the scrambling technology is very effective in keeping resilience to cropping attack.


Sign in / Sign up

Export Citation Format

Share Document