A new watermarking scheme against inserter-based attacks suitable for digital media with moderate size

Author(s):  
Xinpeng Zhang ◽  
Shuozhong Wang
2017 ◽  
Vol 10 (1) ◽  
pp. 160-167
Author(s):  
Neelam Dabas ◽  
Rampal Singh ◽  
Vikash Chaudhary

Modification of media and illegal production is a big problem now a days because of free availability of digital media. Protection and securing the digital data is a challenge. An Integer Wavelet Transformation (IWT) domain based robust watermarking scheme with Singular Value Decomposition (SVD) and Extreme Learning Machine (ELM) have been proposed and tested on different images. In this proposed scheme, a watermark or logo is embedded in the IWT domain as ownership information with SVD and ELM is trained to learn the relationship between the original coefficient and the watermarked one. This trained ELM is used in the extraction process to extract the embedded logo from the image. Experimental results show that the proposed watermarking scheme is robust against various image attacks like Blurring, Noise, Cropping, Rotation, Sharpening etc. Performance analysis of proposed watermarking scheme is measured with Peak Signal to Noise Ratio (PSNR) and Bit Error Rate (BER)


The watermarking scheme in digital media communication has become an essential tool in helping content creators prove ownership if any dispute arises in copyright infringement. In this paper, Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) is performed in the watermarking process which improves the authentication of the image and the detection of the tampered region. The semi-fragile watermarking scheme provides robustness to the watermark during extraction process even after the unintentional compression attacks like JPEG compression. The watermark payload is significantly lowered in order to increase the quality of the image. The recovery is done using the absolute moment block truncation coding (AMBTC) of the image in the untampered region. Thus, both the mean and first absolute moment are used in recovering the tampered regions in the watermarked image.


2018 ◽  
Vol 2018 ◽  
pp. 1-20 ◽  
Author(s):  
Amir Anees ◽  
Iqtadar Hussain ◽  
Abdulmohsen Algarni ◽  
Muhammad Aslam

The protection of copyrights of digital media uploaded to the Internet is a growing problem. In this paper, first, we present a unified framework for embedding and detecting watermark in digital data. Second, a new robust watermarking scheme is proposed considering this concern. The proposed work incorporates three chaotic maps which specify the location for embedding the watermark. Third, a new chaotic map, the Extended Logistic map, is proposed in this work. The proposed map has a bigger range than logistic and cubic maps. It has shown good results in a bifurcation, sensitivity to initial conditions, and randomness tests. Furthermore, with the detailed analysis of initial parameters, it is justified that Extended Logistic map can be used in secure communication, particularly watermarking. Fourth, to check the robustness of proposed watermarking scheme, we have done a series of analyses and standard attacks. The results confirm that the proposed watermarking scheme is robust against visual and statistical analysis and can resist the standard attacks.


2013 ◽  
Vol 5 (1) ◽  
pp. 1-6 ◽  
Author(s):  
Osama Hosam

Digital communication and media sharing have extensively increased in the last couple of years. Research is focused on protecting digital media through copyright protection. The digital media is secured by watermarking. We have developed an image watermarking technique in the frequency domain to hide secure information in the Discrete Cosine Transform (DCT) coefficients of the carrier image. DCT coefficients are modulated by Dither Modulation (DM). We have increased the modulation step to be able to entirely recover the embedded data (watermark) and increase the robustness of our proposed algorithm to affine transforms and geometrical attacks. Our algorithm showed lower complexity and robustness against different attacks.


10.14311/864 ◽  
2006 ◽  
Vol 46 (4) ◽  
Author(s):  
T. Polyák

In the past few years there has been an explosion in the use of digital video data. Many people have personal computers at home, and with the help of the Internet users can easily share video files on their computer. This makes possible the unauthorized use of digital media, and without adequate protection systems the authors and distributors have no means to prevent it.Digital watermarking techniques can help these systems to be more effective by embedding secret data right into the video stream. This makes minor changes in the frames of the video, but these changes are almost imperceptible to the human visual system. The embedded information can involve copyright data, access control etc. A robust watermark is resistant to various distortions of the video, so it cannot be removed without affecting the quality of the host medium. In this paper I propose a video watermarking scheme that fulfills the requirements of a robust watermark. 


2013 ◽  
Author(s):  
Christo Sims ◽  
Rachel Cody Pfister ◽  
Michael Cole ◽  
Robert Lecusay ◽  
Ivan Rosero ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document