scholarly journals An Improvement Technique Based on Structural Similarity Thresholding for Digital Watermarking

2014 ◽  
Vol 2014 ◽  
pp. 1-8 ◽  
Author(s):  
Amin Banitalebi-Dehkordi ◽  
Mehdi Banitalebi-Dehkordi ◽  
Jamshid Abouei ◽  
Said Nader-Esfahani

Digital watermarking is extensively used in ownership authentication and copyright protection. In this paper, we propose an efficient thresholding scheme to improve the watermark embedding procedure in an image. For the proposed algorithm, watermark casting is performed separately in each block of an image, and embedding in each block continues until a certain structural similarity threshold is reached. Numerical evaluations demonstrate that our scheme improves the imperceptibility of the watermark when the capacity remains fixed, and at the same time, robustness against attacks is assured. The proposed method is applicable to most image watermarking algorithms. We verify this issue on watermarking schemes in discrete cosine transform (DCT), wavelet, and spatial domain.


2020 ◽  
Vol 10 (11) ◽  
pp. 2588-2599
Author(s):  
Saqib Ali Nawaz ◽  
Jingbing Li ◽  
Uzair Aslam Bhatti ◽  
Anum Mehmood ◽  
Raza Ahmed ◽  
...  

With the advancement of networks and multimedia, digital watermarking technology has received worldwide attention as an effective method of copyright protection. Improving the anti-geometric attack ability of digital watermarking algorithms using image feature-based algorithms have received extensive attention. This paper proposes a novel robust watermarking algorithm based on SURF-DCT perceptual hashing (Speeded Up Robust Features and Discrete Cosine Transform), namely blind watermarking. We design and implement a meaningful binary watermark embedding and extraction algorithm based on the SURF feature descriptor and discrete-cosine transform domain digital image watermarking algorithm. The algorithm firstly uses the affine transformation with a feature matrix and chaotic encryption technology to preprocess the watermark image, enhance the confidentiality of the watermark, and perform block and DCT coefficients extraction on the carrier image, and then uses the positive and negative quantization rules to modify the DCT coefficients. The embedding of the watermark is completed, and the blind extraction of the watermark realized. Correlation values are more than 90% in most of the attacks. It provides better results against different noise attacks and also better performance against rotation. Transparency and high computational efficiency, coupled with dual functions of copyright protection and content authentication, is the advantage of the proposed algorithm.



2005 ◽  
Vol 05 (01) ◽  
pp. 67-87 ◽  
Author(s):  
HAIPING LU ◽  
YUN Q. SHI ◽  
ALEX C. KOT ◽  
LIHUI CHEN

Digital watermarking has been proposed for the protection of digital medias. This paper presents two watermarking algorithms for binary images. Both algorithms involve a blurring preprocessing and a biased binarization. After the blurring, the first algorithm embeds a watermark by modifying the DC components of the Discrete Cosine Transform (DCT), followed by a biased binarization, and the second one embeds a watermark by directly biasing the binarization threshold of the blurred image, controlled by a loop. Experimental results show the imperceptibility and robustness aspects of both algorithms.



2011 ◽  
Vol 2 (2) ◽  
Author(s):  
B. Yudi Dwiandiyanta

Abstract. Comparison of Image Watermarking with the Wavelet Variety Packs and Discrete Cosine Transform. Watermarking is one method of copyright protection to combat the spread of the work of someone illegally. In this study, we compare watermarking algorithm in wavelet region and Discrete Cosine Transform (DCT). Color image is used as the host image, while the watermark image is used as a binary image of size 1 / 16 image of the host. Embedding process is based on Human Visual System (HVS), so hopefully gained an invisible watermark (invisible watermark). Embedding process performed by the additive algorithm. In both variety packs developed, the watermark is inserted in the high frequency components of the image. Wavelet used is the wavelet db4. DCT 4x4 blocks are used, which is expected to reduce the computational load. Tests showed that the two watermarking algorithms are generally resistant to granting noise, geometric image operations and image processing operations. Watermarking algorithm that was developed less defend against attacks-down pass filter and median filter, but has a very good performance against an attack-pass filter above. Keywords: image watermarking, wavelet, Discrete Cosine Transform (DCT), Human Visual System (HVS) Abstrak. Watermarking merupakan salah satu metode proteksi hak cipta untuk menanggulangi penyebaran karya seseorang secara ilegal. Pada penelitian ini dilakukan perbandingan algoritma watermarking pada kawasan wavelet dan Discrete Cosine Transform (DCT). Citra warna digunakan sebagai citra host, sedangkan sebagai citra watermark digunakan citra biner berukuran 1/16 citra host. Proses embedding dilakukan berdasarkan Human Visual System (HVS), sehingga diharapkan diperoleh watermark yang tidak kelihatan (invisible watermark). Proses embedding dilakukan dengan algoritma aditif. Pada kedua alihragam yang dikembangkan, watermark disisipkan pada komponen frekuensi tinggi citra. Wavelet yang digunakan adalah wavelet db4. Sedangkan alihragam DCT yang digunakan adalah operasi blok 4x4, yang diharapkan dapat mengurangi beban komputasi. Pengujian menunjukkan bahwa kedua algoritma watermarking secara umum tahan terhadap pemberian derau, operasi geometris citra dan operasi-operasi pengolahan citra. Algoritma watermarking yang dikembangkan kurang bertahan terhadap serangan-serangan tapis lolos-bawah dan tapis median, namun mempunyai unjuk kerja yang sangat baik terhadap serangan tapis lolos-atas. Kata Kunci: watermarking citra, wavelet, Discrete Cosine Transform (DCT), Human Visual System (HVS)



2012 ◽  
Vol 60 (2) ◽  
pp. 317-321 ◽  
Author(s):  
P. Lipiński

Abstract. Recently, a variety of digital watermarking schemes have been developed for copyright protection of digital images. In robust watermarking, which is used in copyright protection, transform-based algorithms are used to ensure resilience of the watermark to common signal processing attacks. The most frequently used watermarking algorithms for additive watermark embedding involve DCT, DFT, SVD and DWT domains. In this article we verify which domain is optimal for robust, the additive watermark embedding scheme. We demonstrate that in additive watermark embedding the embedding domain plays more important role than the embedding formula.



2017 ◽  
Vol 4 (6) ◽  
pp. 170326 ◽  
Author(s):  
Soumitra Roy ◽  
Arup Kumar Pal

Digital image watermarking has emerged as a promising solution for copyright protection. In this paper, a discrete cosine transform (DCT) and singular value decomposition (SVD) based hybrid robust image watermarking method using Arnold scrambling is proposed and simulated to protect the copyright of natural images. In this proposed scheme, before embedding, watermark is scrambled with Arnold scrambling. Then, the greyscale cover image and encrypted watermark logo are decomposed into non-overlapping blocks and subsequently some selected image blocks are transformed into the DCT domain for inserting the watermark blocks permanently. For better imperceptibility and effectiveness, in this proposed algorithm, watermark image blocks are embedded into singular values of selected blocks by multiplying with a feasible scaling factor. Simulation result demonstrates that robustness is achieved by recovering satisfactory watermark data from the reconstructed cover image after applying common geometric transformation attacks (such as rotation, flip operation, cropping, scaling, shearing and deletion of lines or columns operation), common enhancement technique attacks (such as low-pass filtering, histogram equalization, sharpening, gamma correction, noise addition) and jpeg compression attacks.



Author(s):  
Rahul Dixit ◽  
Amita Nandal ◽  
Arvind Dhaka ◽  
Vardan Agarwal ◽  
Yohan Varghese

Background: Nowadays information security is one of the biggest issues of social networks. The multimedia data can be tampered with, and the attackers can then claim its ownership. Image watermarking is a technique that is used for copyright protection and authentication of multimedia. Objective: We aim to create a new and more robust image watermarking technique to prevent illegal copying, editing and distribution of media. Method : The watermarking technique proposed in this paper is non-blind and employs Lifting Wavelet Transform on the cover image to decompose the image into four coefficient matrices. Then Discrete Cosine Transform is applied which separates a selected coefficient matrix into different frequencies and later Singular Value Decomposition is applied. Singular Value Decomposition is also applied to the watermarking image and it is added to the singular matrix of the cover image which is then normalized followed by the inverse Singular Value Decomposition, inverse Discrete Cosine Transform and inverse Lifting Wavelet Transform respectively to obtain an embedded image. Normalization is proposed as an alternative to the traditional scaling factor. Results: Our technique is tested against attacks like rotation, resizing, cropping, noise addition and filtering. The performance comparison is evaluated based on Peak Signal to Noise Ratio, Structural Similarity Index Measure, and Normalized Cross-Correlation. Conclusion: The experimental results prove that the proposed method performs better than other state-of-the-art techniques and can be used to protect multimedia ownership.



Author(s):  
Farook Sattar ◽  
Dan Yu

Today, the Internet is a worldwide broadcasting capability, a mechanism for information dissemination and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. With the rapid evolution of digital networks, digital libraries and World Wide Web (WWW) services, the convenient broadcasting or exposition of digital products on the global network leads easily to illegal copying, modifying and retransmission. The Internet has spawned many copyright issues involving multimedia content distribution. Let’s say an owner would like to sell or distribute a work to legal/registered users only. If the work were subsequently copied/redistributed illegally, how could the owner find who was responsible? Cryptographic techniques provide an effective solution for securing the delivery process and controlling the use of the contents that an user has obtained. However, with flawless transmission through the network, the contents after decryption are exactly the same as the original data. The contents can be copied perfectly infinite times. A user can also manipulate the contents. Digital watermarking (Arnold, Schmucker, & Wolthusen, 2003; Katzenbeisser & Petitcolas, 2000) offers a way to counter copyright piracy on global networks that are not solvable by cryptography. It provides proof and tracking capabilities to illegal copying and distribution of multimedia information. Most existing digital watermarking schemes are based on some assumptions for watermark detection and extraction. Some schemes require the previous knowledge of watermark locations, strengths or some thresholds. In some algorithms, the watermark is estimated with the help of the original watermark information. To ensure the robustness and invisibility of the watermark, the optimum embedding locations are usually different for different images. For a large image database, it could be a disadvantage to require watermark location and strength information for watermark detection and extraction. A large amount of information then needs to be stored. On the Internet, an owner would like to distribute multimedia data by signing different watermarks to different users in order to prevent illegal redistribution of the data by a legal user. In this scenario, watermark detection and extraction algorithms requiring information of either watermark embedding locations and strengths or the original watermark should fail, since one does not know exactly which watermark is embedded in a particular copy of the watermarked image. To this end, we present a new blind watermarking scheme (Yu, Sattar, & Ma, 2002; Yu & Sattar, 2003, 2005) based on Independent Component Analysis (ICA) (Hyvarinen, 1999; Hyvärinen & Oja, 1999; Lee, 1998) for color images, which can overcome existing problems of watermark detection and extraction as described above. The new ICA-based scheme is found to be efficient in the application of data tracking/tracing for multimedia distribution through the Internet against other digital watermarking schemes. By adopting this ICA-based watermarking scheme, an efficient multimedia distribution framework/protocol for copyright protection can be accomplished. This article is organized as follows: The watermark embedding and extraction algorithms for color image watermarking using the new ICA-based scheme are presented next, followed by a discussion and comments on the results, security issues, summary and future works.



Author(s):  
Ajib Susanto ◽  
De Rosal Ignatius Moses Setiadi ◽  
Eko Hari Rachmawanto ◽  
Ibnu Utomo Wahyu Mulyono ◽  
Christy Atika Sari


Sign in / Sign up

Export Citation Format

Share Document