scholarly journals A Robust Digital Image Watermarking in Hybrid Frequency Domain

2018 ◽  
Vol 7 (3.6) ◽  
pp. 243 ◽  
Author(s):  
P Sridhar ◽  
. .

Image watermarking is a method to hide the secret information in a host image for copyright protection of watermark data during the transmission by means of insecure channel. The proposed scheme protects our data with adaptive level of visual quality and robustness against signal processing and geometric attacks. The proposed method divides the host image into four non-overlapping segments labelled as sub-images, DWT is applied on each sub images and then block based DCT is applied on mid frequency channels LH and HL of discrete wavelet transform. Embedded matrix is formed using hybrid transformed coefficients where matrix elements are chosen from the localized two mid frequency coefficients of each block in DCT. SV Decomposition is applied on embedded matrix to factorize it into singular values, left and right singular vectors and embed the scrambled watermark image along with scaling factor in singular value matrix. This repetition of watermark data in each sub-image reduces the PSNR values of the watermarked image. Despite this proposed scheme scales down PSNR value, changing the scaling factor favours to adjust the PSNR to the acceptable level and withstand the signal processing attacks such as JPEG compression and geometrical attack such as rotation, translation. Compared to the other method, the proposed scheme gives better correlation coefficient value for above mentioned kinds of attacks and also provide adaptive PSNR for imperceptibility on watermarked image.  

Author(s):  
Chauhan Usha ◽  
Singh Rajeev Kumar

Digital Watermarking is a technology, to facilitate the authentication, copyright protection and Security of digital media. The objective of developing a robust watermarking technique is to incorporate the maximum possible robustness without compromising with the transparency. Singular Value Decomposition (SVD) using Firefly Algorithm provides this objective of an optimal robust watermarking technique. Multiple scaling factors are used to embed the watermark image into the host by multiplying these scaling factors with the Singular Values (SV) of the host image. Firefly Algorithm is used to optimize the modified host image to achieve the highest possible robustness and transparency. This approach can significantly increase the quality of watermarked image and provide more robustness to the embedded watermark against various attacks such as noise, geometric attacks, filtering attacks etc.


2020 ◽  
Vol 30 (1) ◽  
pp. 297-311
Author(s):  
Priyank Khare ◽  
Vinay Kumar Srivastava

Abstract In this paper a new technique of dual image watermarking is proposed for protection of ownership rights which utilizes salient properties of homomorphic transform (HT), discrete wavelet transform (DWT), singular value decomposition (SVD) and Arnold transform (AT). In embedding algorithm host image is splitted into reflectance and illumination components using HT, DWT is further applied to the reflectance component resulting in frequency subbands (HL and LH) which are transformed by SVD. Two image watermarks are selected for embedding process whereas security of proposed algorithm is strengthen by performing scrambling of second watermark through AT. Both watermarks are transformed with DWT and SVD. Singular values (SVs) of both transformed watermark are embedded into SVs of host image. Simulation results clearly signifies for high robustness and imperceptibility of proposed algorithm as it is examined under various attacks. Superiority of proposed technique is illustrated by comparing it with other reported methods.


2020 ◽  
Author(s):  
Satyanarayana Murty. P ◽  
Purna Ramesh Addanki

Abstract Robust watermarking proposals supported on human visual characteristics with a series of hybrid transform of type discrete wavelet transform (DWT) followed by singular value decomposition (SVD) is wished-for. By analyzing the matrices U or V through SVD, it is bringing into being that there stay alive a well-built relationship amid the internal column elements of U or internal row elements of V. Hence, this work will make the most of these chattels for image watermarking. At the outset, visual digital data is segregated into 8 × 8 non-overlapping pixel blocks and each block is processed for brinks by using the algorithm of detection for a canny brink. An appropriate block is decided to pick in such a way that the number of brinks in each block is only about or equal to a threshold. A threshold is defined by finding the mean of the brinks in each block of the host visual digital data. Using these appropriate blocks, we will form an image of reference. This reference image is processed by a series of operations DWT-SVD. Then, the watermark is implanted by adapting the nth column of the U matrix of the host image with the nth column of the U matrix of the watermark image. The same operation is applied on the V matrix instead of a column vector, use a row vector. The adapted relation is wont to retrieve a watermark. The experimental findings demonstrate that the ideal watermarking algorithm will guarantee that the typical image processing operations and geometric attacks are invisible and more stable. The efficiency of this proposed method is out of shape than other proposed methods examined in this research.


2020 ◽  
Vol 6 (3) ◽  
pp. 8-13
Author(s):  
Farha Khan ◽  
M. Sarwar Raeen

Digital watermarking was introduced as a result of rapid advancement of networked multimedia systems. It had been developed to enforce copyright technologies for cover of copyright possession. Due to increase in growth of internet users of networks are increasing rapidly. It has been concluded that to minimize distortions and to increase capacity, techniques in frequency domain must be combined with another technique which has high capacity and strong robustness against different types of attacks. In this paper, a robust multiple watermarking which combine Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT)and Convolution Neural Network techniques on selected middle band of the video frames is used. This methodology is considered to be robust blind watermarking because it successfully fulfills the requirement of imperceptibility and provides high robustness against a number of image-processing attacks such as Mean filtering, Median filtering, Gaussian noise, salt and pepper noise, poison noise and rotation attack. The proposed method embeds watermark by decomposing the host image. Convolution neural network calculates the weight factor for each wavelet coefficient. The watermark bits are added to the selected coefficients without any perceptual degradation for host image. The simulation is performed on MATLAB platform. The result analysis is evaluated on PSNR and MSE which is used to define robustness of the watermark that means that the watermark will not be destroyed after intentional or involuntary attacks and can still be used for certification. The analysis of the results was made with different types of attacks concluded that the proposed technique is approximately 14% efficient as compared to existing work.


2014 ◽  
Vol 3 (2) ◽  
pp. 69-78
Author(s):  
Sedigeh Razavi babakalak ◽  
Mohammad Ali Balafar ◽  
Ali Farzan

In this paper, a new robust digital image watermarking algorithm which was based on singular value decomposition (SVD) and discrete wavelet transform (DWT) was proposed and simulated for protecting real property rights. A gray scale logo image, rather than a randomly generated Gaussian noise type watermark, was used as a watermark. Its embedding algorithm hid a watermark LL sub-band blocks in the low–low (LL) and high-high (HH) sub-bands of a target non-overlapping block of the host image by modifying singular values on SVD version of these blocks. A semi-blind watermark extraction was designed to estimate the original coefficients. Experimental results showed that the proposed scheme made significant improvements in terms of both transparency and robustness and was superior to the existing methods which were considered in this paper.


2020 ◽  
Vol 10 (19) ◽  
pp. 6854 ◽  
Author(s):  
Jae-Eun Lee ◽  
Young-Ho Seo ◽  
Dong-Wook Kim

Digital watermarking has been widely studied as a method of protecting the intellectual property rights of digital images, which are high value-added contents. Recently, studies implementing these techniques with neural networks have been conducted. This paper also proposes a neural network to perform a robust, invisible blind watermarking for digital images. It is a convolutional neural network (CNN)-based scheme that consists of pre-processing networks for both host image and watermark, a watermark embedding network, an attack simulation for training, and a watermark extraction network to extract watermark whenever necessary. It has three peculiarities for the application aspect: The first is the host image resolution’s adaptability. This is to apply the proposed method to any resolution of the host image and is performed by composing the network without using any resolution-dependent layer or component. The second peculiarity is the adaptability of the watermark information. This is to provide usability of any user-defined watermark data. It is conducted by using random binary data as the watermark and is changed each iteration during training. The last peculiarity is the controllability of the trade-off relationship between watermark invisibility and robustness against attacks, which provides applicability for different applications requiring different invisibility and robustness. For this, a strength scaling factor for watermark information is applied. Besides, it has the following structural or in-training peculiarities. First, the proposed network is as simple as the most profound path consists of only 13 CNN layers, which is through the pre-processing network, embedding network, and extraction network. The second is that it maintains the host’s resolution by increasing the resolution of a watermark in the watermark pre-processing network, which is to increases the invisibility of the watermark. Also, the average pooling is used in the watermark pre-processing network to properly combine the binary value of the watermark data with the host image, and it also increases the invisibility of the watermark. Finally, as the loss function, the extractor uses mean absolute error (MAE), while the embedding network uses mean square error (MSE). Because the extracted watermark information consists of binary values, the MAE between the extracted watermark and the original one is more suitable for balanced training between the embedder and the extractor. The proposed network’s performance is confirmed through training and evaluation that the proposed method has high invisibility for the watermark (WM) and high robustness against various pixel-value change attacks and geometric attacks. Each of the three peculiarities of this scheme is shown to work well with the experimental results. Besides, it is exhibited that the proposed scheme shows good performance compared to the previous methods.


Electronics ◽  
2022 ◽  
Vol 11 (1) ◽  
pp. 136
Author(s):  
Moataz Z. Salim ◽  
Ali J. Abboud ◽  
Remzi Yildirim

The usage of images in different fields has increased dramatically, especially in medical image analysis and social media. Many risks can threaten the integrity and confidentiality of digital images transmitted through the internet. As such, the preservation of the contents of these images is of the utmost importance for sensitive healthcare systems. In this paper, the researchers propose a block-based approach to protect the integrity of digital images by detecting and localizing forgeries. It employs a visual cryptography-based watermarking approach to provide the capabilities of forgery detection and localization. In this watermarking scheme, features and key and secret shares are generated. The feature share is constructed by extracting features from equal-sized blocks of the image by using a Walsh transform, a local binary pattern and a discrete wavelet transform. Then, the key share is generated randomly from each image block, and the secret share is constructed by applying the XOR operation between the watermark, feature share and key share. The CASIA V 1.0 and SIPI datasets were used to check the performance and robustness of the proposed method. The experimental results from these datasets revealed that the percentages of the precision, recall and F1 score classification indicators were approximately 97% for these indicators, while the percentages of the TAF and NC image quality indicators were approximately 97% and 96% after applying several known image processing and geometric attacks. Furthermore, the comparative experimental results with the state-of-art approaches proved the robustness and noticeable improvement in the proposed approach for the detection and localization of image forgeries in terms of classification and quality measures.


Author(s):  
Ekta Walia ◽  
Anu Suneja

Zernike Moments (ZMs) are used in many image processing applications, due to their resistance against various signal processing and geometric attacks. Digital image watermarking is one of those application areas, where ZMs are widely used to insert and extract the watermark bits for digital media authentication. In all the existing ZM based watermarking techniques, magnitude of moments is used to insert and extract the watermark. In this paper, the authors’ have proposed a semi blind watermarking technique in which phase of ZMs is used for watermark insertion and extraction. Due to the use of phase of ZMs, 100% detection ratio is achieved against any geometric and other signal processing attacks. To make the proposed technique fast, q-recursive method is used to compute the Zernike polynomials. The use of q-recursive method has also increased the transparency of watermark due to its better reconstruction ability as compared to traditional moment computation method. Through detailed experimentation, it has been confirmed that the proposed watermarking technique is fast, has more imperceptibility, less Bit Error Rate (BER) and more capacity as compared to traditional ZMs magnitude based watermarking technique.


Author(s):  
Dharm Singh ◽  
Madhuri Agarwal ◽  
Charu Singh

There is an increased risk of copyright violation of multimedia data due to the enormous growth of computer networks that provides fast and error free transmission of any multimedia information. A copyright identifier that may contain some information about the lawful owner is inserted in the contents of the image, without sacrificing its quality. The security levels are increased by using a key value and scaling factor for the embedding and extraction process. The dual scrambled watermark using Arnold and Scrambling sequence is embedded by modifying the singular values of the scrambled cover image's DWT middle frequency sub-band. The simulation was performed on MATLAB 7.7.0 with standard database gray scale images of size 512x512 and watermark of size 64x64 using hybrid dual scrambled watermark schemes. The performance analysis is done on the basis of the degree of scrambling and JPEG compression attack using various parameters. The proposed method achieves better imperceptibility and security for the copyright protection methods.


Sign in / Sign up

Export Citation Format

Share Document