Digital Watermarking of Compressed Videos Using Larger Dimension 2D Error Correcting Codes for Higher Embedding Capacity

Author(s):  
Anjana Rodrigues ◽  
Archana Bhise
2020 ◽  
Vol 6 (3) ◽  
pp. 92-99
Author(s):  
A. Zhuvikin

One of the most promising application of the digital watermarking is the selective image authentication (SIA) systems. In order to implement such a system one requires an embedding algorithm with an appropriate capacity. In addition, an embedding method is to be robust for the class of non-malicious manipulations which the SIA system is designed for. We propose the new method which has a significant embedding capacity while still being tolerant to JPEG compression, brightness and contrast adjustments. This was possible due to the extension of the well-known discrete wavelet transform embedding technique. We propose two-step embedding scheme and the use of image histogram equalisation and recovering operations. The experiment results show acceptable tolerance to JPEG compression, brightness and contrast adjustments with good visual quality in terms of PSNR just after embedding.


Author(s):  
Umair Khadim ◽  
Muhammad Munwar Iqbal ◽  
Muhammad Awais Azam

Digital text is the most frequent interchange form of data that could hold sensitive information such as audit firms, banks, and educational institutes. This sensitive information needs to preserve its integrity and originality so that it could not only secure the data but also helps to identify ownership of text documents. This paper presents a novel and invisible digital watermarking approach for the secure exchange of text documents over the internet. Digital watermarking serves from the last decade for detection of forgery and tempering from digital text documents and maintained the copyright and authentication successfully. Many states of the art watermark techniques achieve high imperceptibility, robustness, and high hidden capacity; unfortunately failed to maintain the balance among these three conflicting parameters. As resolvent, we propose an intelligent Three-Level Digital Watermarking (3LDW) system for text documents copyright protection. 3LDW system can be applied to Microsoft Word objects, document open spaces, and text feature coding without affecting the content of the original document. Experimental results reveal that our proposed 3LDW system strongly resist against formatting attacks and efficiently preserves the imperceptibility. Additionally, embedding capacity analysis demonstrates a prominent improvement of the proposed system as compared to other similar approaches.


1970 ◽  
Vol 3 ◽  
Author(s):  
Pranab Kumar Dhar ◽  
Mohammad Ibrahim Khan ◽  
Sujan Chowdhury

Digital watermarking has drawn extensive attention for copyright protection of multimedia data. This paper proposes a new watermarking system for digital images using efficient systematic linear block codes (SLBC) in discrete cosine transform (DCT) domain. The proposed watermarking system using SLBC generates a code sequence of {0, 1} that provides error correction capabilities and then replaces it with a binary watermark sequence of {-1, 1}. This achieves more robust invisible image watermarks and requires a small storage unit for binary sequence numbers. The generated watermark sequence is then used as an input for our proposed watermarking system which consists of watermark embedding process and watermark detection process. Experimental results indicate that the invisible watermark embedded with the proposed system are very robust against various kinds of attacks such as white Gaussian noise, JPEG compression, median, and mean filtering, by showing similarity values ranging from 0.7 to 0.8. KEY WORDS: Digital Watermarking; Linear Block Code; Copyright Protection. DOI: http://dx.doi.org/10.3329/mist.v3i0.8056


2014 ◽  
Vol 11 (4) ◽  
pp. 1581-1594
Author(s):  
Valery Korzhik ◽  
Guilermo Morales-Luna ◽  
Alexander Kochkarev ◽  
Dmitriy Flaxman

A new concatenated digital watermarking system that combines in a serial manner both ?holographic? transform domain and image-normalized method has been proposed and developed. Since the first procedure is resistant to watermarks removal attacks as cropping of windows, removal of rows and columns and JPEG compression, and the second procedure is especially robust against geometric transforms, we get a watermarking system embracing a resistance to the above mentioned attacks. The image corrupting after concatenated watermark usage and error correcting codes applying in order to improve a reliability of fingerprinting application of watermark have been also investigated.


2013 ◽  
Vol 5 (1) ◽  
pp. 18-23
Author(s):  
L. Venkateswarlu ◽  
◽  
Dr. N V Rao ◽  

Sign in / Sign up

Export Citation Format

Share Document