scholarly journals Development of methods for generation of digital watermarks resistant to distortion

2021 ◽  
Vol 6 (2 (114)) ◽  
pp. 103-116
Author(s):  
Vitalii Martovytskyi ◽  
Igor Ruban ◽  
Nataliia Bolohova ◽  
Оleksandr Sievierinov ◽  
Oleg Zhurylo ◽  
...  

Active attacks and natural impacts can lead to two types of image-container distortions: noise-like and geometric. There are also image processing operations, e.g. scaling, rotation, truncation, pixel permutation which are much more detrimental to digital watermarks (DWM). While ensuring resistance to removal and geometric attacks is a more or less resolved problem, the provision of resistance to local image changes and partial image deletion is still poorly understood. The methods discussed in this paper are aimed at ensuring resistance to attacks resulting in partial image loss or local changes in the image. This study's objective is to develop methods for generating a distortion-resistant digital watermark using the chaos theory. This will improve the resistance of methods of embedding the digital watermark to a particular class of attacks which in turn will allow developers of DWM embedding methods to focus on ensuring the method resistance to other types of attacks. An experimental study of proposed methods was conducted. Histograms of DWMs have shown that the proposed methods provide for the generation of DWM of a random obscure form. However, the method based on a combination of Arnold’s cat maps and Henon maps has noticeable peaks unlike the method based on shuffling the pixels and their bits only with Arnold’s cat maps. This suggests that the method based only on Arnold’s cat maps is more chaotic. This is also evidenced by the value of the coefficient of correlation between adjacent pixels close to zero (0.0109) for color DWMs and 0.030 for black and white images.

2021 ◽  
Author(s):  
Venkatesh S ◽  
Saravanakumar R ◽  
SureshKumar M ◽  
sivakumar B ◽  
veeramakali T

Abstract Some technologies are technologically advanced to provide security from illegal copying. Two complementary methods are encryption and watermarking. Encryption safeguards the information throughout the communication from the sender to the receiver. The data might present a distorted image after receipt and subsequent decryption. Watermarking complements encryption through embedding data openly into the image. Therefore, the watermark continuously remains existing in the data. A digital watermark is a category of indication secretly entrenched in a noise-tolerant signal similar to audio or else image information. It is indeed applied to distinguish copyright possession of such signal. Computer-aided hiding of the given digitized information in a carrier is known as watermarking. Digital watermarks possibly will be employed to validate the authenticity or integrity of a carrier signal or to determine source uniqueness. It is evidently applied for determining copyright contraventions and aimed at banknote verification. Analogous to traditional watermarks, digital watermarks are unique only beneath certain conditions. Once a digital watermark varies a carrier in a manner that it turns out to be noticeable, formerly it is of no use. The media will be visible by traditional watermarks (similar to images or else video) but the signal might be pictures, video, audio, texts or 3D models in digital watermarking. A signal can transmit some different watermarks at the equivalent time. Image watermarking is achieved in this study using two methods known as Hidden Markov Tree–Contourlet Wavelet Transform (HMT-CWT) and Haar wavelet transform – Discrete Fourier transform (HWT-DFT). In the next HWT-DFT method, a video is given as an input and it is split into two halves (audio and image). The audio is de-watermarked through Spectral Centroid Wavelet Transform and enhanced by utilizing Firefly procedure. The images is handled through HWT in addition to DFT. Then the output watermarked images and audio combined together to form a watermarked video. The obtained video is de-watermarked to produce the original copy of the video. The process of getting back the original copy by removing the watermark from the video is called as de-watermarking.


2020 ◽  
Vol 24 (2) ◽  
pp. 136-152
Author(s):  
O. O. Shumskaya ◽  
A. О. Iskhakova

Purpose of research. The article is devoted to the issue of ensuring the safe transmission of control signals between the elements of a multi-agent robotic system. The purpose of the work is to provide hidden data transmission with the possibility of unambiguous extraction of control signals.Methods. To solve the task set, an algorithm based on the methods of digital watermarks and digital steganography was proposed. The method of forming a digital watermark in the form of a ring with symmetry allows not only ensuring maximum imperceptibility of embedding (insignificant distortion of the container during concealment), but also to protect the transmitted signal from such complex distortions as image rotation. The steganographic concealment method allows regulating the intensity of embedding using the force factor; it is computationally simple and straightforward. The proposed approach to identifying and understanding the transmitted signal differs from modern methods of cryptography and steganalysis in that it does not require 100% correct signal extraction. After several modifications, the method allows minimizing the time spent on formation (adaptive width of the ring with signal bits) and embedding of a digital watermark (minimization of the processed area of the container for embedding).Results. The proposed approach makes it possible to transmit control signals in a hidden way within the framework of the transmission of digital objects; the conducted experiments have shown that the control signal is unambiguously understood even with such distortions as a decrease or increase in contrast or brightness, image rotation, and compression.Conclusion. Application of the proposed technique for transmitting control signals in a multi-agent robotic system will male it possible to receive the necessary information timely and safe, with a minimum probability of loss.


Author(s):  
Sof'ya A. Serebryakova ◽  
◽  
Mikhail V. Filippov ◽  

Nowadays authors of cinematographic works are often faced to protect copyright need. One way to resolve such an issue is to use digital watermarks. Digital watermarks are some kind of encrypted message that allows distinguishing the original work from its forgery. At the same time the audio or video file with a built-in message looks no different from a file without a digital watermark, what is a key advantage of its use and at the same time it makes difficult to playback the file illegally. A set of methods for undetectable hiding some bit sequences in others is called digital steganography. An important advantage of steganography over cryptographic methods is the hiding the fact of embedding a code message. Embedding digital watermarks by using the least significant bit method allows embedding a digital watermark in such a way that a person will not notice any changes in the video file. The article considers the known methods of embedding digital watermarks and the structure of the AVI file format. It presents an algorithm for embedding and extracting digital watermarks for AVI video files based on LSB method with using hash-function. The algorithm provides a counteraction to the spread of counterfeit products.


2019 ◽  
Vol 5 (3) ◽  
pp. 75-85
Author(s):  
V. Korzhik ◽  
D. Flaksman

In this paper it is presented Digital Watermark System for color images. The main feature of this system is an ability to extract digital watermarks even after printing and following scanning of watermarked images. There is a description of algorithms for embedding and extracting of additional information. These methods are based on the usage of spread-spectrum signals in the frequency domain. Furthermore, there is described algorithms of distortion correction after printing out and following scanning the paper copies of digital data. The results of the experimental research on evaluation of a possible embedding volume and the reliability after extraction of the embedded data are also presented.


2021 ◽  
Vol 3 (2 (111)) ◽  
pp. 45-56
Author(s):  
Oleksandr Makoveichuk ◽  
Igor Ruban ◽  
Nataliia Bolohova ◽  
Andriy Kovalenko ◽  
Vitalii Martovytskyi ◽  
...  

A technique for increasing the stability of methods for applying digital watermark into digital images is presented. A technique for increasing the stability of methods for applying digital watermarks into digital images, based on pseudo-holographic coding and additional filtering of a digital watermark, has been developed. The technique described in this work using pseudo-holographic coding of digital watermarks is effective for all types of attacks that were considered, except for image rotation. The paper presents a statistical indicator for assessing the stability of methods for applying digital watermarks. The indicator makes it possible to comprehensively assess the resistance of the method to a certain number of attacks. An experimental study was carried out according to the proposed method. This technique is most effective when part of the image is lost. When pre-filtering a digital watermark, the most effective is the third filtering method, which is averaging over a cell with subsequent binarization. The least efficient is the first method, which is binarization and finding the statistical mode over the cell. For an affine type attack, which is an image rotation, this technique is effective only when the rotation is compensated. To estimate the rotation angle, an affine transformation matrix is found, which is obtained from a consistent set of corresponding ORB-descriptors. Using this method allows to accurately extract a digital watermark for the entire range of angles. A comprehensive assessment of the methodology for increasing the stability of the method of applying a digital watermark based on Wavelet transforms has shown that this method is 20 % better at counteracting various types of attacks


2018 ◽  
Author(s):  
AWEJ for Translation & Literary Studies ◽  
Brahimi Sarra ◽  
Maoui Hocine

This article explores the polyphony as a narrative strategy in Caryl Phillips’s Crossing the River 1993 and how this polyphony serves the healing process the author engages in through his revision of history that thematizes black slavery as a key episode in black modern history. Phillips, the Kittitian-British author, interweaves a variety of narrative voices of both black and white characters in an attempt to provide a thorough scrutiny and a deep diagnosis of a traumatic past that contains the underlining fundaments of present racial issues and identity dilemmas that black communities suffer from in both the United States and Britain. This study is primarily focused on deconstructing and reconstructing Phillips’s portrayal of what he calls “the shameful intercourse” between the slave trader and the African father. The aim of this analysis is to uncover the author’s polyphonic strategy that equally voices both the “white” and the “black”, “the oppressor” and “the oppressed”. This rather experimental study allows us to understand how polyphony is used to serve reconciliation and healing.


2018 ◽  
Vol 42 (3) ◽  
pp. 483-494
Author(s):  
A. A. Sirota ◽  
M. A. Dryuchenko ◽  
E. Yu. Mitrofanova

In this paper, we present a digital watermarking method and associated algorithms that use a heteroassociative compressive transformation to embed a digital watermark bit sequence into blocks (fragments) of container images. A principal feature of the proposed method is the use of the heteroassociative compressing transformation – a mutual mapping with the compression of two neighboring image regions of an arbitrary shape. We also present the results of our experiments, namely the dependencies of quality indicators of thus created digital watermarks, which show the container distortion level, and the probability of digital watermark extraction error. In the final section, we analyze the performance of the proposed digital watermarking algorithms under various distortions and transformations aimed at destroying the hidden data, and compare these algorithms with the existing ones.


2020 ◽  
Vol 7 (4) ◽  
pp. 012-017
Author(s):  
S. V. Belim ◽  
◽  
S. N. Munko ◽  

An algorithm for embedding digital watermarks into the memory of the executable program is proposed. Digital watermarks are used for copy protection and copyright confirmation of digital objects. The proposed approach makes it possible to form a digital watermark in the operative memory of an executable program for a limited period of time. The address of the embedded information in RAM is random, which greatly complicates its detection and identification. Extraction of digital watermark is performed by passphrase. The embedding, extraction and removal of a digital watermark is implemented using a dynamic library, which is an integral part of the user authentication process, which prevents third-party removal of the digital watermark.


2017 ◽  
Vol 13 (5) ◽  
pp. 560-582 ◽  
Author(s):  
Cynthia Daniels ◽  
Christin L. Munsch

Despite scientific evidence to the contrary, pregnancy criminalization cases are based on assumptions of reproductive asymmetry—the belief that women are exclusively responsible for fetal health. In this article, we test the impact of disrupting this assumption. In Study 1, when asked to read a case involving charges of chemical endangerment, participants exposed to testimony about the effects of paternal drug use on pregnancy outcomes viewed both Black and White defendants as less culpable than participants in the control group. In Study 2, a homicide case, information about male-mediated harm reduced perceptions of culpability for White, but not Black, defendants.


Sign in / Sign up

Export Citation Format

Share Document