scholarly journals GRAYSCALE IMAGE WATERMARK DETECTION

2012 ◽  
Vol 3 (1) ◽  
pp. 100-105
Author(s):  
Randeep Kaur ◽  
Kamaljit Kaur Dhillon

A Digital watermarking is a technique that provides a solution to the longstanding problems faced with copyrighting digital data. Digital watermarks are pieces of information added to digital data (audio, video, or still images) that can be detected or extracted later to make an assertion about the data. This information can be textual data about the author, its copyright, etc; or it can be an image itself. Watermarking Based on DCT Coefficient Modulation technique embeds the watermark in the DCT domain to increase the robustness of the watermarking scheme.DCT based watermarking is an example of frequency domain watermarking. The objective of this research work is to implement DCT based watermarking technique on gray scale image. The study focuses on evaluating the robustness of watermarked image after having three different attacks on watermarked image and extraction of watermark from that particular image. To compare the DCT based watermarking with LSB based watermarking and to validate the proposed work & the comparative results of watermarking using DCT and LSB are also presented. This paper recommends DCT based technique for achieving robustness in digital image watermarking.

2013 ◽  
Vol 717 ◽  
pp. 720-725
Author(s):  
Qing Jun Wang ◽  
Xiao Bin Wang

This paper proposes digital image watermarking algorithm in DCT domain which makes use of the unique nature of chaotic sequences to encrypt binary image watermarking with copyright information via chaotic sequences and then embeds watermarking component of different strengths in DCT domain of different image blocks self-adaptively. Through the added Gaussian noise, salt and pepper noise and JPEG compression and shear processing operations, the results show that the algorithm has a good visual masking and robustness.


In today’s world, the enhancement in internet technologies, digital data are mostly used to share the information in public networks. There are many traditional security techniques used to provide security to the digital information. But the existing methods don’t provide much of the security to digital media like image, video, audio, etc. The digital watermarking is employed in the protection of digital information. This paper gives a review on digital image watermarking based on the visual cryptography to reach secure protection for the images. The secret information can be inserted in the original images. The secret key is generated from the watermark image with the help of visual cryptography to claim the ownership of images. Various types of Visual Cryptography and Digital Image Watermarking techniques are explained in real time application.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 302
Author(s):  
Manoj Kumar ◽  
O P. Verma

Digital data such as text, relational database, audio, video and software are intellectual property of creators/ writers/owners. The database services have become easily available and economical since the booming of internet. However, their outsourcing through the internet accompanies multiple threats like copying, modifying as well as unauthorized distribution. Relational Database has a wide-spread use in many real-life applications, hence, it is essential to maintain integrity and provide copyright protection. To counter the threats, watermarking techniques have been playing a vital role since the last decade. As a security measure, Relational Database Watermarking is becoming more popular and strengthened day-by-day. This is also one of the upcoming areas of interest among researchers of the Database Security. A technique earlier used for Image Watermarking is applied to watermark Relational Databases. In Image Watermarking technique, a pixel or a pair of pixels must satisfy certain characteristics. Usually, database watermarking techniques concentrate on hiding a watermark in database. Extraction and matching of hidden watermark with original watermark confirms ownership of database. This paper demonstrates the use of image watermarking technique for relational databases. Here we align some properties of attributes of database by changing some bit(s) in attribute value. Using secret key, we have ensured that values of two attributes of a tuples satisfy some bit-similarity property and to do so, we slightly alter values of attributes. Detection of such characteristic in a database using secret key can be done easily to verify the presence of a watermark.  


2014 ◽  
Vol 926-930 ◽  
pp. 3171-3174
Author(s):  
Na Na Zhang ◽  
Li Yu ◽  
Xiao Fang Yang

Image watermarking is a carrier image watermarking technology. This paper studies the research direction of the digital watermarking image of the DCT-based image robust watermarking algorithm design. We studies robust algorithm of watermarking image on specific design and implementation process based on DCT domain, the process including image watermarking embedding and watermarking extraction and watermarking detection. Experimental results achieved watermarking embedding evaluation requirements: effectiveness, transparency and robustness.


Sign in / Sign up

Export Citation Format

Share Document