scholarly journals Semi-Fragile Watermarking with Tamper Localization and Recovery using AMBTC Method

The watermarking scheme in digital media communication has become an essential tool in helping content creators prove ownership if any dispute arises in copyright infringement. In this paper, Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) is performed in the watermarking process which improves the authentication of the image and the detection of the tampered region. The semi-fragile watermarking scheme provides robustness to the watermark during extraction process even after the unintentional compression attacks like JPEG compression. The watermark payload is significantly lowered in order to increase the quality of the image. The recovery is done using the absolute moment block truncation coding (AMBTC) of the image in the untampered region. Thus, both the mean and first absolute moment are used in recovering the tampered regions in the watermarked image.

2017 ◽  
Vol 10 (1) ◽  
pp. 160-167
Author(s):  
Neelam Dabas ◽  
Rampal Singh ◽  
Vikash Chaudhary

Modification of media and illegal production is a big problem now a days because of free availability of digital media. Protection and securing the digital data is a challenge. An Integer Wavelet Transformation (IWT) domain based robust watermarking scheme with Singular Value Decomposition (SVD) and Extreme Learning Machine (ELM) have been proposed and tested on different images. In this proposed scheme, a watermark or logo is embedded in the IWT domain as ownership information with SVD and ELM is trained to learn the relationship between the original coefficient and the watermarked one. This trained ELM is used in the extraction process to extract the embedded logo from the image. Experimental results show that the proposed watermarking scheme is robust against various image attacks like Blurring, Noise, Cropping, Rotation, Sharpening etc. Performance analysis of proposed watermarking scheme is measured with Peak Signal to Noise Ratio (PSNR) and Bit Error Rate (BER)


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5540
Author(s):  
Nayeem Hasan ◽  
Md Saiful Islam ◽  
Wenyu Chen ◽  
Muhammad Ashad Kabir ◽  
Saad Al-Ahmadi

This paper proposes an encryption-based image watermarking scheme using a combination of second-level discrete wavelet transform (2DWT) and discrete cosine transform (DCT) with an auto extraction feature. The 2DWT has been selected based on the analysis of the trade-off between imperceptibility of the watermark and embedding capacity at various levels of decomposition. DCT operation is applied to the selected area to gather the image coefficients into a single vector using a zig-zig operation. We have utilized the same random bit sequence as the watermark and seed for the embedding zone coefficient. The quality of the reconstructed image was measured according to bit correction rate, peak signal-to-noise ratio (PSNR), and similarity index. Experimental results demonstrated that the proposed scheme is highly robust under different types of image-processing attacks. Several image attacks, e.g., JPEG compression, filtering, noise addition, cropping, sharpening, and bit-plane removal, were examined on watermarked images, and the results of our proposed method outstripped existing methods, especially in terms of the bit correction ratio (100%), which is a measure of bit restoration. The results were also highly satisfactory in terms of the quality of the reconstructed image, which demonstrated high imperceptibility in terms of peak signal-to-noise ratio (PSNR ≥ 40 dB) and structural similarity (SSIM ≥ 0.9) under different image attacks.


2013 ◽  
pp. 376-399
Author(s):  
Ali Al-Haj ◽  
Ahmad Mohammad ◽  
Samir Abou El-Seoud ◽  
Tuqa Manasrah ◽  
Lama Rajab ◽  
...  

The tremendous advancement of digital technology has increased the ease with which digital multimedia signals (image, video, audio) are stored, transmitted, and reproduced. Consequently, the content providers and owners are faced with problems of protection against copyright violation and other forms of abuse to their digital property. Digital watermarking has been proposed in the last decade as a solution to prevent illegal and malicious copying and distribution of digital media by embedding an unnoticeable information into the media content. This chapter describes three imperceptible and robust watermarking algorithms for different types of multimedia objects (image, video, audio). The three algorithms are based on cascading two powerful mathematical transforms; the Discrete Wavelet Transform (DWT), and the Singular Value Decomposition (SVD). The two transforms are different, and thus provide complementary levels of robustness against the same attack. In the proposed dual-transform algorithms, the watermark bits are not embedded directly on the wavelet coefficients, but rather on the elements of singular values of the DWT sub-bands of the multimedia object. Effectiveness of the proposed algorithms is demonstrated through extensive experimentation.


2021 ◽  
pp. 749-757
Author(s):  
Shambhu Shankar Bharti ◽  
Shivendra Shivani ◽  
Sudhir Kumar Pandey ◽  
Suneeta Agarwal

2011 ◽  
Vol 219-220 ◽  
pp. 1121-1125 ◽  
Author(s):  
Rui Chen ◽  
Yu Lin Lan ◽  
Reza Asharif Mohammad

This paper proposed a digital audio watermarking scheme based on independent component analysis (ICA) in DWT domain. The embedding process make full use of the multi-resolution characteristic of discrete wavelet transform (DWT), performing 3-level DWT. Selecting the low frequency coefficient appropriately as the embed location to make sure of the balance between the transparency and robustness. Then constructing the ICA model to embed the watermarking. The extraction process is similar with ICA’s goal, it’s used in extraction makes the scheme simple for implementation. The experiment results show that the proposed scheme has good robustness against common attacks, as well as transparency.


2021 ◽  
Author(s):  
Chinnarao Rayudu ◽  
Jayasree P.V.Y. ◽  
Srinivasa Rao S.

Abstract In the last two decades, it has been observed that there have been remarkable advancements in digital media communication. It has lots of advantages and business potential as it needs no physical media or transport. However, digital media can also create several big problems for media owners due to unauthorized use, ease of replication, plasticity, and equivalence of works in digital form. The possible solution is to secure digital media by cover writing which can also referred as steganography. Therefore, this article focusing on development of hybrid speech steganography system using spread spectrum-based redundant discrete wavelet transform (SS- RDWT). In general, speech steganography utilizes cover speech to embed the secrete message, however, the cover speech might be larger in size and contains many pauses, which requires more storage capacity, higher computational time, and even higher power usage results in system performance degradation. Hence, in addition to the proposed SS-RDWT approach, an intelligent pause detection protocol (IPDP) with maximum likelihood estimation (MLE) technique is employed for removing pause from cover speech signal, which reduces the transmission bandwidth, storage capacity and power consumption as well. Simulation results demonstrate that proposed hybrid steganography using integrated SS-RDWT with IPDP-MLE approach obtained superior performance as compared to state-of-art approaches.


Sign in / Sign up

Export Citation Format

Share Document