scholarly journals Robust Formal Watermarking Model Based on the Hyperbolic Geometry for Image Security

The digital revolution has led to an increase in the production and exchange of valuable digitized documents across institutions, companies and the general public alike. Ensuring the authenticity, integrity and ownership of these official or high-value documents is essential if they are to be considered useful. Digital watermarking is a possible solution to this challenge as it has already been used for copyright protection, source tracking, and video authentication to name just a few applications of its use. It also enables integrity protection, which is of value for numerous documents types (e.g., official documents, medical images). In this paper, we propose a new watermarking solution that is applicable to image watermarking and is based on hyperbolic geometry. Our new solution builds upon existing work in geometrical watermarking.

Author(s):  
Coulibaly Cheick Yacouba Rachid ◽  
Tiendrebeogo B. Telesphore

The digital revolution has increased the production and exchange of high-value documents between institutions, businesses and the general public. In order to secure these exchanges, it is essential to guarantee the authenticity, integrity and ownership of these documents. Digital watermarking is a possible solution to this challenge as it has already been used for copyright protection, source tracking and video authentication. It also provides integrity protection, which is useful for many types of documents (official documents, medical images). In this paper, we propose a new watermarking solution applicable to images and based on the hyperbolic geometry. Our new solution is based on existing work in the field of digital watermarking


2020 ◽  
Vol 10 (11) ◽  
pp. 2588-2599
Author(s):  
Saqib Ali Nawaz ◽  
Jingbing Li ◽  
Uzair Aslam Bhatti ◽  
Anum Mehmood ◽  
Raza Ahmed ◽  
...  

With the advancement of networks and multimedia, digital watermarking technology has received worldwide attention as an effective method of copyright protection. Improving the anti-geometric attack ability of digital watermarking algorithms using image feature-based algorithms have received extensive attention. This paper proposes a novel robust watermarking algorithm based on SURF-DCT perceptual hashing (Speeded Up Robust Features and Discrete Cosine Transform), namely blind watermarking. We design and implement a meaningful binary watermark embedding and extraction algorithm based on the SURF feature descriptor and discrete-cosine transform domain digital image watermarking algorithm. The algorithm firstly uses the affine transformation with a feature matrix and chaotic encryption technology to preprocess the watermark image, enhance the confidentiality of the watermark, and perform block and DCT coefficients extraction on the carrier image, and then uses the positive and negative quantization rules to modify the DCT coefficients. The embedding of the watermark is completed, and the blind extraction of the watermark realized. Correlation values are more than 90% in most of the attacks. It provides better results against different noise attacks and also better performance against rotation. Transparency and high computational efficiency, coupled with dual functions of copyright protection and content authentication, is the advantage of the proposed algorithm.


2013 ◽  
Vol 278-280 ◽  
pp. 1366-1373 ◽  
Author(s):  
Zi Teng ◽  
Xiu Feng Qiu ◽  
Jian Wei Liu

The copyright protection of multimedia information is more and more important in the digital age, digital watermarking is a solution to address the topic. This paper proposes a new robust image watermarking scheme based on discrete ridgelet transform (DRT) and discrete wavelet transform (DWT). The scheme respectively embeds a copy of color image watermark into DWT domain and DRT domain, and uses a conception of semi-watermark. Experiment results demonstrate that the watermark can resist various attacks such as adding Gaussian or Union Distribution Noise, JPEG compression, brightness adjustment, contrast adjustment, altering color balance, lens blur, zooming in or out, cropping and some combined attacks etc.


Author(s):  
Ruo Ando ◽  
Yoshiyasu Takefuji

With the rapid advance in digital network, digital libraries, and particularly WWW (World Wide Web) services, we can retrieve many kinds of images on personal and mobile computer anytime and anywhere. At the same time, secure image archiving is becoming a major research area because the serious concern is raised about copyright protection and authority identification in digital media. A more sophisticated technique is required for future multimedia copyright protection. In this chapter we propose a secure image archiving using novel digital-watermarking techniques. Firstly, a nonlinear adaptive system (neural network) is applied for frequency-based digital watermarking. Secondly, we discuss application-oriented watermarking method for GIS image archiving. This chapter is divided into two parts. First section is about the way to apply nonlinear adaptive system for frequency-based image watermarking. We propose a new asymmetric technique employing nonlinear adaptive system trained on frequency domain. Our system uses two public keys to prevent removal attack and archive more fragile watermarking. In embedding, location information of frequency domain, where adaptive system is trained, is binalized, expressed in hexadecimal number, and encrypted in asymmetric cryptosystem. Encrypted location information is embedded in several parts of digital host contents. In generating key, supervised neural networks learn to assign the array of coefficients to teacher signal corresponding to the message to insert. This is one kind of transform-based method to generate public key from private key. In extracting, we use key matrix created by one-way signal processing of adaptive system. Proposal method is tested in still image, and we have empirically obtained the results that the proposal model is functional in implementing more secure and fragile watermarking compared with previous techniques, such as correlation and transform-based asymmetric watermarking. Several experiments are reported to validate the effectiveness of our watermarking method. Second section is about the application of GIS image archiving using digital watermarking technique. Recently, the utilization of GIS (geographical information system) is becoming rapidly pervasive. Consequently, new methodology of archiving and managing images is a pressing problem for GIS users. It is also expected that as the utilization of GIS becomes widely spread, protecting copyright and confidential images will be more important. In this chapter, we propose a three-layer image data format that makes it possible to synthesize two kinds of related images and analysis information in one image data size. To achieve the confidentiality of one hidden image, we apply the private watermarking scheme, where the algorithm is closed to the public. In the proposal model, encoder netlist embedded in the third layer is generated by FOL prover to achieve more secure and less information to decode it, compared with one operation of another block cipher such as RSA. Proposal system users can process two images without the cost of maintaining key and decoding operation.


2018 ◽  
Vol 4 (3) ◽  
pp. 5
Author(s):  
Garima Bhargava ◽  
Arun Jhapate

Digital watermarking was introduced as a result of rapid advancement of networked multimedia systems. It had been developed to enforce copyright technologies for cover of copyright possession. This technology is first used for still images however recently they need been developed for different multimedia objects like audio, video etc. Watermarking, that belong to the information hiding field, has seen plenty of research interest. There's a lot of work begin conducted in numerous branches in this field. The image watermarking techniques might divide on the idea of domain like spatial domain or transform domain or on the basis of wavelets. The copyright protection, capacity, security, strength etc are a number of the necessary factors that are taken in account whereas the watermarking system is intended. This paper aims to produce a detailed survey of all watermarking techniques specially focuses on image watermarking types and its applications in today’s world.


2008 ◽  
pp. 291-304
Author(s):  
M. Chen ◽  
Nasir Memon ◽  
Edward K. Wong

With the proliferation of digital media such as images, audio, and video, robust digital watermarking and data hiding techniques are needed for copyright protection, copy control, annotation, and authentication of document images. While many techniques have been proposed for digital color and grayscale images, not all of them can be directly applied to binary images in general and document images in particular. The difficulty lies in the fact that changing pixel values in a binary image could introduce irregularities that are very visually noticeable. Over the last few years, we have seen a growing but limited number of papers proposing new techniques and ideas for binary image watermarking and data hiding. In this chapter we present an overview and summary of recent developments on this important topic, and discuss important issues such as robustness and data hiding capacity of the different techniques.


Symmetry ◽  
2020 ◽  
Vol 12 (2) ◽  
pp. 266
Author(s):  
Farhana Shirin Chowdhury ◽  
Pranab Kumar Dhar ◽  
Kaushik Deb ◽  
Takeshi Koshiba

Copyright protection of multimedia content is confronted with great challenges such as easy access to the Internet. Digital watermarking is widely applicable technique for copyright protection of multimedia contents. In this paper, a blind symmetric watermarking method in canonical and cepstrum domains based on four-connected t-o’clock scrambling is proposed. Initially, the watermark image is scrambled using the four-connected t-o’clock method to enhance the security. Then, the rotation operation is applied to the host image to extract the region where the watermark bits are embedded. After that, discrete linear canonical transform (DLCT) is applied to the extracted region to obtain the DLCT region. Cepstrum transform (CT) is performed on DLCT region to attain CT region. The CT region is then divided into non-overlapping blocks. The watermark bits are inserted into each block using max-heap and min-heap tree property. Experimental results illustrate that the proposed method shows high robustness against numerous attacks. Moreover, it produces high quality watermarked images and provides high security. Furthermore, it has superior performance to recent methods in terms of imperceptibility, robustness, and security.


1970 ◽  
Vol 3 ◽  
Author(s):  
Pranab Kumar Dhar ◽  
Mohammad Ibrahim Khan ◽  
Sujan Chowdhury

Digital watermarking has drawn extensive attention for copyright protection of multimedia data. This paper proposes a new watermarking system for digital images using efficient systematic linear block codes (SLBC) in discrete cosine transform (DCT) domain. The proposed watermarking system using SLBC generates a code sequence of {0, 1} that provides error correction capabilities and then replaces it with a binary watermark sequence of {-1, 1}. This achieves more robust invisible image watermarks and requires a small storage unit for binary sequence numbers. The generated watermark sequence is then used as an input for our proposed watermarking system which consists of watermark embedding process and watermark detection process. Experimental results indicate that the invisible watermark embedded with the proposed system are very robust against various kinds of attacks such as white Gaussian noise, JPEG compression, median, and mean filtering, by showing similarity values ranging from 0.7 to 0.8. KEY WORDS: Digital Watermarking; Linear Block Code; Copyright Protection. DOI: http://dx.doi.org/10.3329/mist.v3i0.8056


2014 ◽  
Vol 2014 ◽  
pp. 1-8 ◽  
Author(s):  
Amin Banitalebi-Dehkordi ◽  
Mehdi Banitalebi-Dehkordi ◽  
Jamshid Abouei ◽  
Said Nader-Esfahani

Digital watermarking is extensively used in ownership authentication and copyright protection. In this paper, we propose an efficient thresholding scheme to improve the watermark embedding procedure in an image. For the proposed algorithm, watermark casting is performed separately in each block of an image, and embedding in each block continues until a certain structural similarity threshold is reached. Numerical evaluations demonstrate that our scheme improves the imperceptibility of the watermark when the capacity remains fixed, and at the same time, robustness against attacks is assured. The proposed method is applicable to most image watermarking algorithms. We verify this issue on watermarking schemes in discrete cosine transform (DCT), wavelet, and spatial domain.


Author(s):  
Minya Chen ◽  
Nasir Memon ◽  
Edward K. Wong

With the proliferation of digital media such as images, audio, and video, robust digital watermarking and data hiding techniques are needed for copyright protection, copy control, annotation, and authentication of document images. While many techniques have been proposed for digital color and grayscale images, not all of them can be directly applied to binary images in general and document images in particular. The difficulty lies in the fact that changing pixel values in a binary image could introduce irregularities that are very visually noticeable. Over the last few years, we have seen a growing but limited number of papers proposing new techniques and ideas for binary image watermarking and data hiding. In this chapter we present an overview and summary of recent developments on this important topic, and discuss important issues such as robustness and data hiding capacity of the different techniques.


Sign in / Sign up

Export Citation Format

Share Document