scholarly journals A Hybrid Digital Image Watermarking Scheme Incorporating DWT, DFT, DCT and SVD Transformations

Author(s):  
Justin Varghese ◽  
◽  
T Abdul Razak ◽  
Omer Bin Hussain ◽  
Saudia Subash ◽  
...  

Digital watermarking provides copyright protection and proof of ownership by inserting watermark metadata as owner’s identity in digital documents to prevent authenticity and copyright violations. The paper introduces a new hybrid image watermarking scheme by attaching multiple copies of watermarks in carrier image. The new scheme utilizes the advantages of DWT, DFT, DCT and SVD transformations to offer stable resistance in protecting watermark contents from various external attacks. The proposed scheme uses Haar wavelet, Fourier, Onion Peel Decomposition, DCT, zigzag ordering and SVD transforms to decompose the carrier image in to four levels to maintain imperceptibility in the watermarked images. The algorithm attaches replicas of watermark frequency blocks in all frequency components of host image to provide better robustness against external deprivations in watermarked images. The proposed algorithm also provides the increased probability of extracting at least one undamaged replica of watermark even when other frequencies are damaged by external attacks. The improved experimental results of the proposed scheme in terms of visual analysis and quantitative metrics on different images with different experimental set up demarcate that the proposed watermarking scheme provides stable performance in generating better watermarked images. It is experimentally found that the new scheme produces high quality watermarked images with an average of 7.62% lesser Mean Absolute Error (MAE) and increased Peak Signal to Noise Ratio (PSNR), Mean Structural Similarity Index Measure (MSSIM) and Feature Similarity Index Measure (FSIM) of 5.02 %, 4.37 %, and 2.37 % respectively than the next best algorithms when simulated with 20 sets of watermark and cover images. The watermark images extracted by the proposed algorithm from extremely distorted watermarked images are with better visual and objective values than other methods used in the comparative study. Simulation analysis on 20 sets of watermark and cover images with 30 types of potential attacks reveals that the extracted watermark images through the proposed scheme produces an average of 5.62%, 6.37%, 5.75% improved Pearson Correlation Coefficients (PCC), Number of Changing Pixel Rate (NPCR) and the Unified Averaged Changed Intensity (UACI) values respectively than the next best algorithms used in the comparative study.

Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5540
Author(s):  
Nayeem Hasan ◽  
Md Saiful Islam ◽  
Wenyu Chen ◽  
Muhammad Ashad Kabir ◽  
Saad Al-Ahmadi

This paper proposes an encryption-based image watermarking scheme using a combination of second-level discrete wavelet transform (2DWT) and discrete cosine transform (DCT) with an auto extraction feature. The 2DWT has been selected based on the analysis of the trade-off between imperceptibility of the watermark and embedding capacity at various levels of decomposition. DCT operation is applied to the selected area to gather the image coefficients into a single vector using a zig-zig operation. We have utilized the same random bit sequence as the watermark and seed for the embedding zone coefficient. The quality of the reconstructed image was measured according to bit correction rate, peak signal-to-noise ratio (PSNR), and similarity index. Experimental results demonstrated that the proposed scheme is highly robust under different types of image-processing attacks. Several image attacks, e.g., JPEG compression, filtering, noise addition, cropping, sharpening, and bit-plane removal, were examined on watermarked images, and the results of our proposed method outstripped existing methods, especially in terms of the bit correction ratio (100%), which is a measure of bit restoration. The results were also highly satisfactory in terms of the quality of the reconstructed image, which demonstrated high imperceptibility in terms of peak signal-to-noise ratio (PSNR ≥ 40 dB) and structural similarity (SSIM ≥ 0.9) under different image attacks.


2018 ◽  
Vol 16 (03) ◽  
pp. 1850021 ◽  
Author(s):  
Ri-Gui Zhou ◽  
Wenwen Hu ◽  
Ping Fan ◽  
Gaofeng Luo

In this paper, a quantum color image watermarking scheme is proposed through twice-scrambling of Arnold transformations and steganography of least significant bit (LSB). Both carrier image and watermark images are represented by the novel quantum representation of color digital images model (NCQI). The image sizes for carrier and watermark are assumed to be [Formula: see text] and [Formula: see text], respectively. At first, the watermark is scrambled into a disordered form through image preprocessing technique of exchanging the image pixel position and altering the color information based on Arnold transforms, simultaneously. Then, the scrambled watermark with [Formula: see text] image size and 24-qubit grayscale is further expanded to an image with size [Formula: see text] and 6-qubit grayscale using the nearest-neighbor interpolation method. Finally, the scrambled and expanded watermark is embedded into the carrier by steganography of LSB scheme, and a key image with [Formula: see text] size and 3-qubit information is generated at the meantime, which only can use the key image to retrieve the original watermark. The extraction of watermark is the reverse process of embedding, which is achieved by applying a sequence of operations in the reverse order. Simulation-based experimental results involving different carrier and watermark images (i.e. conventional or non-quantum) are simulated based on the classical computer’s MATLAB 2014b software, which illustrates that the present method has a good performance in terms of three items: visual quality, robustness and steganography capacity.


2015 ◽  
Vol 2015 ◽  
pp. 1-14 ◽  
Author(s):  
Lin Sun ◽  
Jiucheng Xu ◽  
Xingxing Zhang ◽  
Yun Tian

With the development of information security, the traditional encryption algorithm for image has been far from ensuring the security of image in the transmission. This paper presents a new image watermarking scheme based on Arnold Transform (AT) and Fuzzy Smooth Support Vector Machine (FSSVM). First of all, improved AT (IAT) is obtained by adding variables and expanding transformation space, and FSSVM is proposed by introducing fuzzy membership degree. The embedding positions of watermark are obtained from IAT, and the pixel values are embedded in carrier image by quantization embedding rules. Then, the watermark can be embedded in carrier image. In order to realize blind extraction of watermark, FSSVM model is used to find the embedding positions of watermark, and the pixel values are extracted by using quantization extraction rules. Through using improved Arnold inverse transformation for embedding positions, the watermark coordinates can be calculated, and the extraction of watermark is carried out. Compared with other watermarking techniques, the presented scheme can promote the security by adding more secret keys, and the imperceptibility of watermark is improved by introducing quantization rules. The experimental results show that the proposed method outperforms many existing methods against various types of attacks.


2013 ◽  
Vol 5 (1) ◽  
pp. 1-6 ◽  
Author(s):  
Osama Hosam

Digital communication and media sharing have extensively increased in the last couple of years. Research is focused on protecting digital media through copyright protection. The digital media is secured by watermarking. We have developed an image watermarking technique in the frequency domain to hide secure information in the Discrete Cosine Transform (DCT) coefficients of the carrier image. DCT coefficients are modulated by Dither Modulation (DM). We have increased the modulation step to be able to entirely recover the embedded data (watermark) and increase the robustness of our proposed algorithm to affine transforms and geometrical attacks. Our algorithm showed lower complexity and robustness against different attacks.


Stroke ◽  
2021 ◽  
Author(s):  
Girish Bathla ◽  
Yanan Liu ◽  
Honghai Zhang ◽  
Milan Sonka ◽  
Colin Derdeyn

Background and Purpose: We explored the feasibility of automated, arterial input function independent, vendor neutral prediction of core infarct, and penumbral tissue using complete and partial computed tomographic perfusion data sets through neural networks. Methods: Using retrospective computed tomographic perfusion data from 57 patients, split as training/validation (60%/40%), we developed and validated separate 2-dimensional U-net models for cerebral blood flow (CBF) and time to maximum (Tmax) maps calculation to predict core infarct and tissue at risk, respectively. Once trained, the full sets of 28 input images were sequentially reduced to equitemporal 14, 10, and 7 time points. The averaged structural similarity index measure between the model-derived images and ground truth perfusion maps was compared. Volumes for core infarct and Tmax were compared using the Pearson correlation coefficient. Results: Both CBF and Tmax maps derived using 28 and 14 time points had similar structural similarity index measure (0.80–0.81; P >0.05) when compared with ground truth images. The Pearson correlation for the CBF and Tmax volumes derived from the model using 28-tp with ground truth volumes derived from the RAPID software was 0.69 for CBF and 0.74 for Tmax. The predicted maps were fully concordant in terms of laterality to the commercial perfusion maps. The mean Dice scores were 0.54 for the core infarct and 0.63 for the hypoperfusion maps. Conclusion: Artificial intelligence model-derived volumes show good correlation with RAPID-derived volumes for CBF and Tmax. Within the constraints of a small sample size, the perfusion map quality is similar when using 14-tp instead of 28-tp. Our findings provide proof of concept that vendor neutral artificial intelligence models for computed tomographic perfusion processing using complete or partial image data sets appear feasible. The model accuracy could be further optimized using larger data sets.


Author(s):  
Muhammad Asif Khan ◽  
Umar Ajaib Khan ◽  
Asim Ali ◽  
Fawad Hussain ◽  
Wasif Nisar

An exponential growth in multimedia applications has led to fast adoption of digital watermarking phenomena to protect the copyright information and authentication of digital contents. A novel spatial domain symmetric color image robust watermarking scheme based on chaos is presented in this research. The watermark is generated using chaotic logistic map and optimized to improve inherent properties and to achieve robustness. The embedding is performed at 3 LSBs (Least Significant Bits) of all the three color components of the host image. The sensitivity of the chaotic watermark along with redundant embedding approach makes the entire watermarking scheme highly robust, secure and imperceptible. In this paper, various image quality analysis metrics such as homogeneity, contrast, entropy, PSNR (Peak Signal to Noise Ratio), UIQI (Universal Image Quality Index) and SSIM (Structural Similarity Index Measures) are measures to analyze proposed scheme. The proposed technique shows superior results against UIQI. Further, the watermark image with proposed scheme is tested against various image-processing attacks. The robustness of watermarked image against attacks such as cropping, filtering, adding random noises and JPEG compression, rotation, blurring, darken etc. is analyzed. The Proposed scheme shows strong results that are justified in this paper. The proposed scheme is symmetric; therefore, reversible process at extraction entails successful extraction of embedded watermark.


Manuskripta ◽  
2020 ◽  
Vol 10 (1) ◽  
pp. 67
Author(s):  
Novarina Novarina

Abstract: This research is a comparative literary study that uses Malay and Javanese versions of Mahabarata text sources. The research objects used were the text edition of Pandhawa Gubah (PG) by Sudibjo Z. Hadisutjipto and the text of Cheritera Pandawa Lima (CPL) by Khalid Hussain. The research method used is descriptive-analysis method. In the comparative study used a comparative literary theory proposed by Endraswara (2011). The results of the text comparison reveal the similarities and differences in the image of Bima figures in the Javanese and Malay versions. The equation as a whole is that both texts contain the same heroic storyline and heroic character, Bima. In addition, Indian influence is still evident in the two texts seen from the nuances of Hinduism that exist in both texts. While the difference is seen in the events that accompany Bima's struggle in achieving his victory. Based on these similarities and differences, it can be seen that the authors attempt to represent the concept of metaphysical interactions vertically and horizontally expressed through PG text. --- Abstrak: Penelitian ini adalah satu kajian sastra bandingan yang menggunakan sumber teks Mahabarata versi Melayu dan Jawa. Objek penelitian yang digunakan adalah edisi teks Pandhawa Gubah (PG) karya Sudibjo Z. Hadisutjipto dan teks Cheritera Pandawa Lima (CPL) karya Khalid Hussain. Metode penelitian yang digunakan adalah metode deskriptif-analisis. Dalam telaah perbandingan digunakan teori sastra bandingan yang dikemukakan Endraswara (2011). Hasil perbandingan teks mengungkapkan adanya persamaan dan perbedaan citra tokoh Bima dalam versi Jawa maupun versi Melayu. Persamaan secara keseluruhan adalah kedua teks tersebut mengandung alur cerita kepahlawanan dan tokoh pahlawan yang sama yaitu Bima. Selain itu, pengaruh India masih tampak dalam kedua teks tersebut dilihat dari nuansa Hinduisme yang ada dalam kedua teks. Sementara perbedaannya tampak pada peristiwa-peristiwa yang menyertai perjuangan Bima dalam mencapai kemenangannya. Berdasarkan persamaan dan perbedaan tersebut tampak adanya upaya penulis untuk merepresentasikan konsep interaksi metafisik secara vertikal dan horizontal yang diungkapkan melalui teks PG.


Sign in / Sign up

Export Citation Format

Share Document