Researches on Text Image Watermarking Scheme Based on the Structure of Character Glyph

2015 ◽  
Vol 731 ◽  
pp. 163-168 ◽  
Author(s):  
Yu Xin Liu ◽  
Wei Guo ◽  
Wen Fa Qi

For the poor robustness of current text watermarking schemes, this paper proposed a text watermarking scheme based on the structure of Chinese character glyph. In this method, the different glyphs of character with same semantic is constructed by modifying the connections of Chinese character strokes located on the junction point of skeleton curve, which represents the different digital watermarking information bit strings. Extensive experimental results show that the proposed scheme is effective to resist print-and-scan, copy, photograph attacks etc. It can achieve the purpose of hiding information in paper documents and can be used for information tracking.

2012 ◽  
Vol 546-547 ◽  
pp. 410-415
Author(s):  
Chun Ge Tang ◽  
Tie Sheng Fan ◽  
Lei Liu ◽  
Zhi Hui Li

A new blind digital watermarking algorithm based on the chain code is proposed. The chain code is obtained by the characteristics of the original image -the edge contour. The feather can reflect the overall correlation of the vector image, and chain code expression can significantly reduce the boundary representation of the amount of data required. For the watermarking embedding, the original vector image is divided into sub-block images, and two bits of the watermarking information are embedded into sub-block images repeatedly by quantization. For watermarking extracting, the majority decision method is employed to determine the size of the extracted watermark. Experimental results show that the image quality is not significantly lowered after watermarking. The algorithm can resist the basic conventional attacks and has good robustness on the shear attacks.


Author(s):  
Alessandro Piva ◽  
Roberto Caldelli ◽  
Alessia De Rosa ◽  
Mauro Barni ◽  
Vito Cappellini

The need to safeguard the property rights of multimedia content from unauthorized copying and the possibility to determine the true owners of the asset can be faced by resorting to efficient digital watermarking systems. This chapter presents a mathematical formulation to define a digital watermarking system and describes the general requirements to be satisfied, with more emphasis given to the aspects of security, robustness, and imperceptibility. After this general discussion, the two main classes of digital watermarking schemes, namely the spread-spectrum watermarking and the side-informed watermarking are explained by highlighting their main advantages and drawbacks. This analysis is completed by the description of a practical implementation of a digital image watermarking scheme. Finally, the use of watermarking systems in the framework of a DRM is deeply analyzed.


2005 ◽  
Vol 05 (01) ◽  
pp. 67-87 ◽  
Author(s):  
HAIPING LU ◽  
YUN Q. SHI ◽  
ALEX C. KOT ◽  
LIHUI CHEN

Digital watermarking has been proposed for the protection of digital medias. This paper presents two watermarking algorithms for binary images. Both algorithms involve a blurring preprocessing and a biased binarization. After the blurring, the first algorithm embeds a watermark by modifying the DC components of the Discrete Cosine Transform (DCT), followed by a biased binarization, and the second one embeds a watermark by directly biasing the binarization threshold of the blurred image, controlled by a loop. Experimental results show the imperceptibility and robustness aspects of both algorithms.


Author(s):  
Xin Zhong ◽  
Frank Y. Shih

In this paper, we present a robust multibit image watermarking scheme to undertake the common image-processing attacks as well as affine distortions. This scheme combines contrast modulation and effective synchronization for large payload and high robustness. We analyze the robustness, payload, and the lower bound of fidelity. Regarding watermark resynchronization under affine distortions, we develop a self-referencing rectification method to detect the distortion parameters for reconstruction by the center of mass in affine covariant regions. The effectiveness and advantages of the proposed scheme are confirmed by experimental results, which show the superior performance as comparing against several state-of-the-art watermarking methods.


2013 ◽  
Vol 278-280 ◽  
pp. 1366-1373 ◽  
Author(s):  
Zi Teng ◽  
Xiu Feng Qiu ◽  
Jian Wei Liu

The copyright protection of multimedia information is more and more important in the digital age, digital watermarking is a solution to address the topic. This paper proposes a new robust image watermarking scheme based on discrete ridgelet transform (DRT) and discrete wavelet transform (DWT). The scheme respectively embeds a copy of color image watermark into DWT domain and DRT domain, and uses a conception of semi-watermark. Experiment results demonstrate that the watermark can resist various attacks such as adding Gaussian or Union Distribution Noise, JPEG compression, brightness adjustment, contrast adjustment, altering color balance, lens blur, zooming in or out, cropping and some combined attacks etc.


2013 ◽  
Vol 347-350 ◽  
pp. 2214-2217
Author(s):  
Qing Song Xu

With the rapid development of the network and the multimedia technical , how to protect the security of the multimedia informations becomes the popular topic on studies. As a new technique used to protect the copyright of digital productions , the digital watermark technique has drawn extensive attention . A digital watermarking algorithm based on discrete wavelet transform (DWT) was presented according to human visual properties in the paper . Then some attack analyses were given. Experimental results show that the watermarking scheme proposed in this paper is invisible and robust to cropping, and also has good robustness to compression, filtering, and noise adding.


Author(s):  
Dhaya R.

In recent years, digital watermarking has improved the accuracy and resistance of watermarked images against many assaults, such as various noises and random dosage characteristics. Because, based on the most recent assault, all existing watermarking research techniques have an acceptable level of resistance. The deep learning approach is one of the most remarkable methods for guaranteeing maximal resistance in the watermarking system's digital image processing. In the digital watermarking technique, a smaller amount of calculation time with high robustness has recently become a difficult challenge. In this research study, the light weight convolution neural network (LW-CNN) technique is introduced and implemented for the digital watermarking scheme, which has more resilience than any other standard approaches. Because of the LW-CNN framework's feature selection, the calculation time has been reduced. Furthermore, we have demonstrated the robustness of two distinct assaults, collusion and geometric type. This research work has reduced the calculation time and made the system more resistant to current assaults.


Author(s):  
Ekta Walia ◽  
Shailja Sharma ◽  
Anu Suneja

Digital Watermarking allows an individual to add some hidden copyright notices or other verification messages to digital media, where message is a group of bits describing the information pertaining to the signal or its author. For this purpose, two techniques viz. global watermarking and local watermarking can be used. In this paper, the performance of two feature based global and local watermarking techniques using Zernike Moments(ZMs) have been analyzed by evaluating their robustness against geometric, photometric and other signal processing attacks including rotation, cropping and noise. Experimental results have been provided in order to compare ZMs based global and local watermarking techniques for different types of attacks. Recommendations have been made based on the comparison of these techniques with other existing works.


2018 ◽  
Vol 5 (4) ◽  
pp. 61-73
Author(s):  
Musheer Ahmad ◽  
Hamed D. AlSharari

In the recent past, a new statistically efficient digital image watermarking scheme based on chaotic map was proposed. The authors of this watermarking scheme claimed under study that their scheme is efficient, secure, and highly robust against various attacks. However, the security analysis of the scheme unveils that it has serious inherent flaws. In this article, the shortcomings of the proposed watermarking scheme and cryptanalysis are presented to demonstrate that the scheme is not secure against the proposed attacks. Specifically, with the chosen host image and chosen watermarks, we can successfully recover the watermark from received watermarked image without having any knowledge of the secret key. The simulation analysis of the proposed cryptanalysis is provided to exemplify the proposed attack and lack of security of the anticipated watermarking scheme. In addition, an improved version is proposed to enhance the security performance of the watermarking scheme against possible attacks. The improved scheme tends to hold against attacks and statistical efficiency.


2011 ◽  
Vol 3 (4) ◽  
pp. 42-53 ◽  
Author(s):  
Chun-Ning Yang ◽  
Zhe-Ming Lu

This paper presents a novel image watermarking scheme utilizing Block Truncation Coding (BTC). This scheme uses BTC to guide the watermark embedding and extraction processes. During the embedding process, the original cover image is first partitioned into non-overlapping 4×4 blocks. Then, BTC is performed on each block to obtain its BTC bitplane, and the number of ‘1’s in the bitplane is counted. If the watermark bit to be embedded is ‘1’ and the number of ‘1’s is odd, or the watermark bit to be embedded is ‘0’ and the number of ‘1’s is even, then no change is made. Otherwise, by changing at most three pixels in the original image block, the number of ‘1’s (or ‘0’s) in the renewed bitplane are forced to be odd for the watermark bit ‘1’ or to be even for the watermark bit ‘0’. During the extraction process, BTC is first performed on each block to obtain its bitplane. If the number of ‘1’s in the bitplane is odd, then the embedded watermark bit is ‘1’. Otherwise, the embedded watermark bit is ‘0’. The experimental results show that the proposed watermarking method is semi-fragile except for the changes in brightness and contrast; therefore, the proposed method can be used for image authentication.


Sign in / Sign up

Export Citation Format

Share Document