Zero Watermarking Method Based on Enhanced Bit-Plane

2014 ◽  
Vol 989-994 ◽  
pp. 1473-1476
Author(s):  
Jie Zhao ◽  
Bin Feng Yang ◽  
Xiao Yun Wu

Traditional watermark embedding introduces inevitably some perceptible quality degradation of the host image. Another problem is the inherent conflict between imperceptibility and robustness. However, the zero-watermarking technique can extract some essential characteristics from the host image and use them for watermark registration and detection. The original image was decomposed into series of multiscale and directional subimages after lifting wavelet transformation (LWT). The high order bit-plane of low-frequency subimage and watermark image are inputs of the cellular neural network (CNN), and the zero-watermarking registration image is the output. To investigate and improve the security and robustness, the original watermark and registration image are scrambled or encrypted. The watermark image can be extracted from the secret image. This algorithm is simple and robust. The proposed method is also simple for hardware realization.

2011 ◽  
Vol 403-408 ◽  
pp. 3054-3058 ◽  
Author(s):  
Yuan Mei Wang ◽  
Tao Li

In the paper a digital watermarking algorithm based on chaotic encryption and wavelet transform is proposed. It uses Arnold transform to encrypt the original watermark image, and then decomposes the original host image to different frequency sub-image, combining with the merits of transform domain watermarking algorithm. The encrypted watermark image is embedded into the low-frequency coefficients of image by wavelet transformation. Experimental results confirm that the algorithm has good robustness.


2014 ◽  
Vol 644-650 ◽  
pp. 4641-4644
Author(s):  
Zhen Xian Lin ◽  
Yuan Sheng Li ◽  
Jian Tao Li

Put forward an improved QIM watermark embedding algorithm. The carrier image is transformed into YCbCr space, lifting wavelet transform the three components, then using the QIM quantization method embeds watermark into high frequency coefficients of Cb and Cr component, and Y component of low frequency coefficients. The experimental results show that embedded watermark which using improved algorithm has good invisibility. Anti attack test results show that after using common attack method attack the image embedded watermark, it can still extract the watermark completely. The anti-attack performance of improved QIM algorithm is much better than texture watermarking algorithm based on DCT.


Authenticity of image and its copyright protection are one of the essential application of watermarking. In this paper, a hybrid technique for watermarking in DWT domain is presented for its application in the field of providing authentication to images. In this work binary image is used as watermark and is embedded in the 'host image'. Before embedding the watermark in the host, the host image is splitted into 8 bit planes using bit plane slicing. Followed that DWT is applied to the least significant bit plane which partitions the respective plane into low frequency (LL subband) and high frequency (HH, HL and LH subbands). The SVD is applied to HH subband of least significant bit plane and watermark is embedded on the singular matrix part of SVD. To analyse the robustness of the scheme proposed in this paper, watermarked image is attacked by different image processing attacks. Original watermark and extracted watermark is compared on the scale of normalized correlation to measure the robustness of the scheme against various attacks.


2011 ◽  
Vol 225-226 ◽  
pp. 614-618
Author(s):  
Yu Ping Hu ◽  
Jun Zhang ◽  
Hua Yin ◽  
Yi Chun Liu ◽  
Ying Hong Liang

This paper studied the image tamper detection and recovery watermarking scheme based on the discrete wavelet transformation(DWT) and the singular value decomposition (SVD).By the property of DWT and SVD , we design two watermarks which are embedded into the high-frequency bands of the DWT domain.One watermark is from the U component of the SVD domain and used for detecting the intentional content modification and indicating the modified location, and another watermark is from the low-frequency of DWT and used for recovering the image. The watermark generation and watermark embedding are disposed in the image itself. The experimental results show that the proposed scheme can resist the mild modifications of digital image and be able to detect and recovery the malicious modifications precisely.


2014 ◽  
Vol 989-994 ◽  
pp. 1469-1472
Author(s):  
Ya Wen Li

The scrambled watermark is embedded in DCT coefficients of low-frequency sub image with the Brightness Component of original color image after lifting wavelet transformation. Before embedding the watermark, the image confusion method is used to eliminate the space correlation of the pixels and improves the security and robustness. The results showed that the algorithm is easy to carry out with the real-time request of video watermarking.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Wenfa Qi ◽  
Yuxin Liu ◽  
Sirui Guo ◽  
Xiang Wang ◽  
Zongming Guo

Aiming at the problem that the robustness, visibility, and transparency of the existing visible watermarking technologies are difficult to achieve a balance, this paper proposes an adaptive embedding method for visible watermarking. Firstly, the salient region of the host image is detected based on superpixel detection. Secondly, the flat region with relatively low complexity is selected as the embedding region in the nonsalient region of the host image. Then, the watermarking strength is adaptively calculated by considering the gray distribution and image texture complexity of the embedding region. Finally, the visible watermark image is adaptively embedded into the host image with slight adjustment by just noticeable difference (JND) coefficient. The experimental results show that our proposed method improves the robustness of visible watermarking technology and greatly reduces the risk of malicious removal of visible watermark image. Meanwhile, a good balance between the visibility and transparency of the visible watermark image is achieved, which has the advantages of high security and ideal visual effect.


2011 ◽  
Vol 55-57 ◽  
pp. 1189-1194 ◽  
Author(s):  
Ji Mei Zhou ◽  
Ze Zhang ◽  
Hai Tao Wang

An auto-adaptive scheme of embedding watermark based on wavelet transformation domain is proposed in this paper. Firstly, the scheme applies wavelet transform to the original image, confirms the ideal embedded location in low-frequency coefficient of wavelet transformation domain by using FCM algorithm integrating with the apperceive characteristics of human visual system and related local characteristics of image. According to quantization rule of wavelet coefficient proposed in this paper, the information of scrambled watermarking is adaptively embedded in corresponding position. The method of finding the embedded location in the process of watermark extracting is same as the method of embedding watermark. Secondly, extract the information of embedded watermark according to the rule of coefficient quantization. Finally, after the process of anti-scrambling and enhancing dimension, the embedded watermark image is obtained. Experimental results show that the proposed scheme has performance of good invisibility and robustness.


2018 ◽  
Vol 16 (07) ◽  
pp. 1850060 ◽  
Author(s):  
Ri-Gui Zhou ◽  
Peng Liu Yang ◽  
Xing Ao Liu ◽  
Hou Ian

Most of the studied quantum encryption algorithms are based on square images. In this paper, based on the improved novel quantum representation of color digital images model (INCQI), a quantum color image watermarking scheme is proposed. First, INCQI improved from NCQI is used to represent the carrier and watermark images with the size [Formula: see text] and [Formula: see text], respectively. Secondly, before embedding, the watermarking needs to be preprocessed. That is, the watermark image with the size of [Formula: see text] with 24-qubits color information is disordered by the fast bit-plane scramble algorithm, and then further expanded to an image with the size [Formula: see text] with 6-qubits pixel information by the nearest-neighbor interpolation method. Finally, the dual embedded algorithm is executed and a key image with 3-qubits information is generated for retrieving the original watermark image. The extraction process of the watermark image is the inverse process of its embedding, including inverse embedding, inverse expand and inverse scrambling operations. To show that our method has a better performance in visual quality and histogram graph, a simulation of different carrier and watermark images are conducted on the classical computer’s MATLAB.


2017 ◽  
Vol 9 (2) ◽  
pp. 1-14
Author(s):  
Fang Sun ◽  
Zhenghui Liu ◽  
Chuanda Qi

The existed content authentication schemes based on digital watermark have some shortcomings. In order to solve the problems, a speech content authentication scheme based on high-capacity watermark embedding is proposed, and the high-capacity embedding method is discussed. Firstly, speech signal is framed and segmented, and the samples of each segment are scrambled. Secondly, DCT is performed on the scrambled signal, and low-frequency coefficients are selected as the watermark embedding domain. Lastly, frame number is mapped to a sequence of integers and embedded into the domain based on the embedding method. Theoretical analysis and experimental evaluation results show that the proposed algorithm is inaudible, robust to desynchronous attacks, enhances the embedding capacity, and improves the security of watermark system.


2011 ◽  
Vol 179-180 ◽  
pp. 103-108
Author(s):  
Sheng Bing Che ◽  
Jin Kai Luo ◽  
Bin Ma

A quasi-blind adaptive video watermarking algorithm in uncompressed video wavelet domain based on human visual system is proposed in this paper. This algorithm established a visual model according to the human visual masking and the characteristics of wavelet coefficients. It did not require the scene segmentation of the video, choosing the video frames which used for embedding watermarking by the key, and embedding different watermarking which processed by Arnold scrambling into different frame, so it is robust to statistical analysis, frame crop and so on. To ensure the spatial synchrony when extracting the watermark information, zero-watermarking method and chaotic system are used to generate the synchronization information. The quantized central limit theorem is applied to adjust the low frequency coefficients, it makes the extracted watermark information keeps invariant when its element value changed in robust region. A new correlation detection method of watermarking information was put forward. Watermark detection does not require original video. It realized the quasi-blind watermark detection.


Sign in / Sign up

Export Citation Format

Share Document