A Review on Watermarking using Local Binary Pattern

2021 ◽  
Vol 6 (2) ◽  
Author(s):  
Sanket Kumar Srivastava ◽  
Prabha Kant Dwivedi

Local binary patterns are best known because of their robust texture-defining capacities and digital watermarking used to prove multimedia content copyright. This work presents an overview of the binary watermark in the image blocks by changing the pixels conveyed by the LBP pattern of the neighborhood. However, different photo blocks can have the same LBP pattern, which in the watermark process can lead to incorrect detection. In other words, without changing your watermark message, one can change the host image deliberately. Moreover, before watermark embedding, there is no encryption procedure, which leads to another potential security problem. In this paper, we examine the identical process of LBP synthesis or reverse LBP and its suitability for the digital watermarking image. The process of LBP synthesis varies by pixel values so that the LBP from these pixels is the required synthesizable value. Due to the LBP synthesis character, the watermark needs to be integrated with only a few pixels of the given block. The results show that rotational, JPEG compression, and scalable attacks are robust with the technique. This LBP synthesis could also be used to justify ownership using watermark sensor data.

2013 ◽  
Vol 401-403 ◽  
pp. 1462-1465
Author(s):  
Yu Hong Chang

To improve the robustness of watermarking algorithms, this paper proposes a robust digital watermarking algorithm based on combination of fractal and wavelet. By key the algorithm transfers watermark information into self-similar fractal images, discretes Haar wavelet to host image, and embeds two fractal watermark image after fractal into Haar wavelet sub-band. Simulation results show that the algorithm has good robustness to image distortion as noise, JPEG compression, shear, filtering, etc.


2019 ◽  
Vol 8 (3) ◽  
pp. 7284-7288

Digital watermarking has emerged as a potential solution to copyright-related issues of digital data. A novel, highly secure robust digital watermarking method using DWT-SVD is presented in this paper. Instead of using the conventional watermark embedding process where the watermark gets embedded over the entire host image, the coefficients for embedding the watermark inside the host image has been identified in this proposed method. Such selection of pixels used for insertion of watermark makes this algorithm highly secure, robust, and imperceptible. The experimental results demonstrate the efficiency of the proposed method in aspects of high robustness and good imperceptibility


2011 ◽  
Vol 121-126 ◽  
pp. 1873-1878
Author(s):  
Hai Peng Chen ◽  
Xuan Jing Shen ◽  
Ying Da Lv

To accurately determine whether an image has been tampered, a robust digital watermarking algorithm based on the frequency domain was proposed. Watermarks will be embedded in the middle frequency domain of the coefficient matrix, and combining with the JPEG luminance quantization table, better balance will be achieved between the watermark transparency and the robustness of the algorithm. Moreover, before being embedded in the host image, the watermark information is encoded using the chaotic sequence, to improve the security of the algorithm. Experiment results showed that, the watermarked image generated by the proposed algorithm has higher quality. When suffering JPEG compression, cropping and other tampering attacks, the image authenticity can be determined by the similarity between the extracted watermarking and the original watermarking.


2011 ◽  
Vol 1 ◽  
pp. 188-192
Author(s):  
Wen Juan He ◽  
Jing Liu ◽  
Yuan Yi Hu ◽  
Jing Yi Wang

The paper presents an imperceptible and robust digital watermarking algorithm using a combination of the DWT-DCT , which improves the robustness via using new embedding strategy. Apply 4-level DWT to the host image. Then, DCT transform of each directional middle frequencies DWT subband is computed; A binary watermarked logo is coded by Run-Length Code(RLC);The watermark bits are embedded in the coefficients of the DCT block based on the energy of each corresponding to coefficient in the highest level selected using the value of RLC. Performance evaluation show that the proposed scheme is invisible and robust against common image manipulations like JPEG compression, noise adding, sharpening, filtering.


2014 ◽  
Vol 14 (1) ◽  
pp. 5329-5336 ◽  
Author(s):  
Vakulabharanam Vijaya Kumar ◽  
Vishnu Murthy. G ◽  
A. Obulesu

One of the recently invented theoretically simple and efficient operators that is playing a significant role in image processing, pattern recognition and other domains is the Local Binary Pattern (LBP). LBP measures the local texture features on a given neighbourhood efficiently. The Uniform LBP (ULBP) that is derived on LBP is treated as the fundamental unit of the textures. There 58 ULBPs out of 256 LBPs on a 3 x3 neighbourhood. Further the textures on average contain 75% to 90% of the patterns as ULBP only. One disadvantage is representing all 58 ULBS. To say whether a given LBP is uniform or not one should march the given LBP with 58 Patterns. Very few research scholars derived grammar to represent patterns that arises from 2-D images. The present paper addresses the above problem by generating a simple array grammar that represents all ULBP on a 3 x 3 neighbourhood or with 8 neighbours.The present paper tests the proposed Array Grammar model of ULBP (AG-ULBP) with various LBP patterns to prove its accuracy.


2020 ◽  
Vol 6 (3) ◽  
pp. 92-99
Author(s):  
A. Zhuvikin

One of the most promising application of the digital watermarking is the selective image authentication (SIA) systems. In order to implement such a system one requires an embedding algorithm with an appropriate capacity. In addition, an embedding method is to be robust for the class of non-malicious manipulations which the SIA system is designed for. We propose the new method which has a significant embedding capacity while still being tolerant to JPEG compression, brightness and contrast adjustments. This was possible due to the extension of the well-known discrete wavelet transform embedding technique. We propose two-step embedding scheme and the use of image histogram equalisation and recovering operations. The experiment results show acceptable tolerance to JPEG compression, brightness and contrast adjustments with good visual quality in terms of PSNR just after embedding.


Author(s):  
Dan Yu ◽  
Farook Sattar

This chapter focuses on the issue of transaction tracking in multimedia distribution applications through digital watermarking terminology. The existing watermarking schemes are summarized and their assumptions as well as the limitations for tracking are analyzed. In particular, an Independent Component Analysis (ICA)-based watermarking scheme is proposed, which can overcome the problems of the existing watermarking schemes. Multiple watermarking technique is exploited—one watermark to identify the rightful owner of the work and the other one to identify the legal user of a copy of the work. In the absence of original data, watermark, embedding locations and strengths, the ICA-based watermarking scheme is introduced for efficient watermark extraction with some side information. The robustness of the proposed scheme against some common signal-processing attacks as well as the related future work are also presented. Finally, some challenging issues in multimedia transaction tracking through digital watermarking are discussed.


2005 ◽  
pp. 157-172
Author(s):  
Martin Steinbach ◽  
Jana Dittmann

Active fingerprinting combines digital media watermarking and codes for collusion-secure customer identification. This requires specialized strategies for watermark embedding to lessen the thread of attacks like marked media comparison or mixing. We introduce basic technologies for fingerprinting and digital watermarking and possible attacks against active fingerprinting. Based on this, we provide test results, discuss the consequences and suggest an optimized embedding method for audio fingerprinting.


Author(s):  
Brij B. Gupta ◽  
Somya Rajan Sahoo ◽  
Prashant Chugh ◽  
Vijay Iota ◽  
Anupam Shukla

In global internet usage, increasing multimedia message, which includes video, audio, images, and text documents, on the web raised a lot of consequences related to copyright. For copyright protection, authentication purpose and forgery detection digital watermarking is the robust way in social network content protection. In this technique, the privacy information is embedded inside the multimedia content like image and video. The protected content embedded inside multimedia content is called watermark-enabled information. To make more effective the process of watermarking, the content encrypted before embedding to the image. Basically, the digital watermarking embedded process implemented in two different domains called spatial and frequency domain. In spatial domain digital watermarking, the watermark information is embedded in the least significant bit of the original image on the basis of bit plane selected and on the basis of the pixels of image, embedding, and detection is performed.


Author(s):  
Alessandro Piva ◽  
Roberto Caldelli ◽  
Alessia De Rosa ◽  
Mauro Barni ◽  
Vito Cappellini

The need to safeguard the property rights of multimedia content from unauthorized copying and the possibility to determine the true owners of the asset can be faced by resorting to efficient digital watermarking systems. This chapter presents a mathematical formulation to define a digital watermarking system and describes the general requirements to be satisfied, with more emphasis given to the aspects of security, robustness, and imperceptibility. After this general discussion, the two main classes of digital watermarking schemes, namely the spread-spectrum watermarking and the side-informed watermarking are explained by highlighting their main advantages and drawbacks. This analysis is completed by the description of a practical implementation of a digital image watermarking scheme. Finally, the use of watermarking systems in the framework of a DRM is deeply analyzed.


Sign in / Sign up

Export Citation Format

Share Document