scholarly journals A CONTOURLET DOMAIN WATERMARKING ALGORITHM

Author(s):  
N.R. BRINTA ◽  
P.R. BIPIN

This paper presents a blind watermarking algorithm for digital images based on contourlet transform. After Contourlet transform, original image is decomposed into a series of multiscale, local and directional sub images. Each blocks of Arnold transformed watermark image, is embedded into suitable blocks of low pass coefficients of the contourlet transformed original image. Watermark is embedded using module arithmetic and odd-even quantization. The retrieving watermark algorithm is a blind detecting process, and it does not need original image. The experimental results show that the proposed watermarking algorithm is able to resist attacks, such as JPEG compression, noising, cropping and other attacks, and the watermarking is invisible and robust.

Author(s):  
Minh Thanh Tạ

This paper proposes a new watermarking method for digital image by composing the DWT-QIM based embedding with visual secret sharing (VSS) method. Firstly, the watermark image is separated into $n$ shares by using the $k-out-of-n$ method, called $(k,n)$ visual secret sharing. One of share is employed in order to embed into the original image for copyright protection. Another $(n-1)$ of shares are registered with Vietnam Copyright Department. When the dispute happens, the verifier can extract the watermark information from the watermarked image, then, decode it with $(k-1)$ shares chosen from $(n-1)$ shares to achieve the copyright information. Our experimental results show that our proposed method works efficiently on the digital images.


2013 ◽  
Vol 333-335 ◽  
pp. 1110-1113
Author(s):  
Jun Jie Wang ◽  
Qian Mo ◽  
Dong Xia Mei ◽  
Su Li

Based on the method of SVD, a novel watermark algorithm is designed in this paper. Firstly, the SVD is performed on each segment of the original host image; Secondly, the watermark bits are formed by chaotic encrypting;Thirdly, the secret bits are embedded into the S component of the matrix by quantization; Lastly, the inverse SVD transformation is performed on each block and the watermarked image is constructed. The original host image is not required in the secret watermark recovery. Experimental results show that the watermarked image has transparent feature, and the quality of the recovered watermark is satisfying. The algorithm is strongly robust to many attacks, such as JPEG compression attack, Noise Interference and so on..


2005 ◽  
Vol 05 (01) ◽  
pp. 135-148 ◽  
Author(s):  
QIBIN SUN ◽  
SHUIMING YE ◽  
CHING-YUNG LIN ◽  
SHIH-FU CHANG

With the ambient use of digital images and the increasing concern on their integrity and originality, consumers are facing an emergent need of authenticating degraded images despite lossy compression and packet loss. In this paper, we propose a scheme to meet this need by incorporating watermarking solution into traditional cryptographic signature scheme to make the digital signatures robust to these image degradations. Due to the unpredictable degradations, the pre-processing and block shuffling techniques are applied onto the image at the signing end to stabilize the feature extracted at the verification end. The proposed approach is compatible with traditional cryptographic signature scheme except that the original image needs to be watermarked in order to guarantee the robustness of its derived digital signature. We demonstrate the effectiveness of this proposed scheme through practical experimental results.


2019 ◽  
Vol 11 (1) ◽  
pp. 100-113
Author(s):  
Jian Li ◽  
Jinwei Wang ◽  
Shuang Yu ◽  
Xiangyang Luo

This article proposes a novel robust reversible watermarking algorithm. The proposed watermarking scheme is reversible because the original image can be recovered after extracting watermarks from the watermarked image, as long as it is not processed by an attacker. The scheme is robust because watermarks can still be extracted from watermarked images, even if it is undergone some malicious or normal operations like rotation and JPEG compression. It first selects two circles, which are centred at the centroid and the centre of image. Then, statistic quantities of these two circles are employed for robust watermark embedding by altering the pixels' value. The side information generated by above embedding process will be embedded as fragile watermarks at another stage to ensure the recovery of original image. Experimental results verify the high performance of the proposed algorithm in resisting various attacks, including JPEG compression and geometric transformation.


2018 ◽  
Vol 8 (9) ◽  
pp. 1857-1864
Author(s):  
V. Kavitha ◽  
C. Palanisamy ◽  
T. Sureshkumar

A hybrid watermarking technique using wavelet and Shearlet transform is proposed in this paper. The DWT variant Daub4 transform model is applied on the medical image to generate different frequency sub-bands. The HL and LH sub-bands which are resistant to compression attacks are chosen for second level of transformation, a DST variant 'Cone adaptive Shearlet transform' technique is used to calculate the Shearlet coefficients of the selected sub-bands. By using SVD on the Shearlet coefficients, the singular values of watermark image are embedded into the singular values of the host image. The proposed approach is examined using three medical images and a watermark image. The experimental results show that the proposed approach is robust against JPEG compression, Geometric and Noise attacks.


2012 ◽  
Vol 263-266 ◽  
pp. 3100-3103
Author(s):  
Xiao Yuan Yang ◽  
Hai Bin Yang ◽  
Peng Luo

A robust watermarking scheme that used computer-generated holograms as the watermark is in NSCT (NonSampled Contourlet Transform) domain was proposed. To maintain imperceptibility and robustness, a repeated embedding algorithm is adopted to embed the mark hologram into the low-frequency subband of the NSCT host image. Compared with other watermark schemes using digital holograms, the proposed algorithm has the obvious advantage in robustness The experimental results demonstrated that the proposed method had good robustness to resist common attacks such as, rotation, scaling, translation, image flipping, combined attacks, filtering, occlusion, cropping, and JPEG compression.


2012 ◽  
Vol 200 ◽  
pp. 660-665
Author(s):  
Shi Wei Liu ◽  
Zhen Liu ◽  
Qing Bao Wei

In this paper, a wavelet-based digital watermark algorithm for packaging security is proposed. In the algorithm, digital watermark is embedded in the color image CMYK mode, the method based on the discrete wavelet transform (DWT) can point to point semi-adaptive repeated embed digital watermark. Digital watermark that embedded in a color image can be extracted after printing, scanning and pre-processing the color image. The experimental results show that watermark extraction’s effect is acceptable, so the algorithm can achieve the purpose of the anti-counterfeiting for packaging printing. In addition the algorithm is robust enough against various kinds of attacks such as salt&pepper noise addition, JPEG compression, image crop and so on.


Author(s):  
TIEGANG GAO ◽  
QIAOLUN GU

Nowadays, digital watermarking algorithms are widely applied to ownership protection and tampering detection of digital images. In this paper, a new reversible watermarking algorithm based on wavelet lifting scheme is proposed. In the algorithm, the image is firstly divided into some no-overlapping blocks, and then the wavelet lifting scheme where on every block, is performed watermarking data is embedded into the image according to the attribute of the subband of every block. In order to guarantee the security of algorithm, chaotic system is used to shuffle the position of blocks. The interesting point and usefulness of the algorithm lies in the fact that the watermarked image can be exactly restored into the original image, and the watermarking is robust to cropping. The experimental results show the effectiveness of this scheme.


2014 ◽  
Vol 548-549 ◽  
pp. 1076-1079
Author(s):  
Fang Sun ◽  
Peng Li

This article studies image copyright protection algorithm based on watermark. Aimed at the defect that watermark loading algorithm easily leads to the loss of original image information, it proposes a kind of quantization based on wavelet tree structure so that in the watermark extraction process, it can restore the original intact image without original image or watermark information. First, it makes use of level-four wavelet transform to construct tree wavelet coefficient waveband diagram. Then it discretizes and insets watermark information into different waveband nodes of tree structure according to coefficient variation maximum principle. By designing self-adaption threshold value during extracting process, it can restrict some common watermarking loss better, such as smoothing, mean value filtering and gaussian noise. The experiment result proves that this method can make watermark image the visually same as the original image and watermark can still be extracted effectively after preprocessing.


2018 ◽  
Vol 3 (1) ◽  
pp. 75-79
Author(s):  
Harith Raad Hasan

This paper proposes a copyright protection system for digital certificate image using blind watermarking technique by applying discrete wavelet transform algorithm (DWT). The proposed technique utilizes three interrelated watermarks namely, Red watermark (RW), Green-watermark (GW) and Blue-watermark (BW). Firstly, RGB cover and RGB watermark image are divided for three color space R,G,B. Then the R component is chosen for embedding (RW), the B component is selected for embedding the (BW) and the G component is selected for embedding the (GW), R,G and B of the cover image are converted into the transform domain using DWT, and is subsequently decomposed into three levels viz.  LH1, LL2 and LL3 sub-bands. RW, GW and BW are then embedded onto LL3. Experimental results show that the performance of the proposed technique is very encouraging with average PSNR of 44 db, and NCC value of more than 0.99 for extracted watermarks after performing several types of attacks.


Sign in / Sign up

Export Citation Format

Share Document