reversible digital watermarking
Recently Published Documents


TOTAL DOCUMENTS

12
(FIVE YEARS 2)

H-INDEX

4
(FIVE YEARS 0)

2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Atta-ur-Rahman ◽  
Kiran Sultan ◽  
Nahier Aldhafferi ◽  
Abdullah Alqahtani ◽  
Maqsood Mahmud

A novel reversible digital watermarking technique for medical images to achieve high level of secrecy, tamper detection, and blind recovery of the original image is proposed. The technique selects some of the pixels from the host image using chaotic key for embedding a chaotically generated watermark. The rest of the pixels are converted to residues by using the Residue Number System (RNS). The chaotically selected pixels are represented by the polynomial. A primitive polynomial of degree four is chosen that divides the message polynomial and consequently the remainder is obtained. The obtained remainder is XORed with the watermark and appended along with the message. The decoder receives the appended message and divides it by the same primitive polynomial and calculates the remainder. The authenticity of watermark is done based on the remainder that is valid, if it is zero and invalid otherwise. On the other hand, residue is divided with a primitive polynomial of degree 3 and the obtained remainder is appended with residue. The secrecy of proposed system is considerably high. It will be almost impossible for the intruder to find out which pixels are watermarked and which are just residue. Moreover, the proposed system also ensures high security due to four keys used in chaotic map. Effectiveness of the scheme is validated through MATLAB simulations and comparison with a similar technique.


2015 ◽  
Vol 738-739 ◽  
pp. 674-677
Author(s):  
Li Jun Fan

Due to the problem that the many digital images can be modified more and more easily, watermarking algorithms are proposed. There are many types of digital watermarking algorithms, such as robust digital watermarking algorithms, watermarking schemes for authentication, and reversible digital watermarking algorithms. However, there are some special images, such as the digital medical images for remote treatment, the military images for tracking object, and the remote sensing images, and they are so sensitive to any modification that we should authenticate the copyright by special technique. And this technique is zero-bit watermarking algorithms. In this paper, about zero-bit watermarking algorithms are surveyed. The basic procedures of these classical algorithms are analyzed, and some suggestion about the zero-bit algorithms is given.


2013 ◽  
Vol 32 (4) ◽  
pp. 971-975
Author(s):  
Li-zong LI ◽  
Qiao-lun GU ◽  
Tie-gang GAO

2013 ◽  
Vol 13 (3) ◽  
pp. 2099-2107 ◽  
Author(s):  
Xiaohong Deng ◽  
Zhigang Chen ◽  
Feng Zeng ◽  
Yaoping Zhang ◽  
Yimin Mao

Sign in / Sign up

Export Citation Format

Share Document