digital watermarking
Recently Published Documents


TOTAL DOCUMENTS

1991
(FIVE YEARS 236)

H-INDEX

41
(FIVE YEARS 3)

2021 ◽  
pp. 4999-5007
Author(s):  
Muna M. Laftah

      In the last decade, 3D models gained interest in many applications, such as games, the medical field, and manufacture. It is necessary to protect these models from unauthorized copying, distribution, and editing. Digital watermarking is the best way to solve this problem. This paper introduces a robust watermarking method by embedding the watermark in the low-frequency domain, then selecting the coarsest level for embedding the watermark based on the strength factor. The invisibility of the watermark for the proposed algorithm is tested by using different measurements, such as HD and PSNR. The robustness was tested by using different types of attacks; the correlation coefficient was applied for the evaluation of the extracted watermark. From the results, it is clear that the proposed algorithm achieved good invisibility and robustness against the geometrical attack and the added noise.


2021 ◽  
Vol 5 (2) ◽  
pp. 204-213
Author(s):  
Ardhi Fadlika Satria ◽  
◽  
Riza Ibnu Adam ◽  
Carudin Carudin ◽  
◽  
...  

The use of digital platforms has both positive and negative effects. Many criminals who manipulate images for personal gain, so as to harm the copyright holder (ownership) of the image. The purpose of the study was to detect false imagery generated by copy-move, splicing, and retouching techniques. The method used is the Least Significant Bit (LSB) method as a watermarking technique and its detection features. The insertion process is carried out on watermark images into the cover image as the container media. Image owners can authenticate to prove the originality of the image when the extraction process is done, the image manipulation is successfully detected because it is damaged. The test results showed that the digital watermarking technique with the Least Significant-Bit method is able to protect and prove the authenticity of the image. It was concluded that the results of comparison of watermark extraction on the original image and manipulation image saw a very significant difference in terms of visual and calculation with MSE, RMSE, and PSNR parameters.


Author(s):  
Dr. Shivanand Pujar ◽  
◽  
Ms. Kangana W.M ◽  
Ms. Chitrashree Kurtkoti ◽  
Abhinandan P. Mangaonkar ◽  
...  

Digital Image Watermarking plays an important role when it comes to maintaining digital color picture authentication information. The proposed paper consists mainly of a digital watermarking scheme consisting of discrete wavelet transformation and involving the generation of pn sequence number to embed the watermark and also to extract the watermark from the host image. The technique suggested includes both embedding the watermark and removing it from the host file. Both the method of embedding and extraction consists of generating the pn sequence number values using the random numbers. The technique for all three of the RGB signal sources is included. The watermark symbol is located independently within the RGB image's red, green, and blue channels. The suggested technique further reveals the improved mode of digital watermarking of images through fragile watermarking of images and semi-fragile digital watermarking of images.


2021 ◽  
Vol 4 ◽  
Author(s):  
Franziska Boenisch

Machine learning (ML) models are applied in an increasing variety of domains. The availability of large amounts of data and computational resources encourages the development of ever more complex and valuable models. These models are considered the intellectual property of the legitimate parties who have trained them, which makes their protection against stealing, illegitimate redistribution, and unauthorized application an urgent need. Digital watermarking presents a strong mechanism for marking model ownership and, thereby, offers protection against those threats. This work presents a taxonomy identifying and analyzing different classes of watermarking schemes for ML models. It introduces a unified threat model to allow structured reasoning on and comparison of the effectiveness of watermarking methods in different scenarios. Furthermore, it systematizes desired security requirements and attacks against ML model watermarking. Based on that framework, representative literature from the field is surveyed to illustrate the taxonomy. Finally, shortcomings and general limitations of existing approaches are discussed, and an outlook on future research directions is given.


Author(s):  
Osama R.Shahin ◽  
Zeinab M. Abdel Azim ◽  
Ahmed I Taloba

2021 ◽  
Vol 2 (11) ◽  
pp. 2145-2157
Author(s):  
Ondi Asroni ◽  
Dedy Ricardo Serumena

Era zaman digital saat ini, internet telah menjadi sebuah kebutuhan sehari-hari, yang memberikan kemudahan terhadap pengguna untuk melakukan aktivitas transmisi file, namun demikian data tersebut membutuhkan proteksi dari tangan yang tidak bertanggung jawab. Dalam penelitian ini di ajukan sebuah metode digital watermarking dalam melakukan perlindungan terhadap motif batik. Adapun algoritma yang diterapkan yaitu Hybrid Singular Value Decomposition dengan Discrete Wavelete Transform, setelah dilakukan experimen penerapan Hybrid Image Watermarking DWT dengan SVD nilai alpha dapat mempengaruhi tingkat imperceptibility terhadap citra watermarked, karena nilai alpha menunjukkan tingkat ketampakan (visible) watermark pada cover image. Semakin rendah nilai alpha maka tingkat ketampakan watermark semakin berkurang dan tingkat imperceptibility semakin tinggi. Dari pengujian yang dilakukan dengan object motif batik ditemukan nilai alpha terbaik yaitu nilai alpha 0.01, karena mendapatkan nilai PSNR tertinggi dari yang lainnya, sedangkan Berdasarkan pengujian tingkat robustness metode Hybrid Image Watermarking DWT-SVD pada subband LL memiliki tingkat ketahanan yang cukup tinggi terhadap upaya menghilangkan watermark yang menjadi identitas kepemilikan sah terhadap suatu citra digital selama citra watermarked tidak direkayasa dengan serangan noise.


2021 ◽  
Vol 11 (22) ◽  
pp. 10928
Author(s):  
David Megías ◽  
Wojciech Mazurczyk ◽  
Minoru Kuribayashi

Data hiding techniques [...]


Author(s):  
Nasr Eddine Touati ◽  
Abdelmounaim Moulay Lakhdar

<p>In the modern time interacting with digital world become standard life activity, human need a way to protect properties as individuals or corporals, and we do that by embedding a digital mark to the target, and this technique call digital watermarking. But there still is a chance to manipulate or even remove this marks we embed for protection with various attacks like adding noises, compression-decompression or bits manipulations, and that why companions, individuals, laboratories are still developing new methods to embed this marks and make them more robust and more hard to detect for others. There are so many methods for digital watermarking, so we chose the least significant bits watermarking (LSB-watermarking) to provide an invisible digital watermarking, and on top of that we proceed with the blind LSB-watermarking method so that we don't get bind to the original image, and for our attack we chose compression joint photographic experts group (JPEG) compression because it’s the most used method for image and videos compression along with singular value decomposition (SVD) to make our mark as robust as possible. And the results we gain from our method are promising and it did give as high quality digital watermarking.</p>


2021 ◽  
Vol 2083 (4) ◽  
pp. 042075
Author(s):  
Miao Shi

Abstract This paper introduces the concept of multimedia digital watermarking and summarizes the current technology status. This paper summarizes the research status and basic principle of digital watermarking. The advantages of digital watermarking algorithm based on wavelet transform are analyzed. The proposed algorithm combines Arnold scrambling method and DWT transform multi-resolution characteristics, and adopts linear and different embedding strength methods. Effectively improve the security of the watermark. According to the classification results, different intensity watermarking components are embedded into the DCT low frequency coefficients of different image blocks. Experimental results show that this algorithm has strong masking and robustness, and the watermarking realized by using the proposed algorithm has good robustness against common image processing and noise interference.


Sign in / Sign up

Export Citation Format

Share Document