watermark embedding
Recently Published Documents


TOTAL DOCUMENTS

266
(FIVE YEARS 57)

H-INDEX

16
(FIVE YEARS 3)

Symmetry ◽  
2021 ◽  
Vol 13 (11) ◽  
pp. 2191
Author(s):  
Chia-Chen Lin ◽  
Thai-Son Nguyen ◽  
Chin-Chen Chang

In 2002, Agrawal and Kiernan defined six basic requirements, including preventing illegal watermark embedding and authentication, reversibility, robustness, and others, which must be satisfied when a reversible watermark is designed for relational databases. To meet these requirements, in this paper, a lossless watermarking scheme for a categorical relational database called LRW-CRDB (lossless robust watermarking for categorical relational databases) is proposed. In our LRW-CRDB scheme, the database owner needs to generate two secret embedding keys, K1 and K2, in advance. Then, two reference sets are generated based on two different secret embedding keys and a symmetry-based data hiding strategy, and then these are used for the watermark embedding phases. Experimental results confirmed that our LRW-CRDB scheme successfully detects 100% of hidden watermarks, even when more than 95% of the watermarked relational database has been deleted. In other words, the robustness of our proposed LRW-CRDB scheme outperforms other existing schemes under a variety of possible attacks, such as alteration, sorting, deletion, and mix-match attacks.


Author(s):  
Roop Singh ◽  
Himanshu Mittal ◽  
Raju Pal

AbstractVideo piracy is a challenging issue in the modern world. Approximately $$90\%$$ 90 % of newly released films were illegally distributed around the world via the Internet. To overcome this issue, video watermarking is an effective process that integrates a logo in video frames as a watermark. Therefore, this paper presents an efficient lossless video-watermarking scheme based on optimal keyframe selection using an intelligent gravitational search algorithm in linear wavelet transform. This technique obtains color motion and motionless frames from the cover video by the histogram difference method. One-level linear wavelet transform is performed on the chrominance channel of motion frames and a low-frequency sub-band LL opts for watermark embedding. The performance of the proposed technique has been evaluated against 12 video processing attacks in terms of imperceptibility and robustness. Experiments demonstrate that the proposed technique outperforms five state-of-the-art schemes on the considered attacks.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Jinhua Liu ◽  
Jiawen Huang ◽  
Yuanyuan Huang

We have proposed an image adaptive watermarking method by using contourlet transform. Firstly, we have selected high-energy image blocks as the watermark embedding space through segmenting the original image into nonoverlapping blocks and designed a watermark embedded strength factor by taking advantage of the human visual saliency model. To achieve dynamic adjustability of the multiplicative watermark embedding parameter, the relationship between watermark embedded strength factor and watermarked image quality is developed through experiments with the peak signal-to-noise ratio (PSNR) and structural similarity index measure (SSIM), respectively. Secondly, to detect the watermark information, the generalized Gaussian distribution (GGD) has been utilized to model the contourlet coefficients. Furthermore, positions of the blocks selected, watermark embedding factor, and watermark size have been used as side information for watermark decoding. Finally, several experiments have been conducted on eight images, and the results prove the effectiveness of the proposed watermarking approach. Concretely, our watermarking method has good imperceptibility and strong robustness when against Gaussian noise, JPEG compression, scaling, rotation, median filtering, and Gaussian filtering attack.


Sensors ◽  
2021 ◽  
Vol 21 (19) ◽  
pp. 6554
Author(s):  
Li Li ◽  
Rui Bai ◽  
Shanqing Zhang ◽  
Chin-Chen Chang ◽  
Mengtao Shi

This paper proposes a screen-shooting resilient watermarking scheme via learned invariant keypoints and QT; that is, if the watermarked image is displayed on the screen and captured by a camera, the watermark can be still extracted from the photo. A screen-shooting resilient watermarking algorithm should meet the following two basic requirements: robust keypoints and a robust watermark algorithm. In our case, we embedded watermarks by combining the feature region filtering model to SuperPoint (FRFS) neural networks, quaternion discrete Fourier transform (QDFT), and tensor decomposition (TD). First we applied FRFS to locate the embedding feature regions which are decided by the keypoints that survive screen-shooting. Second, we structured watermark embedding regions centered at keypoints. Third, the watermarks were embedded by the QDFT and TD (QT) algorithm, which is robust for capturing process attacks. In a partial shooting scenario, the watermark is repeatedly embedded into different regions in an image to enhance robustness. Finally, we extracted the watermarks from at least one region at the extraction stage. The experimental results showed that the proposed scheme is very robust for camera shooting (including partial shooting) different shooting scenarios, and special attacks. Moreover, the efficient mechanism of screen-shooting resilient watermarking could have propietary protection and leak tracing applications.


2021 ◽  
Vol 56 (4) ◽  
pp. 376-384
Author(s):  
Faten H. Mohammed Sediq Al-Kadei

With the widespread usage of the Internet, security takes precedence above anything else when transmitting data. This research proposed a hybrid encoding approach with watermark embedding that provides excellent security. Our novel strategy is based on cryptography, which allows it to recognize higher secrecy and efficiency. In this research, a hybrid method is used to support visual watermarking and cryptography to embed vital data. Our effort aims to improve the security of hidden facts embedded in the cover picture. The embedding and encryption of the watermark image into the cover image document were performed in two steps. To begin, two keys and an XOR bit operation were used to generate a large number of distinct keys for encryption. Second, a modified approach of the least significant bit (LSB) technique was adopted to hide a high-resolution watermark picture in the cover picture. The suggested second stage involved encrypting the cover image using the asymmetric key cryptography method (RSA), which provides additional secrecy during picture transmission. The original picture, the watermark photo, can be recovered and decoded using the permitted techniques. As a result, encoding and watermarking may be combined, giving the term "joint encoding and watermarking" legitimacy. Peak Signal to Noise Ratio (PSNR) and relationship aspects are greater with this method. For the implementation of hiding and encoding for the watermark and encoding the digital cover picture, MATLAB-GUI software was utilized. Experimental results demonstrated a good performance with a good correlation for all encrypted images and very high PSNR of the Stego images.


2021 ◽  
Author(s):  
Praveen Kumar Mannepalli ◽  
Vineet Richhariya ◽  
Susheel Kumar Gupta ◽  
Piyush Kumar Shukla ◽  
Pushan Kumar Dutta

Abstract Image protection is essential part of the scientific community today. The invisible watermark is widely being used in past to secure the medical imaging data from copyright protection. In this paper novel hybrid combination of the invisible image watermarking and the Blockchain based encryption is proposed to design. The watermarking is implemented using edge detection (ED) of discrete wavelet transform (DWT) coefficient. The medical image is decomposed using L level DWT transform to generate multi-resolution coefficients. The edge detection is applied to HH wavelet band to generate the edge coefficients. To improve robustness difference of dilation and edge coefficient are used for watermark embedding. The watermark image is encrypted using Blockchain based hash algorithm for medical images. Then at the decoding end first decryption is achieved and then image is reconstructed. The results are sequentially presented for both stages. The PSNR performance is compared with additional level of security.


2021 ◽  
Vol 6 (2) ◽  
Author(s):  
Sanket Kumar Srivastava ◽  
Prabha Kant Dwivedi

Local binary patterns are best known because of their robust texture-defining capacities and digital watermarking used to prove multimedia content copyright. This work presents an overview of the binary watermark in the image blocks by changing the pixels conveyed by the LBP pattern of the neighborhood. However, different photo blocks can have the same LBP pattern, which in the watermark process can lead to incorrect detection. In other words, without changing your watermark message, one can change the host image deliberately. Moreover, before watermark embedding, there is no encryption procedure, which leads to another potential security problem. In this paper, we examine the identical process of LBP synthesis or reverse LBP and its suitability for the digital watermarking image. The process of LBP synthesis varies by pixel values so that the LBP from these pixels is the required synthesizable value. Due to the LBP synthesis character, the watermark needs to be integrated with only a few pixels of the given block. The results show that rotational, JPEG compression, and scalable attacks are robust with the technique. This LBP synthesis could also be used to justify ownership using watermark sensor data.


Author(s):  
Basna Mohammed Salih Hasan ◽  
Siddeeq Y. Ameen ◽  
Omer Mohammed Salih Hasan

Digital image authentication techniques have recently gained a lot of attention due to their importance to a large number of military and medical applications, banks, and institutions, which require a high level of security. Generally, digital images are transmitted over insecure media, such as the Internet and computer networks of various kinds. The Internet has become one of the basic pillars of life and a solution to many of the problems left by the coronavirus. As a result, images must be protected from attempts to alter their content that might affect important decision-making. An image authentication (IA) system is a solution to this difficult problem. In the previous literature, several methods have been proposed to protect the authenticity of an image. Digital image watermark is a strategy to ensure the reliability, resilience, intellectual property, and validity of multimedia documents. Digital media, such as images, audio, and video, can hide content. Watermarking of a digital image is a mechanism by which the watermark is embedded in multimedia and the image of the watermark is retrieved or identified in a multimedia entity. This paper reviews IA techniques, watermark embedding techniques, tamper detection methods and discusses the performance of the techniques, the pros and cons of each technique, and the proposed methods for improving the performance of watermark techniques.


Sign in / Sign up

Export Citation Format

Share Document