digital watermarks
Recently Published Documents


TOTAL DOCUMENTS

121
(FIVE YEARS 29)

H-INDEX

16
(FIVE YEARS 1)

Author(s):  
С.В. Морковин

В статье рассматривается модифицированный метод внедрения цифровых водяных знаков в видеоданные, заключающийся в дополнении уже известных методов новыми функциями, базирующихся на принципиальных отличиях видеопотока от статичной фотографии. The article discusses a modified method of introducing digital watermarks into video data, which consists in supplementing the already known methods with new functions based on the fundamental differences between the video stream and static photography.


2021 ◽  
Vol 6 (2 (114)) ◽  
pp. 103-116
Author(s):  
Vitalii Martovytskyi ◽  
Igor Ruban ◽  
Nataliia Bolohova ◽  
Оleksandr Sievierinov ◽  
Oleg Zhurylo ◽  
...  

Active attacks and natural impacts can lead to two types of image-container distortions: noise-like and geometric. There are also image processing operations, e.g. scaling, rotation, truncation, pixel permutation which are much more detrimental to digital watermarks (DWM). While ensuring resistance to removal and geometric attacks is a more or less resolved problem, the provision of resistance to local image changes and partial image deletion is still poorly understood. The methods discussed in this paper are aimed at ensuring resistance to attacks resulting in partial image loss or local changes in the image. This study's objective is to develop methods for generating a distortion-resistant digital watermark using the chaos theory. This will improve the resistance of methods of embedding the digital watermark to a particular class of attacks which in turn will allow developers of DWM embedding methods to focus on ensuring the method resistance to other types of attacks. An experimental study of proposed methods was conducted. Histograms of DWMs have shown that the proposed methods provide for the generation of DWM of a random obscure form. However, the method based on a combination of Arnold’s cat maps and Henon maps has noticeable peaks unlike the method based on shuffling the pixels and their bits only with Arnold’s cat maps. This suggests that the method based only on Arnold’s cat maps is more chaotic. This is also evidenced by the value of the coefficient of correlation between adjacent pixels close to zero (0.0109) for color DWMs and 0.030 for black and white images.


2021 ◽  
Vol 2096 (1) ◽  
pp. 012209
Author(s):  
L G Statsenko ◽  
U A Durneva ◽  
N A Klescheva ◽  
M V Bernavskaya

Abstract The paper considers two main applications of stegosystems: as a digital watermark, for copyright protection, and as a method for secretly transmitting information through an acoustic environment. A stegosystem is studied theoretically and experimentally when information is transmitted over different distances in an acoustic medium in the presence of extraneous noise. Nowadays great attention is paid to the protection of intellectual property. Illegal distribution of media content, including copies of musical compositions, is widespread and reaches unprecedented proportions. Protecting audio files from unauthorized copying and using becomes increasingly important. Digital watermarks are a promising method for solving this problem. The purpose of the article is to develop an effective method for protecting audio files from illegal use by embedding a digital watermark (DW). After detection the illegal distribution of their product, the copyright holder will be able to track the presence of the digital watermark and apply to the court for damages.


2021 ◽  
Vol 5 (3) ◽  
pp. 112-118
Author(s):  
Igor Ruban ◽  
Nataliia Bolohova ◽  
Vitalii Martovytskyi ◽  
Roman Yaroshevych

In recent years, we have seen a significant increase in traffic moving across various networks and channels. The development of technology and global network leads to an increase in the amount of multimedia traffic. To authenticate and avoid abuse, data should be protected with watermarks. This paper discusses various robust and invisible watermarking methods in the spatial domain and the transform domain. The basic concepts of digital watermarks, important characteristics and areas of application of watermarks are considered in detail. The paper also presents the most important criteria for assessing the digital watermark effectiveness. Based on the analysis of the current state of the digital watermarking methods, robustness, imperceptibility, security and payload have been determined as the main factors in most scientific works. Moreover, researchers use different methods to improve / balance these factors to create an effective watermarking system. Our research identified the main factors and new techniques used in modern research. And the assessment of watermark method effectiveness was proposed.


Author(s):  
Kako Takahashi ◽  
Takeru Miyazaki ◽  
Shunsuke Araki ◽  
Satoshi Uehara ◽  
Yasuyuki Nogami

2021 ◽  
Vol 3 (2 (111)) ◽  
pp. 45-56
Author(s):  
Oleksandr Makoveichuk ◽  
Igor Ruban ◽  
Nataliia Bolohova ◽  
Andriy Kovalenko ◽  
Vitalii Martovytskyi ◽  
...  

A technique for increasing the stability of methods for applying digital watermark into digital images is presented. A technique for increasing the stability of methods for applying digital watermarks into digital images, based on pseudo-holographic coding and additional filtering of a digital watermark, has been developed. The technique described in this work using pseudo-holographic coding of digital watermarks is effective for all types of attacks that were considered, except for image rotation. The paper presents a statistical indicator for assessing the stability of methods for applying digital watermarks. The indicator makes it possible to comprehensively assess the resistance of the method to a certain number of attacks. An experimental study was carried out according to the proposed method. This technique is most effective when part of the image is lost. When pre-filtering a digital watermark, the most effective is the third filtering method, which is averaging over a cell with subsequent binarization. The least efficient is the first method, which is binarization and finding the statistical mode over the cell. For an affine type attack, which is an image rotation, this technique is effective only when the rotation is compensated. To estimate the rotation angle, an affine transformation matrix is found, which is obtained from a consistent set of corresponding ORB-descriptors. Using this method allows to accurately extract a digital watermark for the entire range of angles. A comprehensive assessment of the methodology for increasing the stability of the method of applying a digital watermark based on Wavelet transforms has shown that this method is 20 % better at counteracting various types of attacks


2021 ◽  
Vol 1901 (1) ◽  
pp. 012031
Author(s):  
S V Belim ◽  
S N Munko ◽  
S Yu Belim

Author(s):  
Nidaa Flaih Hassan ◽  
Akbas Ezaldeen Ali ◽  
Teaba Wala Aldeen ◽  
Ayad Al-Adhami

Video watermarking is one of the most widespread techniques amongst the many watermarking techniques presently are used; this is because the extreme existences of copyright abuse and misappropriation occur for video content. In this paper, a new watermarking algorithm is proposed to embed logo in digital video for copyright protection. To make the watermarks more robust to attack, host frame and host embedding indices must be changeable. A new algorithm is proposed to determined host frames by plasma function, Host location indices in frames are also determined by another plasma function. Logo is divided using the mosaic principle, the size of mosaic blocks is determined initially according to the degree of protection, whenever the size of mosaic blocks is small, it leads to safe embedding, and vice versa. Digital watermarks are embedded easily without any degradation for video quality, In the other side, the watermarked is retrieved by applying the reverse of proposed embedding algorithm and extracted watermark is still recognizable. The experimental results confirm that watermark is robust against three types of attacks which are addition of Gaussian noise, JPEG compression, and rotation process.


2021 ◽  
Author(s):  
Venkatesh S ◽  
Saravanakumar R ◽  
SureshKumar M ◽  
sivakumar B ◽  
veeramakali T

Abstract Some technologies are technologically advanced to provide security from illegal copying. Two complementary methods are encryption and watermarking. Encryption safeguards the information throughout the communication from the sender to the receiver. The data might present a distorted image after receipt and subsequent decryption. Watermarking complements encryption through embedding data openly into the image. Therefore, the watermark continuously remains existing in the data. A digital watermark is a category of indication secretly entrenched in a noise-tolerant signal similar to audio or else image information. It is indeed applied to distinguish copyright possession of such signal. Computer-aided hiding of the given digitized information in a carrier is known as watermarking. Digital watermarks possibly will be employed to validate the authenticity or integrity of a carrier signal or to determine source uniqueness. It is evidently applied for determining copyright contraventions and aimed at banknote verification. Analogous to traditional watermarks, digital watermarks are unique only beneath certain conditions. Once a digital watermark varies a carrier in a manner that it turns out to be noticeable, formerly it is of no use. The media will be visible by traditional watermarks (similar to images or else video) but the signal might be pictures, video, audio, texts or 3D models in digital watermarking. A signal can transmit some different watermarks at the equivalent time. Image watermarking is achieved in this study using two methods known as Hidden Markov Tree–Contourlet Wavelet Transform (HMT-CWT) and Haar wavelet transform – Discrete Fourier transform (HWT-DFT). In the next HWT-DFT method, a video is given as an input and it is split into two halves (audio and image). The audio is de-watermarked through Spectral Centroid Wavelet Transform and enhanced by utilizing Firefly procedure. The images is handled through HWT in addition to DFT. Then the output watermarked images and audio combined together to form a watermarked video. The obtained video is de-watermarked to produce the original copy of the video. The process of getting back the original copy by removing the watermark from the video is called as de-watermarking.


Sign in / Sign up

Export Citation Format

Share Document