human visual model
Recently Published Documents


TOTAL DOCUMENTS

46
(FIVE YEARS 1)

H-INDEX

9
(FIVE YEARS 0)

2021 ◽  
Author(s):  
Sundhararaj V ◽  
Meenakshipriya B ◽  
Nirmala Devi P

Abstract More than ever with growing of multimedia technology, the digital data are exchanged in the internet, which can be duplicated by unauthorized users. To avoid this problem the watermarking technology has brought this paper. Performance improvement with compare to existing algorithm is obtained by proposing a new watermarking algorithm based on Human Visual Model (HVM) and Discrete Wavelet Transform (DWT) for securing the digital data and copyright protection. DWT is applied to the input image and at each level of DWT sub bands to embed a watermark image in selected coefficients of the sub band. HVM integrate the weight factor effect of human visualization by considering into the eye’s vision is less sensitivity area, depending on brightness, frequency band and texture areas of the image sub band. In the proposed approach robustly and imperceptibly, DWT and HVM are used for obtainable weight factor, according to human eye perceptual and to determine the optimal strength at which the threshold to embedding reaches the perceptual invisibility of watermarked image to various attacks. Performance is evaluated such as Peak Signal to Noise Ratio (PSNR), Structural Similarity Index Measure (SSIM) and Quality Index (QI) is used to evaluate and achieve the imperceptible watermarked image. Results of PSNR values of hybrid image watermarking are between 49.73db to 36.24db. Experimental results show that our hybrid image watermarking process has enhanced robustness and displays the effectiveness of presenting images watermarking system.


2018 ◽  
pp. 567-587
Author(s):  
Yiqun Liu ◽  
Xiaorui Wang ◽  
Jianqi Zhang ◽  
Minqing Zhang ◽  
Peng Luo ◽  
...  

Robustness and security are difficult to be solved by conventional two-dimensional (2D) digital watermarking technology. In recent years, three-dimensional (3D) digital watermarking has become a new hotspot in optical information security. This paper presents a new improved security 3D digital watermarking method based on computational integrated imaging cryptosystem. Firstly, 3D digital watermarking is generated and encrypted by computational integral imaging cryptosystem that is implemented with smart pseudoscopic-to-orthoscopic conversion (SPOC) model. Secondly, discrete wavelet transform algorithm is applied to embed and extract the 3D digital watermarking. Finally, the extracted watermark is decrypted, and3D digital watermarking is displayed by integral imaging system. The feasibility and effectiveness of the proposed method is demonstrated by experiment. A primary implication of encrypted processing is that the majority of integral imaging cryptosystem will be encryption-in-the-loop applications, and the majority of system will improve the security and robustness of 3D digital watermarking. The new method is able to meet the requirements of robustness and security. Image quality and display quality achieve these criterions of the human visual model. The proposed method can be applied in the aspects of cloud computing and big data.


2017 ◽  
pp. 491-557
Author(s):  
A. Ufuk Agar ◽  
Farhan A. Baqai ◽  
Jan P. Allebach

2016 ◽  
Vol 12 (2) ◽  
pp. 1-21 ◽  
Author(s):  
Yiqun Liu ◽  
Xiaorui Wang ◽  
Jianqi Zhang ◽  
Minqing Zhang ◽  
Peng Luo ◽  
...  

Robustness and security are difficult to be solved by conventional two-dimensional (2D) digital watermarking technology. In recent years, three-dimensional (3D) digital watermarking has become a new hotspot in optical information security. This paper presents a new improved security 3D digital watermarking method based on computational integrated imaging cryptosystem. Firstly, 3D digital watermarking is generated and encrypted by computational integral imaging cryptosystem that is implemented with smart pseudoscopic-to-orthoscopic conversion (SPOC) model. Secondly, discrete wavelet transform algorithm is applied to embed and extract the 3D digital watermarking. Finally, the extracted watermark is decrypted, and3D digital watermarking is displayed by integral imaging system. The feasibility and effectiveness of the proposed method is demonstrated by experiment. A primary implication of encrypted processing is that the majority of integral imaging cryptosystem will be encryption-in-the-loop applications, and the majority of system will improve the security and robustness of 3D digital watermarking. The new method is able to meet the requirements of robustness and security. Image quality and display quality achieve these criterions of the human visual model. The proposed method can be applied in the aspects of cloud computing and big data.


2013 ◽  
Vol 756-759 ◽  
pp. 3298-3302
Author(s):  
Si Yu Lai ◽  
Juan Wang

Analyze a human visual model based wavelet domain digital watermark algorithm and improved it. First conduct multi-level wavelet decomposition on original image and modify medium frequency coefficient, and then adapt the algorithm to embed the watermark into the source image. The experiment shows that the watermark embedded image enjoys better imperceptibility and robustness to JPEG compression, add gaussian noise, contrast enhancement e.t. traditional image processing operations.


2013 ◽  
Vol 427-429 ◽  
pp. 1723-1726
Author(s):  
Chun Xing Wang ◽  
Jiao Jiao Zhang

This paper proposes a novel scheme combining Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) for image watermarking. The watermarking image is separated by two parts randomly, then they are embedded into the sub-bands obtained from the original image in DWT domain by modifying the singular value. SVD is applied twice in this scheme.The use of the threshold of Just Noticeable Distortion (JND) based on human visual model determines the embedding strength and position of the watermark, the digital adaptive watermarking algorithm in a combinational domain is realized. The experimental results show that the proposed scheme has a good invisibility and performance of robustness for common attacks, simultaneously enhances the embedding capacity and security.


Sign in / Sign up

Export Citation Format

Share Document