The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper a new robust, spread-spectrum image watermarking approach is proposed. A two level wavelet transform is applied to the host image. Then three high frequency sub-bands in level 2 are selected and the watermark is embedded by an spread-spectrum technique. Selected sub-bands are divided into square blocks. Each block carries Nb bits of watermark information. Watermark data is added as uncorrelated...
Analysis of quantization effects on watermarked coefficients and watermark is considered. A criterion for selection of coefficients suitable for watermarking in the presence of quantization is derived. The effects of quantization are further analyzed in terms of the probability of detectable watermark and the probability of zero-quantized watermarked coefficients. This analysis is used to define an...
Digital watermarking is a huge research area which is progressively growing. It covers theoretical studies, novel techniques, attacks and performance analysis. An embedded watermark may unintentionally or inadvertently be impaired by such processing. Other types of processing may be applied with the explicit goal of hindering watermark reception. In watermarking terminology, an “attack” is any processing...
Digital watermarking techniques have been used as one of the means for copyright protection and authentication of multimedia data. Conventional Singular Value Decomposition (SVD)-based and Chinese Remainder Theorem (CRT)-based spatial domain watermark techniques do not perform well under JPEG compression. However, it is seen that the CRT-based watermarking technique in Discrete Cosine Transform (DCT)...
In this paper, a fingerprinting using chaos-based watermark for copyright protection of the image transmission system is presented with experimental results in this paper. This system assures when pirated image is found, the illegal user can be traced. The user's message after chaotic encryption as watermark embeds into image. Experimental results show our system which is used for a web-based image...
In this paper we introduce a robust image-adaptive data hiding in wavelet domain that hide data in images while imposing minimal perceptual degradation in original image. As it is well accepted, data embedding in the low and mid frequency parts of an image have better robustness under compression attacks than high frequency parts. So our method embeds more data in low frequency coefficients than high...
This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, embedding is carried out in cumulative form in spatial domain and ICA is used for watermark extraction. For extraction there is no need to access the original image or the watermark, and extraction is carried out only with two watermarked images. Experimental...
In this paper a new blind technique using one dimensional Walsh coding to improve the robustness of image watermarking is presented. The proposed technique inserts the binary bits of handwritten signatures in the DCT blocks of the Y channel of the digital color image. The 1-D Walsh coding can be applied either horizontally or vertically. The work was carried out using the horizontal 1-D Walsh coding...
A novel blind digital image watermarking scheme based on Schur factorization in contourlet domain is proposed in this paper. Firstly, the original cover image is decomposed by contourlet domain, then Schur factorization is adopted to the selected symmetric blocks determined by the lowpass subband where watermark information is embedded. Additionally, the watermark image is encrypted by a pseudorandom...
This study presents an optimization-based image watermarking scheme by using Lagrange Principle. Unlike traditional way of single-coefficient quantization, this study uses multi-coefficients quantization to embed the watermarks. To modify the low-frequency coefficients of discrete wavelet transform (DWT), the Lagrange Principle is applied to derive an optimization-based formula. Experimental results...
Semi-fragile watermarking which is robust to given operations and fragile to conscious operations, is a useful authentication technique for digital media. In this paper, a novel semi-fragile image watermarking algorithm that accepts JPEG compression and gray-scale-transformation is proposed. In the proposed algorithm, the properties of JPEG compression, DCT coefficients and gray-scale-transformation...
As a new authentication technique for digital information, semi-fragile watermarking has gained great development, and since JPEG compression is one of the usually used image processing methods, more and more semi-fragile watermarking algorithms based on JPEG compression standard are proposed, but how to make full use of the properties of JPEG compression is still a problem. In this paper, the theory...
We present a novel blind digital watermarking algorithm using the quantization for Jaguwen rubbing image based on Contourlet transform in this paper. After Contourlet transform, original image is decomposed into a series of multiscale, local and directional subimages. Select the low frequency subband as the watermarking embedding domain. At the same time, the original binary watermark is firstly scrambled...
Digital watermarking is the technique used to embed author's credentials, logo or some other information into digital images which can be used in authentications for courtroom evidence, copyright claims and other applications. The objective of this work is to develop a feasible and invisible watermark embedding hardware for the secure digital cameras using LeGall 5/3 (Discrete Wavelet Transform) DWT...
This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, we divide the original image into blocks and use the ICA to project the image into a basis with its components as statistically independent as possible. The data embedding is carried out in cumulative form in the ICA basis and also the ICA is used for watermark...
A semi-fragile watermarking for image authentication, localization, and recovery scheme by using Tchebichef moments is proposed. We use robust invariant Tchebichef moments to generate the authentication feature, and use scaled Tchebichef moments to construct recovery information from low-frequency domain. In order to improve the quality of watermarked image and keep the robustness of watermark, we...
An adaptive robust watermarking algorithm in which a binary character watermark was embedded into the grayscale digital image based on the discrete operation was proposed. The approximation subband of the original digital image in the wavelet domain was decomposed into blocks and classified first by considering human visual masking characteristics. Then, the blocks with best abundant texture information...
In this paper, we present an image watermarking scheme based on contourlet transform (CT) and singular value decomposition (SVD). Unlike usual CT algorithm where the watermarking is embedded directly into the coefficients, we segment the lowpass coefficients into blocks. The blocks are decomposed using SVD, and the watermarking image after Arnold scrambling is embedded into the biggest singular value...
Compared with wavelet, tight frame let has good time-frequency analysis ability. In this paper, we propose anew digital image watermarking algorithm based on tight frame let. In our method, the host image is firstly decomposed by frame let. Secondly, the watermark image is transformed by Arnold scrambling and then is embedded in the lowest frequency sub band of the host image. Experimental results...
In this article, a new scheme of dual wavelet watermarking by applying principal component analysis is presented. First, we identify the two best sub bands of wavelet transform by considering the intensity variance of each sub band. These two sub bands are further transformed by 1-level wavelet transform. The embedding locations are obtained by experiment in a way that they would be compatible with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.