The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The central idea of this paper is to propose an innovative watermarking scheme for digital image authentication which withstands common image processing attacks. Some pixels are randomly selected from original image, so that all of them have a valid 3 × 3 neighborhoods. A binary sequence is constructed from those pixels by comparing them against average values of neighborhoods. The binary sequence...
This paper proposes a distortionless image data hiding algorithm based on integer wavelet transform that can hide data into the original image .The data can be retrieved and the original image can be recovered without any distortion after the hidden data are extracted. This algorithm hides data into one or more middle bitplane(s) of the integer wavelet transform coefficients in the LH, HL and HH frequency...
Thanks to the exceptionally good properties, chaotic systems have been widely studied and developed in image scrambling and watermarking algorithms in recent years. In this paper, the chaotic standard Baker map is improved and employed to scramble the pixel positions of host image and watermark image in the preprocessing of watermarking. Experimental results show that the scrambling algorithm based...
This paper proposes a novel encryption scheme based on invertible watermarking. In the past encryption algorithms, diffusion and confusion algorithms are used to increase the effect of the encryption, however, these algorithms can only change the cover itself to be encrypted. In this paper, the invertible watermarking can be used to perform the encryption, which can not only use the additional information...
This paper presents a method of digital image watermarking on digital audio signal that is robust against MPEG compression based on the principle of the human hearing called Psychoacoustic model. Based on the Psychoacoustic model, human hearing depends on both frequency and the power of the signal. Human ears can not separate the difference if the signal above the hearing threshold of the Psychoacoustic...
The watermark is more likely to prevent itself from JPEG-compression attack when it is embedded into the DC values of 8??8 DCT blocks. However, embedding the watermark with the same intensity into the DC values of DCT blocks may distort the watermarked image to a large extent. To solve this problem, a novel robust image-watermark algorithm is proposed with the characteristics of selective embedding...
In this paper, we proposed an efficient dual watermark scheme for image tamper detection and recovery. In the proposed watermarking algorithm each block in the image contains watermark of other two blocks, i.e. two copies of watermark of the whole image is maintained and second chance for block recovery is provided in case one copy is destroyed. The algorithm proposed by Lee and Shinfeng is unable...
The large-scale communication of multimedia data on Internet motivates the protection of digital information against illegal duplication and manipulation. Advances that facilitate electronic publishing and commerce also heighten threats of intellectual property theft and unlawful tampering. This work is concerned with the perceptual models used for data protection, secrete communication, author's...
A watermark hidden in an image is retrieved differently from the original watermark due to the frequently used rounding approach. The simple rounding will cause numerous errors in the embedded watermark especially when it is large. Evolutionary algorithms (EA) are used to correct the rounding errors. The main issue before applying EAs to reduce the rounding errors is that the embedded data should...
A novel method of watermarking in image spatial domains is proposed in this paper. The level transformation previously proposed for embedding watermark bits into each pixel of a source image is used adaptively with estimating the resulting subjective image quality. Thus, a desired subjective quality can be achieved on the watermarked image. First, the measurements of image quality by subjective evaluations...
In modern times, the rapid growth of the Internet has made copyright protection of digital contents a critical issue. A Digital Rights Management (DRM) system is aimed at protecting the high-value digital assets and controlling the distribution and utilization of those digital assets. Watermarking technologies are being regarded as a vital mean to proffer copyright protection of digital images. Digital...
In this paper, we experimental investigate if the current reversible data hiding schemes are detectable. By modeling the distributions of horizontal pixel difference of natural image using generalized Gaussian model, we find that the horizontal difference histogram of watermarked image is significantly altered. Furthermore, the difference between the horizontal and the vertical difference histogram...
Ownership authentication of image attended a careful attention due to global availability of internet services. Illegal copying and misappropriation of digital image leads cyber crime in an epidemic form. In aforesaid regard we've already proposed different fragile color image authentication schemes which guarantees ownership of an image through embedding color watermarks into color host images. In...
This paper proposes a novel spatial domain color digital watermarking scheme based on chaotic maps, and the host image is color RGB image. Using Lorenz map and the Arnold cat map encrypt the watermark signal and the embedding position of the host image each other. The color space of the color host image is first converted from RGB to YCbCr. In order to resist JPEG compression, all three watermark...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.