scispace - formally typeset
Search or ask a question
Author

Saei Ranjbar

Bio: Saei Ranjbar is an academic researcher from Islamic Azad University. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 1, co-authored 1 publications receiving 36 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: Since watermark is embedded in the local as well as global CT coefficients of two different frequency bands, the proposed method is robust against a wide range of attacks.
Abstract: In this paper we propose a blind and highly robust watermarking method consisting of two embedding stages. In the first stage, the odd description of image is divided into non-overlapped fixed size blocks and the signature (watermark) is embedded in the high frequency component of the Contourlet transform (CT) of the blocks. In the second stage, the signature is embedded in the low frequency component of the global CT of the image. The main issue associated with two-stage blind watermarking is the selection of the less affected signature among the two embedded signatures. In this paper a measure is introduced to decide between the two extracted signatures. Simulation results indicate that the proposed method achieves higher robustness compared to other known watermarking methods. Moreover, since watermark is embedded in the local as well as global CT coefficients of two different frequency bands, the proposed method is robust against a wide range of attacks. This is due to the fact that most of the attacks affect either a specific frequency band or a specific location in the watermarked image.

39 citations


Cited by
More filters
Journal ArticleDOI
01 Jul 2017-Optik
TL;DR: A digital image watermarking algorithm in YCoCg-R color space is proposed and the results show the superior robustness of the proposed method over the other algorithms with same capacity.

64 citations

Journal ArticleDOI
TL;DR: Experimental results prove the robustness of the SMLE watermarking model against common image processing operations along with its efficient retention of the imperceptibility of the watermark in the host image.

63 citations

Journal ArticleDOI
TL;DR: This paper presents a new bit plane sliced, scrambled color image watermark embedded on the color cover video using hybrid transforms with good imperceptibility, high robustness and at an information rate of (N − number of motion frames) / 24 images per second of the video, where N is the total number of frames in the video.
Abstract: The advancements in network technologies and processing of multimedia contents have provided the way for the distribution and sharing of multimedia contents through networks. This in turn has increased the demand for protecting the multimedia contents in terms of authentication, proof of ownership, copy control etc., which can be achieved by means of what is called digital watermarking. The challenges in watermarking techniques are how to achieve the imperceptibility, robustness and payload simultaneously. This paper presents a new bit plane sliced, scrambled color image watermark embedded on the color cover video using hybrid transforms such as Contourlet Transform (CT), Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) transformations with good imperceptibility, high robustness and at an information rate of (N ź number of motion frames) / 24 images per second of the video, where N is the total number of frames in the video. In order to achieve a good level of imperceptibility, we perform the following: First, we slice the color watermark image into 24 slices using the bit plane slicing mechanism. Subsequently, the so called Arnold transformation key is used to scramble those slices, to achieve first-level of security. Thus, an authenticated receiver with an appropriate key alone can descramble the received slices. Second, we embed those scrambled slices on one of the DWT mid-frequency coefficients (LH band) of successive 1-level CT non-motion frames of color cover video. The non-motion frames are identified using the histogram difference based shot boundary detection algorithm. Third, in order to the provide second-level of security, we generate a random eigen vector from the color watermark image, using co-variance matrix and maximum eigen value and then embed it on another DWT mid-frequency coefficients (HL band). Thus, embedding only the slices (not an entire image) will improve the level of imperceptibility. The mid-frequency embedding location can withstand against all low pass and high pass filtering attacks; thereby it increases the level of robustness. Thus, the proposed system is suitable for authentication. Finally, as far as payload is concerned, we need only 24 non-motion frames for embedding our watermark on to the cover video. Hence the remaining frames can be utilized for embedding other color images. Our simulation results prove that the proposed system provides trustworthy performance against various notable image processing attacks, multiple attacks, geometrical attacks, and temporal attacks.

58 citations

Journal ArticleDOI
TL;DR: This study uses the likelihood ratio decision rule and t-location scale distribution to design an optimal multiplicative watermark detector that showed higher efficiency and robustness against different attacks, and derives the receiver operating characteristics (ROC) analytically.

53 citations

Journal ArticleDOI
TL;DR: Experimental results show that the proposed watermarking scheme has better visual imperceptibility and high robustness against image & signal processing attacks compared to other methods.
Abstract: In this paper, a robust semi-blind watermarking scheme for color images, based on multiple decompositions is proposed to preserve the copyrights of the owner. Using multiple decompositions, the gray watermark is embedded into a host color image. Prior to that, to enhance security the gray watermark is encrypted with Arnold transform and SVD by generating secret keys. The luminance component of the given host image is subjected to discrete wavelet transform(DWT), contourlet transform(CT), Schur decomposition and singular value decomposition(SVD) in sequence and finally the watermark is embedded. In the semi-blind extraction process, the watermark is extracted without the help of the original host image. Experimental results show that the proposed watermarking scheme has better visual imperceptibility and high robustness against image & signal processing attacks compared to other methods.

47 citations