scispace - formally typeset
Search or ask a question
Journal ArticleDOI

A new robust reference logo watermarking scheme

01 Apr 2011-Multimedia Tools and Applications (Springer US)-Vol. 52, Iss: 2, pp 621-640
TL;DR: The experimental results demonstrate better visual imperceptibility and resiliency of the proposed scheme against intentional or un-intentional variety of attacks.
Abstract: In this paper, a new yet simple reference logo watermarking scheme based on fractional Fourier transform (FrFT) and singular value decomposition (SVD) is proposed. The core idea of the proposed scheme is to segment host image into non-overlapping blocks by the means of Hilbert space filling curve and a reference image is formed by considering Human visual system (HVS). First, reference image is transformed into FrFT domain and embedding is done by modifying singular values of the reference image using singular values of watermark. After embedding, modified reference image is segmented into blocks and these modified blocks are mapped into their original places for constructing watermarked image. For extraction, a reliable watermark extraction scheme is proposed. The experimental results demonstrate better visual imperceptibility and resiliency of the proposed scheme against intentional or un-intentional variety of attacks.
Citations
More filters
Journal ArticleDOI
TL;DR: A binary watermark is constructed from the image itself, which makes the watermark unique for every image and guarantee the blindness in the detection process and guarantees the security of the proposed scheme.
Abstract: In this paper, a new chaos based watermarking scheme for effective tamper detection in images is proposed. The proposed scheme is able to detect any possible forgery and spot the areas which have been tampered. To improve the efficiency of the proposed scheme, a binary watermark is constructed from the image itself, which makes the watermark unique for every image and guarantee the blindness in the detection process. To guarantee the security of the proposed scheme, chaotic maps are used to complicate the embedding and the detection process to reduce the vulnerability to different attacks. Experimental results and security analysis show that the proposed scheme achieves superior tamper detection under common attacks.

64 citations

Journal ArticleDOI
TL;DR: Experimental results show that the proposed colour image water marking technique based on Hessenberg decomposition outperforms other watermarking methods and it is robust to resist a wide range of attacks, e.g. image compression, filtering, cropping, rotation, adding noise, blurring, scaling, sharpening and rotation and so on.
Abstract: In this study, a novel blind image watermarking technique using Hessenberg decomposition is proposed to embed colour watermark image into colour host image. In the process of embedding watermark, the watermark information of colour image is embedded into the second row of the second column element and the third row of the second column element in the orthogonal matrix obtained by Hessenberg decomposition. In the process of extracting watermark, neither the original host image nor the original watermark image is needed and it is impossible to retrieve them without the authorised keys. Experimental results show that the proposed colour image watermarking technique based on Hessenberg decomposition outperforms other watermarking methods and it is robust to resist a wide range of attacks, e.g. image compression, filtering, cropping, rotation, adding noise, blurring, scaling, sharpening and rotation and so on. Especially, the proposed method has lower computational complexity than other methods based on singular value decomposition or QR decomposition.

50 citations

Journal ArticleDOI
TL;DR: Both theoretical analysis and experimental results show that the fragile watermarking scheme is not security, and improvement measure is presented to enhance the security of the fragile Watermarking Scheme.
Abstract: In this paper, we analyze the security of a chaotic system based fragile watermarking scheme for image tamper detection proposed by Rawat et al recently Some errors and modification attack against Rawat et al’s scheme are demonstrated Both theoretical analysis and experimental results show that the fragile watermarking scheme is not security Besides, improvement measure is presented to enhance the security of the fragile watermarking scheme

44 citations

Journal ArticleDOI
TL;DR: A novel, yet simple, watermarking algorithm for image authentication is proposed using fractional wavelet packet transform (FRWPT) via singular value decomposition (SVD), based on embedding in the singular values (luminance) of the host image.

44 citations

Journal ArticleDOI
TL;DR: Simulation results show that the proposed blind color image watermarking scheme outperforms other related methods in the aspects of the invisibility, robustness, capacity and computational complexity.
Abstract: It is a challenging work to design a blind color image watermarking scheme for protecting copyright, which is different from the existing schemes used binary image or grayscale image as watermark and is also different from other non-blind watermarking schemes. In this paper, we analyze the feature of the upper Hessenberg matrix, and propose a blind color image watermarking scheme using upper Hessenberg matrix of Hessenberg transform. Arnold transform is used to improve the security, and the MD5-based Hash pseudo-random algorithm is also used to improve the robustness. In the process of watermark embedding, the encrypted watermark information is embedded into the biggest energy element of the Hessenberg matrix by quantization technique. In the process of watermark extraction, the watermark is extracted from the attacked host image with blind manner. Simulation results show that the proposed scheme outperforms other related methods in the aspects of the invisibility, robustness, capacity and computational complexity.

42 citations

References
More filters
Book
24 Oct 2001
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Abstract: Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications.

2,849 citations

Book
01 Jan 1993
TL;DR: The fifth edition of this hugely successful textbook retains the quality of earlier editions while at the same time seeing numerous minor improvements and major additions as mentioned in this paper, including a new chapter on singular values and singular vectors, including ways to analyze a matrix of data.
Abstract: Linear algebra is something all mathematics undergraduates and many other students, in subjects ranging from engineering to economics, have to learn. The fifth edition of this hugely successful textbook retains the quality of earlier editions while at the same time seeing numerous minor improvements and major additions. The latter include: a new chapter on singular values and singular vectors, including ways to analyze a matrix of data; a revised chapter on computing in linear algebra, with professional-level algorithms and code that can be downloaded for a variety of languages; a new section on linear algebra and cryptography; and a new chapter on linear algebra in probability and statistics. A dedicated and active website also offers solutions to exercises as well as new exercises from many different sources (e.g. practice problems, exams, development of textbook examples), plus codes in MATLAB, Julia, and Python.

1,913 citations


"A new robust reference logo waterma..." refers background in this paper

  • ...The singular value decomposition (SVD) [40] of A is the factorization (Fig....

    [...]

Book
31 Dec 1999
TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.
Abstract: From the Publisher: Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, a description of possible applications, and a survey of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis," methods which can be used to break steganographic communication. This comprehensive resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities and differences to steganography. You gain a working knowledge of watermarking's pros and cons, and you learn the legal implications of watermarking and copyright issues on the Internet.

1,732 citations


"A new robust reference logo waterma..." refers methods in this paper

  • ...Digital watermarking is the means of embedding an information into digital data in such a way that it is imperceptible to a human observer but easily detected by computer algorithm [6, 16 ]....

    [...]

Journal ArticleDOI
Victor Namias1
TL;DR: In this article, a generalized operational calculus is developed, paralleling the familiar one for the ordinary transform, which provides a convenient technique for solving certain classes of ordinary and partial differential equations which arise in quantum mechanics from classical quadratic hamiltonians.
Abstract: We introduce the concept of Fourier transforms of fractional order, the ordinary Fourier transform being a transform of order 1. The integral representation of this transform can be used to construct a table of fractional order Fourier transforms. A generalized operational calculus is developed, paralleling the familiar one for the ordinary transform. Its application provides a convenient technique for solving certain classes of ordinary and partial differential equations which arise in quantum mechanics from classical quadratic hamiltonians. The method of solution is first illustrated by its application to the free and to the forced quantum mechanical harmonic oscillator. The corresponding Green's functions are obtained in closed form. The new technique is then extended to three-dimensional problems and applied to the quantum mechanical description of the motion of electrons in a constant magnetic field. The stationary states, energy levels and the evolution of an initial wave packet are obtained by a systematic application of the rules of the generalized operational calculus. Finally, the method is applied to the second order partial differential equation with time-dependent coefficients describing the quantum mechanical dynamics of electrons in a time-varying magnetic field.

1,523 citations

Proceedings ArticleDOI
13 Nov 1994
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Abstract: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale. The watermark is capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation. This capability is envisaged to find application in image tagging, copyright enforcement, counterfeit protection, and controlled access. Two methods of implementation are discussed. The first is based on bit plane manipulation of the LSB, which offers easy and rapid decoding. The second method utilises linear addition of the water mark to the image data, and is more difficult to decode, offering inherent security. This linearity property also allows some image processing, such as averaging, to take place on the image, without corrupting the water mark beyond recovery. Either method is potentially compatible with JPEG and MPEG processing. >

1,407 citations


"A new robust reference logo waterma..." refers methods in this paper

  • ...[39] have proposed two methods in which first method is based on bit plane manipulation of the LSB whereas second method is based on the linear addition of the watermark to the image data, which is more difficult to decode, offering inherent security....

    [...]

  • ...The embedded information is hidden either in pixels [15, 18, 24, 39] or in transform domain, such as Fourier transform [35, 36], cosine transform [2, 12, 34], fractional Fourier transform [7, 9, 42] and wavelet transform domain [1, 17, 21–23, 27, 29, 41]....

    [...]