scispace - formally typeset

Book ChapterDOI

A Novel Chaos Based Robust Watermarking Framework

01 Jan 2017-pp 439-447

TL;DR: A novel logo watermarking framework is proposed using non-linear chaotic map to generate keys to be used in the embedding process, which reveals the efficiency and robustness of the proposed framework.

AbstractIn this paper, a novel logo watermarking framework is proposed using non-linear chaotic map. The essence of proposed technique is to use chaotic map to generate keys to be used in the embedding process. Therefore, a method for generating keys is first proposed followed by the embedding process. A robust extraction process is then proposed to verify the presence of watermark from the possibly attacked watermarked image. Experimental results and attack analysis reveal the efficiency and robustness of the proposed framework.

...read more


Citations
More filters
Journal ArticleDOI
TL;DR: The experimental results demonstrate that the proposed scheme is imperceptible and robust against a variety of intentional or unintentional attacks.
Abstract: In this paper, a robust watermarking technique is proposed using integer discrete cosine transform, non-linear chaotic map and dynamic stochastic resonance (DSR). Firstly, the host image is transformed into integer DCT domain where the coefficients are partitioned into non-over-lapping blocks. A circulant matrix is then constructed from the selected blocks. Block selection is done using a non-linear chaotic map. This circulant matrix is used for embedding the watermark by computing the singular values. The extraction of the watermark is done by producing the dynamic stochastic resonance (DSR) phenomena and casting a verification step. This verification step essentially solves the false positive detection problem that arises in SVD based watermarking. The experimental results demonstrate that the proposed scheme is imperceptible and robust against a variety of intentional or unintentional attacks.

51 citations

Proceedings ArticleDOI
09 Mar 2018
TL;DR: A new image watermarking framework for copyright protection is presented using image normalization, singular value decomposition (SVD) and dynamic stochastic resonance (DSR) to improve the robustness of the system.
Abstract: In this paper, a new image watermarking framework for copyright protection is presented using image normalization, singular value decomposition (SVD) and dynamic stochastic resonance (DSR). The image is first normalized using the geometric moments and then an ownership message is embedded by employing the singular value decomposition. Finally, a reliable extraction process based on dynamic stochastic resonance is proposed. The DSR phenomenon helps in the extraction of the watermark information and improves the robustness of the system. A sequence of experiments and analysis are regulated to verify the effectiveness and the higher degree of robustness, especially for the geometric attacks.

7 citations


Cites background from "A Novel Chaos Based Robust Watermar..."

  • ...The former techniques are simple, less robust and requires less computation [2] while the latter techniques are highly intricate and comparatively robust....

    [...]

Journal ArticleDOI
TL;DR: A new robust watermarking framework is designed using the discrete cosine transform (DCT), binary decimal sequence (d-sequence) and Dn-structure to generate a binary d-sequence based on random number generator (RNG) and some secret keys.
Abstract: In this paper, a new robust watermarking framework is designed using the discrete cosine transform (DCT), binary decimal sequence (d-sequence) and Dn-structure. The core idea is to generate a binary d-sequence based on random number generator (RNG) and some secret keys. This binary sequence is then utilized to generate reference sets based on Dn-structure. For embedding purpose, the host image is transformed using DCT and selected coefficients are employed to construct a macro block. Each binary watermark bit is securely embedded into macro block by utilizing the reference set. The reverse process is finally formulated to extract the watermark at the receiver end. The proposed technique is experimentally analyzed using various quality metrics and attacks. The comprehensive experimental results illustrate that the proposed watermarking scheme is robust to both geometric distortions (resizing, cropping, wrapping and random row deletion) and general signal processing attacks (various noise addition, blurring, high pass filtering, image sharpening, contrast adjustment, Histogram equalization and gamma correction and JPEG compression) and outperforms state-of-the-art watermarking methods.

5 citations

Journal ArticleDOI
TL;DR: A new blind image watermarking scheme using binary decimal sequence (d-sequence) and lifting wavelet transform (LWT) for copyright protection and the better robustness of the proposed scheme against different kind of attacks is demonstrated.
Abstract: This paper presents a new blind image watermarking scheme using binary decimal sequence (d-sequence) and lifting wavelet transform (LWT) for copyright protection. The core idea is to produce a d- sequence based on random number generator (RNG) algorithm and secret keys. A reference set is then generated using the d-sequence for embedding purpose. For embedding, the host image is decomposed into different frequency bands using the LWT and watermark bits are then embedded in selected band, considering the reference set. The extensive experimental results, comparative and security analysis demonstrate the better robustness of the proposed scheme against different kind of attacks.

5 citations

Book ChapterDOI
01 Jan 2020
TL;DR: A robust image watermarking scheme based on all phase sine biorthogonal transform, singular value decomposition, SVD and dynamic stochastic resonance is presented and the simulation results demonstrate that the proposed scheme has better performance in the aspect of robustness and invisibility.
Abstract: In this paper, a robust image watermarking scheme based on all phase sine biorthogonal transform (APSBT), singular value decomposition (SVD) and dynamic stochastic resonance (DSR) is presented. Firstly, the cover image is transformed by APSBT and then a gray-scale logo is embedded through the singular value decomposition. After the authentication process which essentially resolves the false-positive extraction of SVD in watermarking, a phenomenon based on dynamic stochastic resonance is deployed for the logo extraction from the watermarked image. The simulation results demonstrate that the proposed scheme has better performance in the aspect of robustness and invisibility.

2 citations


References
More filters
Book
31 Dec 1999
TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.
Abstract: From the Publisher: Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, a description of possible applications, and a survey of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis," methods which can be used to break steganographic communication. This comprehensive resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities and differences to steganography. You gain a working knowledge of watermarking's pros and cons, and you learn the legal implications of watermarking and copyright issues on the Internet.

1,725 citations

Journal ArticleDOI
Abstract: A digital watermark is an invisible mark embedded in a digital image which may be used for a number of different purposes including image captioning and copyright protection. This paper describes how a combination of spread spectrum encoding of the embedded message and transform-based invariants can be used for digital image watermarking. In particular, it is described how a Fourier–Mellin-based approach can be used to construct watermarks which are designed to be unaffected by any combination of rotation and scale transformations. In addition, a novel method of CDMA spread spectrum encoding is introduced which allows one to embed watermark messages of arbitrary length and which need only a secret key for decoding. The paper also describes the usefulness of Reed Solomon error-correcting codes in this scheme.

813 citations

Journal ArticleDOI
TL;DR: The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract: The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

765 citations

Book ChapterDOI
01 Jan 2002
TL;DR: This chapter analyzes the effects of some valumetric distortions, which can often be modeled as combinations of additive noise, amplitude changes, linear filtering, and/or quantization to occur to photographs, music, and video.
Abstract: Publisher Summary The robustness of a watermarking method is a measure of the ability of the watermark to survive legitimate and everyday usage of the content. This chapter presents general methods for achieving high robustness along with specific methods for handling some of the most common types of processing. In designing a robust watermark, it is important to identify the specific processes that are likely to occur between embedding and detection. Robustness to a given process often comes at some expense in computational cost, data payload, fidelity, or even the robustness of some other process. It is, therefore, wise to ignore those processes that are unlikely in a given application. Further, this chapter analyzes the effects of some valumetric distortions (that is, distortions that change the values of individual pixels or audio samples). Common valumetric distortions that occur to photographs, music, and video can often be modeled as combinations of additive noise, amplitude changes, linear filtering, and/or quantization. Temporal and geometric distortions are also discussed such as delay, translation, rotation, and scaling.

135 citations

Journal ArticleDOI
TL;DR: The performance of a fragile watermarking method based on discrete cosine transform (DCT) has been improved in this paper by using intelligent optimization algorithms (IOA), namely genetic algorithm, differential evolution algorithm, clonal selection algorithm and particle swarm optimization algorithm.
Abstract: The performance of a fragile watermarking method based on discrete cosine transform (DCT) has been improved in this paper by using intelligent optimization algorithms (IOA), namely genetic algorithm, differential evolution algorithm, clonal selection algorithm and particle swarm optimization algorithm. In DCT based fragile watermarking techniques, watermark embedding can usually be achieved by modifying the least significant bits of the transformation coefficients. After the embedding process is completed, transforming the modified coefficients from the frequency domain to the spatial domain produces some rounding errors due to the conversion of real numbers to integers. The rounding errors caused by this transformation process were corrected by the use of intelligent optimization algorithms mentioned above. This paper gives experimental results which show the feasibility of using these optimization algorithms for the fragile watermarking and demonstrate the accuracy of these methods. The performance comparison of the algorithms was also realized.

82 citations