scispace - formally typeset
Search or ask a question
Book ChapterDOI

A Novel Watermarking Technique for Multimedia Security

TL;DR: This chapter presents a robust and secure framework for multimedia security using digital watermarking based on dynamic stochastic resonance (DSR), which effectively utilizes the noise introduced during the attacks to enhance the robustness and authenticity of the watermark.
Abstract: This chapter presents a robust and secure framework for multimedia security using digital watermarking. In the proposed scheme, a cover image is transformed into frequency domain based on all phase discrete bi-orthogonal transform (APDBT) followed by singular value decomposition. A gray-scale watermark is then embedded by modifying the singular values. For watermark extraction, a new procedure based on dynamic stochastic resonance (DSR) is employed. The proposed DSR based extraction effectively utilizes the noise introduced during the attacks to enhance the robustness and authenticity of the watermark. A detailed experimental analysis is finally conducted to demonstrate the robustness and efficiency of the proposed scheme against a variety of attacks.
References
More filters
Journal ArticleDOI
TL;DR: Practical and theoretical analyses of the security offered by watermarking and data hiding methods based on spread spectrum reveal fundamental limits and bounds on security and provide insight into other properties, such as the impact of the embedding parameters, and the tradeoff between robustness and security.
Abstract: This paper presents both theoretical and practical analyses of the security offered by watermarking and data hiding methods based on spread spectrum. In this context, security is understood as the difficulty of estimating the secret parameters of the embedding function based on the observation of watermarked signals. On the theoretical side, the security is quantified from an information-theoretic point of view by means of the equivocation about the secret parameters. The main results reveal fundamental limits and bounds on security and provide insight into other properties, such as the impact of the embedding parameters, and the tradeoff between robustness and security. On the practical side, workable estimators of the secret parameters are proposed and theoretically analyzed for a variety of scenarios, providing a comparison with previous approaches, and showing that the security of many schemes used in practice can be fairly low.

90 citations

Journal ArticleDOI
Yong-gang Leng1, Tai-yong Wang1, Guo Yan1, Yong-gang Xu1, Sheng-bo Fan1 
TL;DR: In this paper, the stochastic resonance properties of a single bistable system and two cascaded Bistable systems connected in series with small and large parameters have been investigated.

80 citations

Journal ArticleDOI
TL;DR: The experimental results demonstrate that the proposed scheme is imperceptible and robust against a variety of intentional or unintentional attacks.

74 citations

Journal ArticleDOI
TL;DR: This article presents a detailed discussion of different prospects of digital image watermarking and performance comparisons of the discussed techniques are presented in tabular format.
Abstract: This article presents a detailed discussion of different prospects of digital image watermarking. This discussion of watermarking included: brief comparison of similar information security techniques, concept of watermark embedding and extraction process, watermark characteristics and applications, common types of watermarking techniques, major classification of watermarking attacks, brief summary of various secure watermarking techniques. Further, potential issues and some existing solutions are provided. Furthermore, the performance comparisons of the discussed techniques are presented in tabular format. Authors believe that this article contribution will provide as catalyst for potential researchers to implement efficient watermarking systems.

70 citations