scispace - formally typeset
Journal ArticleDOI

A robust blind watermarking framework based on Dn structure

Reads0
Chats0
TLDR
A new robust watermarking framework is designed using the discrete cosine transform (DCT), binary decimal sequence (d-sequence) and Dn-structure to generate a binary d-sequence based on random number generator (RNG) and some secret keys.
Abstract
In this paper, a new robust watermarking framework is designed using the discrete cosine transform (DCT), binary decimal sequence (d-sequence) and Dn-structure. The core idea is to generate a binary d-sequence based on random number generator (RNG) and some secret keys. This binary sequence is then utilized to generate reference sets based on Dn-structure. For embedding purpose, the host image is transformed using DCT and selected coefficients are employed to construct a macro block. Each binary watermark bit is securely embedded into macro block by utilizing the reference set. The reverse process is finally formulated to extract the watermark at the receiver end. The proposed technique is experimentally analyzed using various quality metrics and attacks. The comprehensive experimental results illustrate that the proposed watermarking scheme is robust to both geometric distortions (resizing, cropping, wrapping and random row deletion) and general signal processing attacks (various noise addition, blurring, high pass filtering, image sharpening, contrast adjustment, Histogram equalization and gamma correction and JPEG compression) and outperforms state-of-the-art watermarking methods.

read more

Citations
More filters
Journal ArticleDOI

A secure image watermarking for tamper detection and localization

TL;DR: The proposed watermarking algorithm aims to find image tampering and its location and introduces a unique key based embedding using SHA-1 (Secure Hashing Algorithm) hashing, a spatial domain, block-based embedding technique.
Journal ArticleDOI

A novel blind watermarking approach for medical image authentication using MinEigen value features

TL;DR: This paper proposes a new watermarking approach to ensure medical images authenticity, using MinEigen value features, chaotic sequence, and Quantization Index Modulation in the spatial domain, using a novel blind way based on chaotic sequence and QIM.
Journal ArticleDOI

Robust image watermarking using fractional Krawtchouk transform with optimization

TL;DR: The experimental results of the proposed method FrKT with combination of both Firefly and cuckoo search optimization shows better quality of the watermark, robustness and imperceptibility against various attacks.
Journal ArticleDOI

High payload watermarking based on enhanced image saliency detection

TL;DR: Wang et al. as mentioned in this paper proposed a robust saliency-based image watermarking method to achieve high payload and high quality watermarked image, where an enhanced salient object model is proposed to produce a saliency map, followed by a binary mask to segments the foreground/background region of a host image.
References
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI

Discrete Cosine Transform

TL;DR: In this article, a discrete cosine transform (DCT) is defined and an algorithm to compute it using the fast Fourier transform is developed, which can be used in the area of digital processing for the purposes of pattern recognition and Wiener filtering.
Book

Guide to Elliptic Curve Cryptography

TL;DR: This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.
Book

Digital Watermarking

TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Book

Contemporary Abstract Algebra

TL;DR: Contemporary Abstract Algebra 7/e provides a solid introduction to the traditional topics in abstract algebra while conveying to students that it is a contemporary subject used daily by working mathematicians, computer scientists, physicists, and chemists.
Related Papers (5)