scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

A robust watermarking scheme based on image normalization

TL;DR: A new image watermarking framework for copyright protection is presented using image normalization, singular value decomposition (SVD) and dynamic stochastic resonance (DSR) to improve the robustness of the system.
Abstract: In this paper, a new image watermarking framework for copyright protection is presented using image normalization, singular value decomposition (SVD) and dynamic stochastic resonance (DSR). The image is first normalized using the geometric moments and then an ownership message is embedded by employing the singular value decomposition. Finally, a reliable extraction process based on dynamic stochastic resonance is proposed. The DSR phenomenon helps in the extraction of the watermark information and improves the robustness of the system. A sequence of experiments and analysis are regulated to verify the effectiveness and the higher degree of robustness, especially for the geometric attacks.
Citations
More filters
Journal ArticleDOI
TL;DR: A new blind image watermarking scheme using binary decimal sequence (d-sequence) and lifting wavelet transform (LWT) for copyright protection and the better robustness of the proposed scheme against different kind of attacks is demonstrated.
Abstract: This paper presents a new blind image watermarking scheme using binary decimal sequence (d-sequence) and lifting wavelet transform (LWT) for copyright protection. The core idea is to produce a d- sequence based on random number generator (RNG) algorithm and secret keys. A reference set is then generated using the d-sequence for embedding purpose. For embedding, the host image is decomposed into different frequency bands using the LWT and watermark bits are then embedded in selected band, considering the reference set. The extensive experimental results, comparative and security analysis demonstrate the better robustness of the proposed scheme against different kind of attacks.

8 citations

Journal ArticleDOI
TL;DR: A new robust watermarking framework is designed using the discrete cosine transform (DCT), binary decimal sequence (d-sequence) and Dn-structure to generate a binary d-sequence based on random number generator (RNG) and some secret keys.
Abstract: In this paper, a new robust watermarking framework is designed using the discrete cosine transform (DCT), binary decimal sequence (d-sequence) and Dn-structure. The core idea is to generate a binary d-sequence based on random number generator (RNG) and some secret keys. This binary sequence is then utilized to generate reference sets based on Dn-structure. For embedding purpose, the host image is transformed using DCT and selected coefficients are employed to construct a macro block. Each binary watermark bit is securely embedded into macro block by utilizing the reference set. The reverse process is finally formulated to extract the watermark at the receiver end. The proposed technique is experimentally analyzed using various quality metrics and attacks. The comprehensive experimental results illustrate that the proposed watermarking scheme is robust to both geometric distortions (resizing, cropping, wrapping and random row deletion) and general signal processing attacks (various noise addition, blurring, high pass filtering, image sharpening, contrast adjustment, Histogram equalization and gamma correction and JPEG compression) and outperforms state-of-the-art watermarking methods.

6 citations

Proceedings ArticleDOI
18 Dec 2018
TL;DR: A robust image hashing framework is presented using discrete cosine transformation and singular value decomposition that is resilient to different content-preserving image distortions such as geometric and filtering operations.
Abstract: In this paper, a robust image hashing framework is presented using discrete cosine transformation and singular value decomposition. Firstly, the input image is normalized using geometric moment and normalized coefficients are divided into non-overlapping blocks. The selected blocks based on a peace-wise non-linear chaotic map are transformed using discrete cosine transom followed by singular value decomposition. Then a feature matrix is constructed in reliance on Hessian matrix and the final hash values are obtained. The proposed hashing system is resilient to different content-preserving image distortions such as geometric and filtering operations. The simulated results demonstrate the efficiency proposed framework in terms of security and robustness.

3 citations

Journal ArticleDOI
TL;DR: The two issues of art image creation and data hiding are integrated into one and solved by a single approach in this study, which proposes an automatic method for generating a new type of computer art, called stained glass image, which imitates the stained-glass window picture.
Abstract: The two issues of art image creation and data hiding are integrated into one and solved by a single approach in this study. An automatic method for generating a new type of computer art, called stained glass image, which imitates the stained-glass window picture, is proposed. The method is based on the use of a tree structure for region growing to construct the art image. Also proposed is a data hiding method which utilizes a general feature of the tree structure, namely, number of tree nodes, to encode the data to be embedded. The method can be modified for uses in three information protection applications, namely, covert communication, watermarking, and image authentication. Besides the artistic stego-image content which may distract the hacker’s attention to the hidden data, data security is also considered by randomizing both the input data and the seed locations for region growing, yielding a stego-image which is robust against the hacker’s attacks. Good experimental results proving the feasibility of the proposed methods are also included. key words: computer art, stained glass image, data hiding, region growing, covert communication, watermarking, image authentication

2 citations


Cites methods from "A robust watermarking scheme based ..."

  • ...Furthermore, a new method for data hiding via such art images is proposed, which may be adapted to solve all the three issues of watermarking for copyright protection [13], [14], covert communication [11], [14], and image authentication [15], [16] just mentioned....

    [...]

Book ChapterDOI
01 Jan 2020
TL;DR: A novel security framework is presented in this chapter using a combination of zero watermarking and perceptual hashing to enhance the security of medical information systems and protect medical data.
Abstract: The security of medical images carrying important patient information and is a challenging issue when images are transmitted across public channels. These images are often faced with various kinds of intentional and unintentional attacks during the transmission process. To enhance the security of medical information systems and protect medical data, a novel security framework is presented in this chapter using a combination of zero watermarking and perceptual hashing. First, robust invariant features are extracted from the medical image using scale invariant feature transform and discrete cosine transform followed by a quantization process to generate the hash sequence. Finally, an encrypted watermark is used in the construction of a digital signature corresponding to the original medical images. Simulation results demonstrate that the proposed technique has greater influence on robustness against conventional attacks as well as geometric attacks.

2 citations

References
More filters
Proceedings ArticleDOI
01 Jan 2006
TL;DR: A Novel watermarking scheme based on stochastic resonance (SR) is introduced, and the median-frequency DCT components of all the 8times8 image blocks are randomly permuted to be an approximate white Gaussian noise.
Abstract: A Novel watermarking scheme based on stochastic resonance (SR) is introduced. SR has been studied extensively in the area of weak signal detection and baseband binary PAM signals transmission. In this paper, the watermark is viewed as weak binary signals, and the median-frequency DCT components of all the 8times8 image blocks are randomly permuted to be an approximate white Gaussian noise (WGN). When the watermark signals which are corrupted by the noise go through the well tuned nonlinear system, SR occurs and the output signal noise ratio is amplified. Then the watermark signals are recovered by judging whether the sum of the stable points is positive or not. The simulation has shown that the proposed watermarking scheme has the advantage of robustness, invisibility, and practicability

27 citations


"A robust watermarking scheme based ..." refers methods in this paper

  • ...In [11] authors have proposed a watermarking technique based on stochastic resonance whereas DSR phenomena is applied in SVD-DCT domain in [12]....

    [...]

Journal ArticleDOI
TL;DR: The security, attack and comparative analysis confirm high security, efficiency and robustness of the proposed watermarking technique and an efficient solution is proposed to deal with the ambiguous situations created by SVD in water marking.
Abstract: In this paper, a novel logo watermarking technique with key concept is proposed using fractional wavelet packet transform (FrWPT), non-linear chaotic map and singular value decomposition (SVD). The core idea is to use biometrically generated keys in the embedding process of gray-scale watermark. Therefore, this paper first proposes a method for generating keys from biometrics efficiently. Then the host image is first randomized with the help of non-linear chaotic map followed by the embedding in the FrWPT domain by modifying the singular values of the randomized image. Further, in order to enhance the security, an authentication key is formed to authenticate the watermarked image. Finally, a reliable extraction process is proposed to extracted watermark from the possibly attacked authenticate watermarked image. The security, attack and comparative analysis confirm high security, efficiency and robustness of the proposed watermarking technique. Further, an efficient solution is also proposed to deal with the ambiguous situations created by SVD in watermarking.

16 citations


"A robust watermarking scheme based ..." refers methods in this paper

  • ...A new decomposition namely singular value decomposition is proposed and combined with the various existing transforms for the watermark embedding [5]–[7]....

    [...]

Journal ArticleDOI
TL;DR: A novel dynamic stochastic resonance (DSR)-based technique for robust extraction of a grayscale logo from a tampered watermarked image and suggests that remarkable improvement of robustness is achieved by using DSR on singular values of DCT.
Abstract: This paper presents a novel dynamic stochastic resonance (DSR)-based technique for robust extraction of a grayscale logo from a tampered watermarked image. The watermark embedding is done on the singular values (SV) of the discrete cosine transform (DCT) coefficients of the cover image. DSR is then strategically applied during the logo extraction process where the SV of DCT coefficients are tuned following a double-well potential model by utilizing the noise introduced during attacks. The resilience of this technique has been tested in the presence of various noises, geometrical distortions, enhancement, compression, filtering and watermarking attacks. The proposed DSR-based technique for logo extraction gives noteworthy robustness without any significant trade-off in perceptual transparency of the watermarked image. A maximization approach has been adopted for the selection of bistable double-well parameters to establish noise-enhanced resonance. When compared with existing watermark extraction techniques based in SVD, DCT, SVD-DCT domains, as well as with their combination with DSR, the results suggest that remarkable improvement of robustness is achieved by using DSR on singular values of DCT.

15 citations


"A robust watermarking scheme based ..." refers background or methods in this paper

  • ...The selection of DSR parameter has been done as given in [12]....

    [...]

  • ...In [11] authors have proposed a watermarking technique based on stochastic resonance whereas DSR phenomena is applied in SVD-DCT domain in [12]....

    [...]

  • ...Attacks Proposed Ref [13] Ref [12] Noise Addition Gaussian noise addition (60%) 0....

    [...]

Proceedings ArticleDOI
29 Dec 2011
TL;DR: A novel dynamic stochastic resonance-based non-blind watermark extraction technique has been proposed for robust extraction of a grayscale watermark and can be done without trading-off with visual quality of the watermarked image.
Abstract: In this paper, a novel dynamic stochastic resonance (DSR)-based non-blind watermark extraction technique has been proposed for robust extraction of a grayscale watermark. The watermark embedding has been carried out using singular value decomposition (SVD). Dynamic stochastic resonance has been strategically used to improve the robustness of the extraction algorithm by utilizing the noise added during attacks itself. Resilience of this technique to attacks has been tested in the presence of various noise, geometrical, enhancement, compression and filtering attacks. Using the DSR-based proposed extraction algorithm, a very robust extraction of watermark can be done without trading-off with visual quality of the watermarked image. Performance of the proposed technique has also been compared with the plain SVD-based and hybrid DCT-SVD based technique and is found to give better performance.

15 citations


"A robust watermarking scheme based ..." refers background or methods in this paper

  • ...If the value of α is decreased then higher PSNR can be achieved but the robustness of the scheme can be effect....

    [...]

  • ...The basic mechanism of stochastic resonance shows that at larger noise intensity levels the output is driven by the noise, still at lower noise intensities, the weak coherent signal is incapable of traversing the threshold and entailing the lower SNR [13]....

    [...]

  • ...The quality of the watermarked image is measured by the peak signal to noise ratio (PSNR)....

    [...]

  • ...Attacks Proposed Ref [13] Ref [12] Noise Addition Gaussian noise addition (60%) 0....

    [...]

  • ...The propose scheme gives better performance when compare to SVD-DSR [13] and DCT-SVD-DSR [13] schemes which can be observed from Table I....

    [...]

Book ChapterDOI
01 Jan 2017
TL;DR: A novel logo watermarking framework is proposed using non-linear chaotic map to generate keys to be used in the embedding process, which reveals the efficiency and robustness of the proposed framework.
Abstract: In this paper, a novel logo watermarking framework is proposed using non-linear chaotic map. The essence of proposed technique is to use chaotic map to generate keys to be used in the embedding process. Therefore, a method for generating keys is first proposed followed by the embedding process. A robust extraction process is then proposed to verify the presence of watermark from the possibly attacked watermarked image. Experimental results and attack analysis reveal the efficiency and robustness of the proposed framework.

11 citations


"A robust watermarking scheme based ..." refers background in this paper

  • ...The former techniques are simple, less robust and requires less computation [2] while the latter techniques are highly intricate and comparatively robust....

    [...]