scispace - formally typeset
Search or ask a question
Journal ArticleDOI

A Watermarking Technique based on the Frequency Domain

TL;DR: The experimental results have demonstrated that the proposed scheme has satisfied the basic requirements of watermarking such as robustness and imperceptible, and can used to resist the JPEG attach and avoid the some weaknesses of JPEG quantification.
Abstract: A watermarking technique based on the frequency domain is presented in this paper. The one of the basic demands for the robustness in the watermarking mechanism should be able to dispute the JPEG attack since the JPEG is a usually file format for transmitting the digital content on the network. Thus, the proposed algorithm can used to resist the JPEG attach and avoid the some weaknesses of JPEG quantification. And, the information of the original host image and watermark are not needed in the extracting process. In addition, two important but conflicting parameters are adopted to trade-off the qualities between the watermarked image and the retrieve watermark. The experimental results have demonstrated that the proposed scheme has satisfied the basic requirements of watermarking such as robustness and imperceptible.
Citations
More filters
Journal ArticleDOI
TL;DR: Results show that the proposed scheme in this paper is robust against many image attacks, and improvement can be observed when compared to other existing schemes.
Abstract: To protect the copyright of digital image, this paper proposed a combined Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) based watermarking scheme. To embed the watermark, the cover image was decomposed by a 2-level DWT, and the HL2 sub-band coefficient was divided into 4x4 blocks, then the DCT was performed on each of these blocks. The watermark bit was embedded by predefined pattern_0 or pattern_1 on the middle band coefficients of DCT. After watermark insertion, inverse DCT was applied to each of the 4x4 blocks of HL2 sub-band coefficient, and inverse DWT was applied to obtain the watermarked image. For watermark extraction, the watermarked image, which may be attacked by various image attacks, was decomposed with 2-level DWT and DCT similarly as watermark embedding process, then correlation between middle band coefficients of block DCT and the predefined pattern (pattern_0 and pattern_1) was calculated to decide whether a bit 0 or a bit 1 was embedded. Genetic algorithm was used for embedding and extraction parameters optimization. Optimization is to maximize PSNR of the watermarked image and NCC of the extracted watermark. Experiment results show that the proposed scheme in this paper is robust against many image attacks, and improvement can be observed when compared to other existing schemes.

28 citations


Cites background from "A Watermarking Technique based on t..."

  • ...Based on the resistance to attacks, it can be divided into robust watermarking [1-5], fragile watermarking [6-8] and semi-fragile watermarking algorithms [9-11]....

    [...]

Proceedings ArticleDOI
01 Feb 2016
TL;DR: A transform domain approach in YCbCr color space is proposed for enhancing the performance of a watermarking system, employing the unique combination of 2-Level Discrete Wavelet Transform (DWT), Discrete Fourier Transform (DFT) and Singular Value Decomposition (SVD).
Abstract: Digital image authentication under varying transmission and acquisition conditions is very challenging and efficient watermarking is an effective approach to solve this problem. In this paper, we propose a transform domain approach in YCbCr color space for enhancing the performance of a watermarking system, employing the unique combination of 2-Level Discrete Wavelet Transform (DWT), Discrete Fourier Transform (DFT) and Singular Value Decomposition (SVD). Individual stages of the system are examined and an attempt is made to improve each stage. YCbCr color space is utilized to make use of its decorrelation property in order to improve correlation between original and watermarked image. DWT stage selectively utilizes the horizontal and vertical detail coefficients of the 2-dimensional DWT of an image. The translation variance problem of the DWT is compensated in the following DFT stage, which also exploits the frequency characteristics of the image. Finally SVD is used to embed the watermark data. The method gives better results in terms of increased PSNR values and is able to withstand a variety of image processing attacks.

19 citations


Cites background from "A Watermarking Technique based on t..."

  • ...[4] which is robust to JPEG compression but susceptible to geometric distortions....

    [...]

Journal ArticleDOI
TL;DR: Simulation results show this combined watermarking method based on Discrete Wavelet Transform and Discrete Cosine Transform is robust against JPEG attacks and many other strong attacks.
Abstract: Digital watermarking is a technique for resolving copyright law in E-Commerce. In this article a combined watermarking method based on Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) is proposed. For embedding watermark, a cover image is decomposed by a 2-level DWT, and the HL2 subband coefficients are divided into 4 × 4 blocks, then the DCT is performed on each of these blocks. The watermark bits are embedded by predefined pattern_0 or pattern_1 on the middle band coefficients of DCT. After inserting watermark, inverse DCT is applied to each 4 × 4 blocks of HL2 subband coefficients, and inverse DWT is applied to obtain the watermarked image. For watermark extraction, the watermarked image, which may be attacked by various image attacks, is decomposed with 2-level DWT and DCT similarly as watermark embedding process, then correlation between middle band coefficients of block DCT and the predefined pattern (pattern_0 and pattern_1) is calculated to decide whether a 0 bit or a 1...

18 citations

Journal ArticleDOI
TL;DR: Simulation results demonstrate that the proposed algorithm can estimate frequency offset accurately, guarantee the reliance and reduce complexity in comparison with the normal methods.
Abstract: Frequency offset estimation is an important module in the downlink synchronization process of orthogonal frequency division multiplexing (OFDM) system. Research on frequency synchronization of OFDM, a low-complexity and efficient method is proposed to evaluate frequency offset in this paper. In general, maximum likelihood (ML) based on cyclic prefix (CP) and primary synchronization signal (PSS) frequency-domain cross-correlation algorithm are applied for fractional carrier frequency offset estimation. PSS time-domain cross-correlation algorithm is used to estimate integral carrier frequency offset. However, for fractional carrier frequency estimation, the performance of ML based on CP degrades in fading channel. The complexity of the other algorithm is high. Also, the conventional integral carrier frequency estimation requires cross-correlation between the received PSS and local PSS or auto-correlation of received PSS, so they also have great complexity. In this paper, relying on the PSS time center-symmetric property, we perform PSS auto-correlation method twice in the time domain. Hence fractional carrier frequency offset is obtained and compensated. Next, relying on the PSS frequency center-symmetric property, we perform energy difference computations to estimate the integral carrier frequency offset, which is equal to the distance between the calculated minimum and the central frequency in frequency domain. Simulation results demonstrate that the proposed algorithm can estimate frequency offset accurately, guarantee the reliance and reduce complexity in comparison with the normal methods

10 citations


Cites background from "A Watermarking Technique based on t..."

  • ...Orthogonal Frequency Division Multiplexing (OFDM) is the core technology in LTE downlink, which has high effective spectrum, high peak value rate and is able to resist the channel interference, frequency selective fading and pulse noise [18, 19]....

    [...]

Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors proposed a robust blind video watermark algorithm in transform domain combining with 3D video correlation, which can significantly improve the robustness of 3D watermark against resolution attack and coding attack.
Abstract: According to the features of DCT-based and DFT-based video watermark algorithms against attacks and considering 3D video structural characteristic, a new robust blind video watermark algorithm in transform domain combining with 3D video correlation is proposed. DCT-based watermark and DFT-based watermark are embedded in left and right images of a video frame using opposite embedding rules, and the watermark can be extracted by integrating 3D video correlation, and more robust watermark is extracted from the DCT-based watermark and the DFT-based watermark by comparing their performance. The algorithm can significantly improve the robustness of 3D video watermark against resolution attack and coding attack. The experimental results show that the proposed algorithm has excellent performance against resolution attack and coding attack, and is obviously better than DCT-based and DFT-based algorithms.

7 citations

References
More filters
Journal ArticleDOI
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Abstract: This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. We argue that insertion of a watermark under this regime makes the watermark robust to signal processing operations (such as lossy compression, filtering, digital-analog and analog-digital conversion, requantization, etc.), and common geometric transformations (such as cropping, scaling, translation, and rotation) provided that the original image is available and that it can be successfully registered against the transformed watermarked image. In these cases, the watermark detector unambiguously identifies the owner. Further, the use of Gaussian noise, ensures strong resilience to multiple-document, or collusional, attacks. Experimental results are provided to support these claims, along with an exposition of pending open problems.

6,194 citations


"A Watermarking Technique based on t..." refers methods in this paper

  • ...I. INTRODUCTION Digital watermarking is an effective and common technique to protect intellectual property rights [1-5]....

    [...]

Journal ArticleDOI
01 Jun 1998
TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Abstract: We review developments in transparent data embedding and watermarking for audio, image, and video. Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal. The embedded data are perceptually inaudible or invisible to maintain the quality of the source data. The embedded data can add features to the host multimedia signal, e.g., multilingual soundtracks in a movie, or provide copyright protection. We discuss the reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream. We also discuss the issues and problems associated with copy and copyright protection and assess the viability of current watermarking algorithms as a means for protecting copyrighted data.

1,023 citations


"A Watermarking Technique based on t..." refers methods in this paper

  • ...I. INTRODUCTION Digital watermarking is an effective and common technique to protect intellectual property rights [1-5]....

    [...]

Journal ArticleDOI
TL;DR: The experimental results show that the proposed image authentication technique by embedding digital "watermarks" into images successfully survives image processing operations, image cropping, and the Joint Photographic Experts Group lossy compression.
Abstract: An image authentication technique by embedding digital "watermarks" into images is proposed. Watermarking is a technique for labeling digital pictures by hiding secret information into the images. Sophisticated watermark embedding is a potential method to discourage unauthorized copying or attest the origin of the images. In our approach, we embed the watermarks with visually recognizable patterns into the images by selectively modifying the middle-frequency parts of the image. Several variations of the proposed method are addressed. The experimental results show that the proposed technique successfully survives image processing operations, image cropping, and the Joint Photographic Experts Group (JPEG) lossy compression.

892 citations


"A Watermarking Technique based on t..." refers methods in this paper

  • ...I. INTRODUCTION Digital watermarking is an effective and common technique to protect intellectual property rights [1-5]....

    [...]

Journal ArticleDOI
01 Jun 1995
TL;DR: The description of a conditional access system is given and it is shown that equitable systems need the use of a trusted third party.
Abstract: Digital TV broadcasting needs new cryptological tools for conditional access, copyright protection and image authentication. The aim of this paper is to overview the corresponding systems' features. The description of a conditional access system is given. It is shown that equitable systems need the use of a trusted third party. The design of efficient copyright protection by watermarking images and image authentication by signatures are also briefly discussed. >

486 citations


"A Watermarking Technique based on t..." refers methods in this paper

  • ...I. INTRODUCTION Digital watermarking is an effective and common technique to protect intellectual property rights [1-5]....

    [...]

Journal ArticleDOI
TL;DR: The proposed decoding scheme is able to cope with the alterations in features introduced by a new attack and achieves promising improvement in terms of bit correct ratio in comparison to the existing decoding scheme.

87 citations


"A Watermarking Technique based on t..." refers methods in this paper

  • ...Recently, the methods using the soft computing are introduced to optimum the scaling parameters intelligently in order to trade-off the qualities between the host image and the retrieved watermark [6, 14]....

    [...]