scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Adaptive watermark mechanism for rightful ownership protection

01 Jul 2008-Journal of Systems and Software (Elsevier Science Inc.)-Vol. 81, Iss: 7, pp 1118-1129
TL;DR: This novel approach allows image owners to adjust the strength of watermarks through a threshold, so that the robustness of the watermark can be enhanced and preserves the data lossless requirement, so it is suitable for medical and artistic images.
About: This article is published in Journal of Systems and Software.The article was published on 2008-07-01. It has received 100 citations till now. The article focuses on the topics: Watermark & Digital watermarking.
Citations
More filters
Journal ArticleDOI
TL;DR: This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptographic Protocols algorithms and Source Code in C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online.

207 citations

Journal ArticleDOI
TL;DR: Experimental results indicate that the proposed stereo image zero- watermarking algorithm is strongly robust to various asymmetric and symmetric attacks and has superiority compared with other zero-watermarking algorithms.

177 citations

Journal ArticleDOI
TL;DR: Experimental results show that the proposed scheme for color medical image copyright protection based on a chaotic system and quaternion polar harmonic transforms (QPHTs) is robust to geometric attacks and common attacks and that it has better performance than similar lossless watermarking schemes.

126 citations

Journal ArticleDOI
TL;DR: An intelligent reversible watermarking approach GA-RevWM for medical images is proposed, based on the concept of block-based embedding using genetic algorithm and integer wavelet transform.

123 citations


Cites background from "Adaptive watermark mechanism for ri..."

  • ...I f M D a A R R A A K R I H G M 1 i P t m g o ( t 2 s r e s p 2 t w i m e i 0 d The Journal of Systems and Software 85 (2012) 883– 894 Contents lists available at SciVerse ScienceDirect The Journal of Systems and Software jo u rn al hom epage: www.elsev ier .com/ locate / j ss ntelligent reversible watermarking in integer wavelet domain or medical images uhammad Arsalan, Sana Ambreen Malik, Asifullah Khan ∗ epartment of Computer Science, Pakistan Institute of Engineering and Applied Sciences, Nilore-45650, Islamabad, Pakistan r t i c l e i n f o rticle history: eceived 30 September 2010 eceived in revised form 28 October 2011 ccepted 1 November 2011 vailable online 7 November 2011 a b s t r a c t The prime requirement of reversible watermarking scheme is that the system should be able to restore the cover work to its original state after extracting the hidden information....

    [...]

  • ...Therefore, security of digital content has ained much more importance and researchers have been develping approaches for protecting and authenticating digital content Chang and Lin, 2008)....

    [...]

  • ...…in integer wavelet domain or medical images uhammad Arsalan, Sana Ambreen Malik, Asifullah Khan ∗ epartment of Computer Science, Pakistan Institute of Engineering and Applied Sciences, Nilore-45650, Islamabad, Pakistan r t i c l e i n f o rticle history: eceived 30 September 2010 eceived…...

    [...]

Journal ArticleDOI
TL;DR: The study presents an adaptive reversible data scheme based on the prediction of difference expansion that yields high embedding capacity by taking full advantage of the large quantities of smaller difference values where secret data can be embedded.

103 citations

References
More filters
Journal ArticleDOI
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Abstract: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intented recipient. Only he can decipher the message, since only he knows the corresponding decryption key. (2) A message can be “signed” using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in “electronic mail” and “electronic funds transfer” systems. A message is encrypted by representing it as a number M, raising M to a publicly specified power e, and then taking the remainder when the result is divided by the publicly specified product, n, of two large secret primer numbers p and q. Decryption is similar; only a different, secret, power d is used, where e * d ≡ 1(mod (p - 1) * (q - 1)). The security of the system rests in part on the difficulty of factoring the published divisor, n.

14,659 citations


"Adaptive watermark mechanism for ri..." refers background in this paper

  • ...Hence, how to protect the integrity, validity, and ownership of digital multimedia is an important issue (Rivest et al., 1978; Katzenbeisser and Petitcolas, 2000; Chang et al., 2004; Nikolaidis and Pitas, 2004)....

    [...]

Journal ArticleDOI
TL;DR: An efficient and intuitive algorithm is presented for the design of vector quantizers based either on a known probabilistic model or on a long training sequence of data.
Abstract: An efficient and intuitive algorithm is presented for the design of vector quantizers based either on a known probabilistic model or on a long training sequence of data. The basic properties of the algorithm are discussed and demonstrated by examples. Quite general distortion measures and long blocklengths are allowed, as exemplified by the design of parameter vector quantizers of ten-dimensional vectors arising in Linear Predictive Coded (LPC) speech compression with a complicated distortion measure arising in LPC analysis that does not depend only on the error vector.

7,935 citations


"Adaptive watermark mechanism for ri..." refers methods in this paper

  • ...(a) Divide ‘Lena’ into non-overlapping blocks with 4 · 4 pixels; (b) Train a codebook containing 256 codewords by LBG algorithm (Linde et al., 1980); (c) Match the minimum distortion codeword to replace the original blocks....

    [...]

Journal ArticleDOI
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Abstract: This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. We argue that insertion of a watermark under this regime makes the watermark robust to signal processing operations (such as lossy compression, filtering, digital-analog and analog-digital conversion, requantization, etc.), and common geometric transformations (such as cropping, scaling, translation, and rotation) provided that the original image is available and that it can be successfully registered against the transformed watermarked image. In these cases, the watermark detector unambiguously identifies the owner. Further, the use of Gaussian noise, ensures strong resilience to multiple-document, or collusional, attacks. Experimental results are provided to support these claims, along with an exposition of pending open problems.

6,194 citations


"Adaptive watermark mechanism for ri..." refers methods in this paper

  • ...Before embedding a robust watermark into images, engineers usually apply two techniques, discrete cosine transformation (DCT) (Chang et al., 2002a,b; Cox et al., 1997) and wavelet transformation (DWT) (Kim et al....

    [...]

  • ...Before embedding a robust watermark into images, engineers usually apply two techniques, discrete cosine transformation (DCT) (Chang et al., 2002a,b; Cox et al., 1997) and wavelet transformation (DWT) (Kim et al., 1999; Barni et al., 2001; Chen et al., 2005), to transform pixels of the host image into its corresponding frequency domain....

    [...]

  • ...Namely, our scheme does not apply DCT and DWT mechanisms to the signing procedure....

    [...]

  • ...In this article, we propose an adaptive copyright protection scheme without the use of discrete cosine transformation (DCT) and discrete wavelet transformation (DWT)....

    [...]

  • ...Before embedding a robust watermark into images, engineers usually apply two techniques, discrete cosine transformation (DCT) (Chang et al., 2002a,b; Cox et al., 1997) and wavelet transformation (DWT) (Kim et al., 1999; Barni et al., 2001; Chen et al., 2005), to transform pixels of the host image…...

    [...]

Book
31 Dec 1999
TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.
Abstract: From the Publisher: Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, a description of possible applications, and a survey of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis," methods which can be used to break steganographic communication. This comprehensive resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities and differences to steganography. You gain a working knowledge of watermarking's pros and cons, and you learn the legal implications of watermarking and copyright issues on the Internet.

1,732 citations