scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

DCT and SVD Based New Watermarking Scheme

TL;DR: A reliable watermark extraction scheme is developed for the extraction of watermark from the distorted images and it is demonstrated that the proposed scheme is able to withstand a variety of attacks.
Abstract: This paper presents a new human visual system (HVS) based adaptive digital watermarking scheme using discrete cosine transformation (DCT) and singular value decomposition (SVD) for copyright protection. For watermark embedding mask of the original image is computed using HVS model and original image is transformed into frequency domain using DCT. We embed watermark by modifying the singular values of DCT coefficient of the original image, by singular values of mask coefficient of original image and singular values of watermark logo. A reliable watermark extraction scheme is developed for the extraction of watermark from the distorted images. Experimental evaluation demonstrates that the proposed scheme is able to withstand a variety of attacks.
Citations
More filters
Journal ArticleDOI
TL;DR: Improved adaptive performance of the proposed scheme is in resistant to several types of attacks in comparison with the previous schemes; the adaptive performance refers to the adaptive parameter of the luminance masking functioned to improve the performance or robustness of an image from any attacks.
Abstract: This paper proposes an adaptive watermarking scheme for e-government document images. The adaptive scheme combines the discrete cosine transform (DCT) and the singular value decomposition (SVD) using luminance masking. As a core of masking model in the human visual system (HVS), luminance masking is implemented to improve noise sensitivity. Genetic algorithm (GA), subsequently, is employed for the optimization of the scaling factor of the masking. Involving a number of steps, the scheme proposed through this study begins by calculating the mask of the host image using luminance masking. It is then continued by transforming the mask on each area into all frequencies domain. The watermark image, following this, is embedded by modifying the singular values of DCT-transformed host image with singular values of mask coefficient of host image and the control parameter of DCT-transformed watermark image using Genetic Algorithm (GA). The use of both the singular values and the control parameter respectively, in this case, is not only to improve the sensitivity of the watermark performance but also to avoid the false positive problem. The watermark image, afterwards, is extracted from the distorted images. The experiment results show the improved adaptive performance of the proposed scheme is in resistant to several types of attacks in comparison with the previous schemes; the adaptive performance refers to the adaptive parameter of the luminance masking functioned to improve the performance or robustness of an image from any attacks.

85 citations

Journal ArticleDOI
TL;DR: Soft computing based watermarking approaches providing robustness, imperceptibility and good embedding capacity are compared systematically and major issues and potential solutions for soft computing-basedWatermarking are discussed to encourage further research in this area.
Abstract: Image watermarking techniques are used to provide copyright protection and verify ownership of media/entities. This technique refers to the concept of embedding of secret data/information of an owner in a given media/entity for determining any ownership conflicts that can arise. Many watermarking approaches have been offered by various authors in the last few years. However, there are not enough studies and comparisons of watermarking techniques in soft computing environments. Nowadays, soft computing techniques are used to improve the performance of watermarking algorithms. This paper surveys soft computing-based image watermarking for several applications. We first elaborate on novel applications, watermark characteristics and different kinds of watermarking systems. Then, soft computing based watermarking approaches providing robustness, imperceptibility and good embedding capacity are compared systematically. Furthermore, major issues and potential solutions for soft computing-based watermarking are also discussed to encourage further research in this area. Thus, this survey paper will be helpful for researchers to implement an optimized watermarking scheme for several applications.

40 citations

Journal ArticleDOI
01 Apr 2019
TL;DR: By skipping blocks which are not robust against attacks, the robustness of the proposed watermarking method is significantly improved and the method is completely imperceptible because the watermark pattern is concealed without modifying the original host image.
Abstract: In this paper a new robust image watermarking algorithm based on blocks classification and visual cryptography (VC) is presented. First the original image is decomposed into non-overlapping blocks. Then, we use canny edge detection and the support vector machine (SVM) classification method to categorize these blocks into smooth and non-smooth classes. The VC technique is used to generate two image shares: A master share that is constructed according to the block classification results and an owner share generated by using the master share together with a binary watermark. To verify the ownership of the image, the watermark can be retrieved by stacking the master share and the owner share. By skipping blocks which are not robust against attacks, the robustness of our proposed watermarking method is significantly improved. Our method is completely imperceptible because the watermark pattern is concealed without modifying the original host image.

27 citations

Proceedings ArticleDOI
01 Feb 2017
TL;DR: Analysis and experimental outcomes show that the presented scheme is rich in terms of imperceptibility, robustness, capacity and security from earlier proposed schemes.
Abstract: In the present scenario Digital image watermarking is a powerful method for solving the problems of tamper detection, rightful ownership, copyright protection and content authentication. In this papera secure hybrid digital image watermarking scheme based on Redundant Discrete wavelet transform (RDWT), Discrete Cosine Transform (DCT) and Singular value decomposition (SVD) in zigzag order with Arnold transform is presented. Watermark image is scrambled by Arnold transform to boost up its secrecy and robustness. In presented scheme, a gray scale cover image is rearranged through zigzag sequence and then RDWT is implemented on this reordered cover image. After that DCT, SVD is implemented on mid and high frequency sub-bands (LH, LH, and HH) of cover image and modified the singular values of these sub-bands by embedding the scrambled gray scale watermark image. This presented scheme is more imperceptible and an enormous capacity due to the properties of RDWT and SVD. The benefit of the presented schemeis more robust and secured against various image processing attacks. Analysis and experimental outcomes show that the presented scheme is rich in terms of imperceptibility, robustness, capacity and security from earlier proposed schemes.

11 citations


Cites background from "DCT and SVD Based New Watermarking ..."

  • ...The singular values have good constancy property means the minordeviation of singular values do not affect the image imperceptibility [2,5,23]and the analogues combination of singular matrix identifies the image geometry....

    [...]

Journal ArticleDOI
TL;DR: It is discovered the reason that error is generated during DCT and IDCT, and its influence on watermarking embedding and extracting, as well as the basic change rule of the pixel value matrix of the host image during watermarked embedding.
Abstract: DCT-based transformed domain watermarking algorithm has some flaws In the aspects of embedding position, embedding strength and embedding method , which have an important influence on watermarking embedding and watermarking extracting . In this paper we discussed these key techniques on DCT-based transformed domain watermarking algorithm and spatial domain digital watermarking algorithm, and their advantages and disadvantages respectively. We discovered the reason that error is generated during DCT and IDCT, and its influence on watermarking embedding and extracting , as well as the basic change rule of the pixel value matrix of the host image during watermarking embedding. On the basis of our analysis, a DCT-based spatial domain digital watermarking algorithm wa s proposed, which fully leverage d the discovered change rule during watermarking embedding using DCT-based transformed domain algorithm. Experimental results show ed that the algorithm had the advantages of spatial domain algorithm and transformed domain algorithm and overcame some of their disadvantages. And itt was superior to DCT-base transformed domain watermarking algorithm. In addition, our work has the certain reference significance to other fields using DCT and IDCT. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3323

7 citations


Cites methods from "DCT and SVD Based New Watermarking ..."

  • ...Himanshu [8] combined Singular Value Decomposition (SVD) [9] with DCT and proposed a novel watermarking algorithm....

    [...]

References
More filters
Journal ArticleDOI
TL;DR: A new quantitative fidelity measure, termed as peak signal-to-perceptible-noise ratio (PSPNR), is proposed to assess the quality of the compressed image by taking the perceptible part of the distortion into account.
Abstract: To represent an image of high perceptual quality with the lowest possible bit rate, an effective image compression algorithm should not only remove the redundancy due to statistical correlation but also the perceptually insignificant components from image signals. In this paper, a perceptually tuned subband image coding scheme is presented, where a just-noticeable distortion (JND) or minimally noticeable distortion (MND) profile is employed to quantify the perceptual redundancy. The JND profile provides each signal being coded with a visibility threshold of distortion, below which reconstruction errors are rendered imperceptible. Based on a perceptual model that incorporates the threshold sensitivities due to background luminance and texture masking effect, the JND profile is estimated from analyzing local properties of image signals. According to the sensitivity of human visual perception to spatial frequencies, the full-band JND/MND profile is decomposed into component JND/MND profiles of different frequency subbands. With these component profiles, perceptually insignificant signals in each subband can be screened out, and significant signals can be properly encoded to meet the visibility threshold. A new quantitative fidelity measure, termed as peak signal-to-perceptible-noise ratio (PSPNR), is proposed to assess the quality of the compressed image by taking the perceptible part of the distortion into account. Simulation results show that near-transparent image coding can be achieved at less than 0.4 b/pixel. As compared to the ISO-JPEG standard, the proposed algorithm can remove more perceptual redundancy from the original image, and the visual quality of the reconstructed image is much more acceptable at low bit rates.

650 citations

Proceedings ArticleDOI
16 Sep 1996
TL;DR: The watermark can be constructed to make counterfeiting almost impossible, and the same digital watermarking algorithm can be applied to all three media under consideration with only minor modifications, making it especially appropriate for multimedia products.
Abstract: We describe a digital watermarking method for use in audio, image, video and multimedia data. We argue that a watermark must be placed in perceptually significant components of a signal if it is to be robust to common signal distortions and malicious attack. However, it is well known that modification of these components can lead to perceptual degradation of the signal. To avoid this, we propose to insert a watermark into the spectral components of the data using techniques analogous to spread spectrum communications, hiding a narrow band signal in a wideband channel that is the data. The watermark is difficult for an attacker to remove, even when several individuals conspire together with independently watermarked copies of the data. It is also robust to common signal and geometric distortions such as digital-to-analog and analog-to-digital conversion, resampling, quantization, dithering, compression, rotation, translation, cropping and scaling. The same digital watermarking algorithm can be applied to all three media under consideration with only minor modifications, making it especially appropriate for multimedia products. Retrieval of the watermark unambiguously identifies the owner, and the watermark can be constructed to make counterfeiting almost impossible. We present experimental results to support these claims.

590 citations

Reference BookDOI
03 Feb 2004
TL;DR: In this paper, the authors present an Information Theoretic Perspective Bibliography Index of Information Coding Data Embedding Data Concealment Data Recovery Watermark Impairments and Benchmarking Security Issues
Abstract: Introduction Applications c Information Coding Data Embedding Data Concealment Data Recovery Watermark Impairments and Benchmarking Security Issues An Information Theoretic Perspective Bibliography Index.

297 citations


"DCT and SVD Based New Watermarking ..." refers background in this paper

  • ...[7] summarized the observations and experiments and gave the following three rules, which are the foundation of the spatial masking in this paper: Disturbs are much less visible in highly textured regions than in uniform areas....

    [...]

Journal ArticleDOI
TL;DR: A new semi-blind reference watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition (SVD) for copyright protection and authenticity and it is shown that the proposed scheme also stands with the ambiguity attack also.

269 citations


"DCT and SVD Based New Watermarking ..." refers background in this paper

  • ...This is due to the fact that when image is inverse transformed, watermark is distributed irregularly over the image, making the attacker difficult to read or modify the watermark.[1]....

    [...]

Proceedings ArticleDOI
27 Jun 1994
TL;DR: In this article, a subband coding scheme based on estimation and exploitation of just-noticeable-distortion (JND) profile is presented to maintain high image quality with low bit-rates.
Abstract: To maintain high image quality with low bit-rates, an effective coding algorithm should not only remove statistical correlation but also perceptual redundancy from image signals. A subband coding scheme based on estimation and exploitation of just-noticeable-distortion (JND) profile is presented. >

211 citations