scispace - formally typeset
Proceedings ArticleDOI

Digital signature of color images using amplitude modulation

Reads0
Chats0
TLDR
A new method based on amplitude modulation is presented that has shown to be resistant to both classical attacks, such as filtering, and geometrical attacks and can be extracted without the original image.
Abstract
Watermarking techniques, also referred to as digital signature, sign images by introducing changes that are imperceptible to the human eye but easily recoverable by a computer program. Generally, the signature is a number which identifies the owner of the image. The locations in the image where the signature is embedded are determined by a secret key. Doing so prevents possible pirates from easily removing the signature. Furthermore, it should be possible to retrieve the signature from an altered image. Possible alternations of signed images include blurring, compression and geometrical transformations such as rotation and translation. These alterations are referred to as attacks. A new method based on amplitude modulation is presented. Single signature bits are multiply embedded by modifying pixel values in the blue channel. These modifications are either additive or subtractive, depending on the value of the bit, and proportional to the luminance. This new method has shown to be resistant to both classical attacks, such as filtering, and geometrical attacks. Moreover, the signature can be extracted without the original image.

read more

Citations
More filters
Journal ArticleDOI

A capacity estimation technique for JPEG-to-JPEG image watermarking

TL;DR: The human visual system (HVS) model is used to estimate the J2J data hiding capacity of JPEG images, or the maximum number of bits that can be embedded in JPEG-compressed images.
Patent

Digital watermarking in data representing color channels

TL;DR: In this article, the authors present a method to detect two or more different digital watermarks in media, which includes: receiving captured imagery of the media, the captured imagery comprising a plurality of image frames; and for a first image frame applying a first watermark detector to search for the first digital watermark hidden within the first image frames, in which an electronic processor is programmed as the first watermarks detector.

Denoising and Copy Attacks Resilient Watermarking by Exploiting Prior Knowledge at Detector

TL;DR: Wang et al. as discussed by the authors used denoising for filtering out the hidden watermark, which can be utilized to create either a false positive (copy attack) or false negative (denoising and remodulation attack).
Journal ArticleDOI

Watermarking of digital geospatial datasets: a review of technical, legal and copyright issues

TL;DR: This paper analyses the state-of-the-art for watermarking protection in digital geographical datasets for 2D vector and point datasets, demonstrating digital imagery is demonstrably a more mature area than geographical information, even with multiple commercial vendors offering water marking protection.

A New Watermarking Technique for Multimedia Protection

TL;DR: A robust watermarking scheme for hiding binary or gray scale watermarks in digital images is proposed and a semi public watermark detector which does not require use of the original source is proposed for the purpose of authentication.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.