scispace - formally typeset
Proceedings ArticleDOI

Digital signature of color images using amplitude modulation

Reads0
Chats0
TLDR
A new method based on amplitude modulation is presented that has shown to be resistant to both classical attacks, such as filtering, and geometrical attacks and can be extracted without the original image.
Abstract
Watermarking techniques, also referred to as digital signature, sign images by introducing changes that are imperceptible to the human eye but easily recoverable by a computer program. Generally, the signature is a number which identifies the owner of the image. The locations in the image where the signature is embedded are determined by a secret key. Doing so prevents possible pirates from easily removing the signature. Furthermore, it should be possible to retrieve the signature from an altered image. Possible alternations of signed images include blurring, compression and geometrical transformations such as rotation and translation. These alterations are referred to as attacks. A new method based on amplitude modulation is presented. Single signature bits are multiply embedded by modifying pixel values in the blue channel. These modifications are either additive or subtractive, depending on the value of the bit, and proportional to the luminance. This new method has shown to be resistant to both classical attacks, such as filtering, and geometrical attacks. Moreover, the signature can be extracted without the original image.

read more

Citations
More filters
Posted Content

Persistent and Unforgeable Watermarks for Deep Neural Networks.

TL;DR: This work proposes two new training techniques (out-of-bound values and null-embedding) that provide persistence and limit the training of certain inputs into trained models, and introduces "wonder filters", a new primitive that embeds a persistent bit-sequence into a model, but only at initial training time.
Proceedings ArticleDOI

Color image watermarking using SVD

TL;DR: Simulation results show that the proposed digital color image watermarking method using Singular Value Decomposition (SVD) is successful in resolving the rightful ownership of the watermarked image with good robustness, good imperceptibility and higher security.
Proceedings ArticleDOI

OCTALIS benchmarking : comparison of four watermarking techniques

TL;DR: In this paper, benchmarking results of watermarking techniques are presented, including evaluation of the watermark robustness and the subjective visual image quality, and exhaustively tested four different algorithms are compared.
Patent

Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management

TL;DR: In this article, a distributed model for digital distribution of content which combines the security of a digital watermark with efficient barter mechanisms for handling the actual delivery of digital goods is proposed.
Patent

Apparatus to analyze security features on objects

TL;DR: In this article, a light source for illuminating a physical object with first non-visible light, the physical object comprising a first code providing with a first ink or dye and a second code provided with an emission decay time that is relatively longer than an emissions decay time of the first ink and dye, with the second code individually conveying a second feature after emissions attributable to the first code fall to a first level.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.