Open AccessJournal Article
Digital watermarking
TLDR
A large number of the questioned people believe that watermarking should be placed in the intermediate area according to its severity in the sanction system, but the exact rules and regulations are still unclear.Abstract:
................................................................................................................................................. 7 1.0 Introduction of Digital Watermarking ................................................................................................ 7 2.0 Watermarking ................................................................................................................................... 8 2.1 Definition of Watermarking ........................................................................................................... 8 2.2 Principle of Watermarking ............................................................................................................. 9 3.0 Requirements .................................................................................................................................. 10 3.1 Transparency: .............................................................................................................................. 10 3.2 Robustness: ................................................................................................................................. 10 3.3 Capacity or Data Load: ................................................................................................................. 10 4.0 Applications ..................................................................................................................................... 10 4.1 Copyright Protection: ................................................................................................................... 10 4.2 Authentication: ............................................................................................................................ 10 4.3 Broadcast Monitoring: ................................................................................................................. 10 4.4 Content Labeling: ......................................................................................................................... 10 4.5 Tamper Detection: ....................................................................................................................... 10 4.6 Digital Fingerprinting: .................................................................................................................. 10 4.7 Content protection: ..................................................................................................................... 11 5.0 Classifications of Watermarking ....................................................................................................... 11 5.1 Visible .......................................................................................................................................... 11 5.2 Invisible ....................................................................................................................................... 11 5.2.1 Robust Watermarks .............................................................................................................. 11 5.2.2 Fragile Watermarks ............................................................................................................... 11 5.2.3 Public and Private Watermark ............................................................................................... 12 5.3 Capacity ....................................................................................................................................... 12 5.4 Perceptibility ............................................................................................................................... 12 5.5 Embedding Techniques: ............................................................................................................... 12 5.5.1 Spread Spectrum ................................................................................................................... 12 Digital Watermarking 4 Abrar Ahmed Syed 1000614216 5.5.2 Quantization ......................................................................................................................... 12 5.5.3 Amplitude Modification: ....................................................................................................... 12 6.0 Techniques or Schemes of Watermarking ........................................................................................ 13 6.1 Spatial Domain Techniques .......................................................................................................... 13 6.1.1 Least Significant Bit Coding (LSB) ........................................................................................... 13 6.1.2 Predictive Coding Schemes .................................................................................................... 13 6.1.3 Correlation-Based Techniques ............................................................................................... 13 6.1.4 Patchwork Techniques .......................................................................................................... 14 6.2 Frequency Domain techniques ..................................................................................................... 14 6.2.1 Discrete cosine transform (DCT) based technique: ................................................................ 14 6.3 Wavelet Transform based Watermarking ..................................................................................... 18 6.4 Simple Watermarking .................................................................................................................. 19 7.0 Attacks ............................................................................................................................................ 20 7.1 Basic ............................................................................................................................................ 20 7.2 Robustness .................................................................................................................................. 20 7.3 Presentation ................................................................................................................................ 20 7.4 Interpretation .............................................................................................................................. 21 7.5 Implementation ........................................................................................................................... 21 7.6 Removal....................................................................................................................................... 21 7.7 Geometrical ................................................................................................................................. 22 7.8 Cryptographic .............................................................................................................................. 22 7.9 Active & Passive ........................................................................................................................... 22 7.10 Forgery ...................................................................................................................................... 22 7.11 Collusion .................................................................................................................................... 22 7.12 Distortive ................................................................................................................................... 23 8.0 Counter Attacks ............................................................................................................................... 23 8.1 Power Spectrum Condition (PSC) ................................................................................................. 23 8.2 Noise Visibility Function (NVF): .................................................................................................... 24 9.0 Privacy Laws of Watermarking ......................................................................................................... 25 10.0 Project Goal ................................................................................................................................... 25 10.1 Invisible Watermarking (Least significant bit Watermarking) ...................................................... 25 10.1.1 Steps ................................................................................................................................... 25 Digital Watermarking 5 Abrar Ahmed Syed 1000614216 10.1.2 Program .............................................................................................................................. 26 10.1.3 Algorithm Explanation ......................................................................................................... 28 10.1.14 Flow-chart: ........................................................................................................................ 31 10.1.5 Results: ............................................................................................................................... 31 10.2 Visible Watermarking – Concatenation ...................................................................................... 33 10.2.1 Steps ................................................................................................................................... 33 10.2.2 Program: ............................................................................................................................. 33 10.2.3 Algorithm Explanation ......................................................................................................... 36 10.2.4 Flow-chart ........................................................................................................................... 38 10.2.5 Result ..............................................................................................read more
Citations
More filters
Proceedings ArticleDOI
An Efficient Block-by-Block SVD-Based Image Watermarking Scheme
TL;DR: This paper presents a block based digital image watermarking that is dependent on the mathematical technique of singular value decomposition (SVD) and makes the watermark more robust to the attacks such as noise, compression, cropping and other attacks as the results reveal.
Book ChapterDOI
Survey of Watermarking Techniques and Applications
Edin Muharemagic,Borko Furht +1 more
TL;DR: A recent proliferation and success of the Internet, together with availability of relatively inexpensive digital recording and storage devices has created an environment in which it became very easy to obtain, replicate and distribute digital content without any loss in quality.
Book
Data Engineering: Mining, Information and Intelligence
TL;DR: The book will be the first to categorize and synthesize the diverse methodologies that are used in these interrelated fields into a structured approach entitled, Data Engineering.
Proceedings ArticleDOI
Robust watermark extraction using SVD-based dynamic stochastic resonance
TL;DR: A novel dynamic stochastic resonance-based non-blind watermark extraction technique has been proposed for robust extraction of a grayscale watermark and can be done without trading-off with visual quality of the watermarked image.
Book ChapterDOI
A Novel Wavelet Image Watermarking Scheme Combined with Chaos Sequence and Neural Network
TL;DR: A method for watermarking of chaos and neural network that can be successfully detected even after rotation, translation, scaling and is good at protecting from many kind watermark attacks is proposed.
References
More filters
Journal ArticleDOI
Discrete Cosine Transform
TL;DR: In this article, a discrete cosine transform (DCT) is defined and an algorithm to compute it using the fast Fourier transform is developed, which can be used in the area of digital processing for the purposes of pattern recognition and Wiener filtering.
Journal ArticleDOI
The JPEG still picture compression standard
TL;DR: The author provides an overview of the JPEG standard, and focuses in detail on the Baseline method, which has been by far the most widely implemented JPEG method to date, and is sufficient in its own right for a large number of applications.
Journal ArticleDOI
DCT-domain watermarking techniques for still images: detector performance analysis and a new structure
TL;DR: Analysis of a spread-spectrum-like discrete cosine transform (DCT) domain watermarking technique for copyright protection of still digital images is analyzed and analytical expressions for performance measures are derived and contrasted with experimental results.
Journal Article
Watermarking digital image and video data
TL;DR: A chuck has a chuck body rotatable about an axis and formed with a plurality of angularly spaced radially extending inner guides and a plurality that is radially displaceable in each of the inner guides.
Journal ArticleDOI
Attacks on digital watermarks: classification, estimation based attacks, and benchmarks
TL;DR: The current work of the European Certimark project is summarized, whose goal is to accelerate efforts from a number of research groups and companies in order to produce an improved ensemble of benchmarking tools.