scispace - formally typeset
Open AccessJournal ArticleDOI

Novel blind multiple watermarking technique for images

TLDR
Experimental results show that embedded watermarks using the proposed techniques can give good image quality and are robust in varying degree to JPEG compression, low-pass filtering, noise contamination, and print-and-scan.
Abstract
Three novel blind watermarking techniques are proposed to embed watermarks into digital images for different purposes. The watermarks are designed to be decoded or detected without the original images. The first one, called single watermark embedding (SWE), is used to embed a watermark bit sequence into digital images using two secret keys. The second technique, called multiple watermark embedding (MWE), extends SWE to embed multiple watermarks simultaneously in the same watermark space while minimizing the watermark (distortion) energy. The third technique, called iterative watermark embedding (IWE), embeds watermarks into JPEG-compressed images. The iterative approach of IWE can prevent the potential removal of a watermark in the JPEG recompression process. Experimental results show that embedded watermarks using the proposed techniques can give good image quality and are robust in varying degree to JPEG compression, low-pass filtering, noise contamination, and print-and-scan.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Novel Method for Key Storage Systems

TL;DR: Wang et al. as mentioned in this paper proposed a new method for accessing and storing private keys using advanced features of watermarking and symmetric encryption, the shared private key slices are encrypted and stored in different boxes, and the entire private key is reconstructed as long as the boxes are effective.
Proceedings ArticleDOI

Security in collaborative multimedia art communities

TL;DR: The strength of this system considers multimedia content not as an atomic digital entity, but as a part of a project with a specific workflow that applies watermarking techniques in all its parts.
Proceedings ArticleDOI

Enhancing Robustness and Imperceptibility of Blind Watermarking with Improved Message Processor

TL;DR: Wang et al. as discussed by the authors proposed an improved blind watermarking method by using an improved message processor with sub-pixel convolution layers and low-frequency features and incorporating double discriminators to improve the performance of the network.
Journal Article

Two Dimensional Data Hiding using Haar Wavelet Filter

TL;DR: In this article, two dimensional data hiding using Haar Wavelet filter has been proposed, secret data is secured by Discrete Wavelet Transform (DWT) which is embedded into the mid frequency subband of a cover data by using variable mixing factor (k).
Book ChapterDOI

A watermarking algorithm for JPEG file

TL;DR: Wang et al. as discussed by the authors proposed a watermarking algorithm working directly on JPEG bit-stream, which embeds watermark bits by modifying de-quantized DC coefficients.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Book

Digital Watermarking

TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Journal ArticleDOI

Hidden digital watermarks in images

TL;DR: The experimental results show that the proposed image authentication technique by embedding digital "watermarks" into images successfully survives image processing operations, image cropping, and the Joint Photographic Experts Group lossy compression.
Journal ArticleDOI

DCT-domain watermarking techniques for still images: detector performance analysis and a new structure

TL;DR: Analysis of a spread-spectrum-like discrete cosine transform (DCT) domain watermarking technique for copyright protection of still digital images is analyzed and analytical expressions for performance measures are derived and contrasted with experimental results.
Journal ArticleDOI

Rotation, scale, and translation resilient watermarking for images

TL;DR: It is shown that the watermark is robust to rotation, scale, and translation, and tests examining the watermarks resistance to cropping and JPEG compression.
Related Papers (5)