scispace - formally typeset
Journal ArticleDOI

Robust reference-watermarking scheme using wavelet packet transform and bidiagonal-singular value decomposition

TLDR
This paper presents a new robust reference watermarking scheme based on wavelet packet transform (WPT) and bidiagonal singular value decomposition (bSVD) for copyright protection and authenticity that is able to withstand a variety of attacks.
Abstract
This paper presents a new robust reference watermarking scheme based on wavelet packet transform (WPT) and bidiagonal singular value decomposition (bSVD) for copyright protection and authenticity. A small gray scale logo is used as watermark instead of randomly generated Gaussian noise type watermark. A reference watermark is generated by original watermark and the process of embedding is done in wavelet packet domain by modifying the bidiagonal singular values. For the robustness and imperceptibly, watermark is embedded in the selected sub-bands, which are selected by taking into account the variance of the sub-bands, which serves as a measure of the watermark magnitude that could be imperceptibly embedded in each block. For this purpose, the variance is calculated in a small moving square window of size Sp × Sp (typically 3 × 3 or 5 × 5 window) centered at the pixel. A reliable watermark extraction is developed, in which the watermark bidiagonal singular values are extracted by considering the distortion caused by the attacks in neighboring bidiagonal singular values. Experimental evaluation demonstrates that the proposed scheme is able to withstand a variety of attacks and the superiority of the proposed method is carried out by the comparison which is made by us with the existing methods.

read more

Citations
More filters
Journal ArticleDOI

Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform

TL;DR: A novel biometrically generated keys in the embedding process of a gray-scale watermark using a newly proposed mathematical transform, namely the fractional dual tree complex wavelet transform (FrDT-CWT), and singular value decomposition (SVD) are used.
Journal ArticleDOI

A new robust adjustable logo watermarking scheme

TL;DR: A novel, yet simple, watermarking algorithm for image authentication is proposed using fractional wavelet packet transform (FRWPT) via singular value decomposition (SVD), based on embedding in the singular values (luminance) of the host image.
Journal ArticleDOI

Robust watermarking using fractional wavelet packet transform

TL;DR: The concept of fractional wavelet packet transform is explored with its application in digital watermarking and a reliable watermark extraction algorithm is developed for the extraction of watermark from the distorted image.
Journal ArticleDOI

Robust gray-scale logo watermarking in wavelet domain

TL;DR: The experimental results show better visual imperceptibility and resiliency of the proposed scheme against intentional or un-intentional variety of attacks and superiority is carried out by comparison made by us with the existing schemes.
Journal ArticleDOI

Image watermarking based on matrix decomposition and gyrator transform in invariant integer wavelet domain

TL;DR: The redistributed invariant integer wavelet transform is proposed, which has real reversibility and can transform an image into the invariant domain where the pixel values are all integers, and a new method for finding the singular value of an image matrix by QR decomposition and singular value decomposition is given.
References
More filters
Proceedings ArticleDOI

Embedding a seal into a picture under orthogonal wavelet transform

J. Ohnishi, +1 more
TL;DR: It is clear from the presented experimental results that the seal does not prevent one from seeing the picture comfortably and it seems that this method could be used for signing one's name in multimedia.
Journal ArticleDOI

A new robust watermark embedding into wavelet DC components

TL;DR: A non‐blind watermarking method that embeds a pseudo‐random sequence (watermarks) into wavelet DC components that simultaneously provides good fidelity in quality as well as robustness against external attacks is proposed.
Journal ArticleDOI

Four alternative patterns of the Hilbert curve

TL;DR: Four more patterns of the Hilbert curve are presented, together with Hilbert's original pattern and Moore's pattern, which comprise a complete set ofThe Hilbert curve.
Proceedings ArticleDOI

An image watermarking scheme with hidden signatures

TL;DR: A watermarking technique for embedding digital seal images into a digital image, and applies this technique to each spatial and frequency domain of an image, which not only simplifies the encoding process but also makes up for the weak point which could be shown when an illegal attacker makes proving ownership difficult by creating a fake original.
Journal Article

Extraction of multiresolution watermark images for resolving rightful ownership

TL;DR: In this article, the authors proposed a system which is capable of embedding a good resolution meaningful binary watermark image and later extracting different versions of that watermark images with varying resolutions.
Related Papers (5)