scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Stereo image coding via digital watermarking

01 Jul 2009-Journal of Electronic Imaging (International Society for Optics and Photonics)-Vol. 18, Iss: 3, pp 033012
TL;DR: A robust stereo-image coding algorithm using digital watermarking in fractional Fourier transform (FrFT) and singular value decomposition (SVD) to achieve stereo image security is presented.
Abstract: We present a robust stereo-image coding algorithm using digital watermarking in fractional Fourier transform (FrFT) and singular value decomposition (SVD). For the purpose of the security, the original (left stereo) image has been degraded and watermark (right disparity map) is embedded in the degraded image. This watermarked degraded stereo image is processed in an insecure channel. At the receiver's end, both the watermarked image (left stereo image) and watermark images are found by the decoding process. The use of the FrFT, SVD, and degradation process of the stereo image add much more complexity to decode the information about the stereo images and disparity map extraction. Moreover, processing of the watermarked image only provides the stereo as well as 3-D information of the scene/object. Experimental results show that the proposed algorithm is efficient to achieve stereo image security.
Citations
More filters
Journal ArticleDOI
TL;DR: Experimental results indicate that the proposed stereo image zero- watermarking algorithm is strongly robust to various asymmetric and symmetric attacks and has superiority compared with other zero-watermarking algorithms.

177 citations

Journal ArticleDOI
TL;DR: This paper presents a novel image encryption scheme using 3-D Arnold cat map and Fisher-Yates shuffling algorithm which demonstrates the high security and sensitivity of the scheme.
Abstract: This paper presents a novel image encryption scheme using 3-D Arnold cat map and Fisher-Yates shuffling algorithm. A plain image is divided into various slices of equal size and then the 3-D representation of the image is shuffled by the 3-D chaotic map. A fractional order system of nonlinear differential equations is used to implement the diffusion in the intensity values of the shuffled image pixels. The solution of this fractional order system develops a strange attractor which is the onset of the chaos. Fisher-Yates is used to make a chaotic matrix which is used for arranging the data points. Experimental results are given on various images with comprehensive analysis which demonstrates the high security and sensitivity of the scheme.

45 citations

Journal ArticleDOI
TL;DR: A new zero-watermarking algorithm for copyright protection of color stereo images is proposed that uses the proposed ORTMs to build descriptors that are stable and robust against image processing attacks and invariant to geometric transformations.

30 citations

Book ChapterDOI
01 Jan 2019
TL;DR: This chapter introduces a new and effective encryption technique to encrypt left and right stereo images simultaneously to produce a single encrypted image.
Abstract: To provide the security to image contents, most encryption techniques are designed for synthetic and real images which is, however, not applicable to stereo images. Stereo images generally consists of two views (left and right views) of a scene with known viewpoints. The only way is to encrypt both left and right images separately. To address this issue, this chapter introduces a new and effective encryption technique to encrypt left and right stereo images simultaneously to produce a single encrypted image. A decryption process is finally introduced to generate left and right stereo images from the final encrypted image. The extensive experiments on different stereo images demonstrate the efficiency and the robustness of the proposed encryption technique.

11 citations

Journal ArticleDOI
TL;DR: It was established that for a fixed size of the mark, a hybrid watermark insertion performed into a new disparity map representation is the only solution jointly featuring imperceptibility, robustness against the three classes of attacks, and nonprohibitive computational cost.
Abstract: Despite the sound theoretical, methodological, and experimental background inherited from 2D video, the stereoscopic video watermarking imposed itself as an open research topic. Paving the way towards practical deployment of such copyright protection mechanisms, the present paper is structured as a comparative study on the main classes of 2D watermarking methods (spread spectrum, side information, hybrid) and on their related optimal stereoscopic insertion domains (view or disparity based). The performances are evaluated in terms of transparency, robustness, and computational cost. First, the watermarked content transparency is assessed by both subjective protocols (according to ITU-R BT 500-12 and BT 1438 recommendations) and objective quality measures (five metrics based on differences between pixels and on correlation). Secondly, the robustness is objectively expressed by means of the watermark detection bit error rate against several classes of attacks, such as linear and nonlinear filtering, compression, and geometric transformations. Thirdly, the computational cost is estimated for each processing step involved in the watermarking chain. All the quantitative results are obtained out of processing two corpora of stereoscopic visual content: (1) the 3DLive corpus, summing up about 2 h of 3D TV content captured by French professionals, and (2) the MPEG 3D video reference corpus, composed of 17 min provided by both academic communities and industrials. It was thus established that for a fixed size of the mark, a hybrid watermark insertion performed into a new disparity map representation is the only solution jointly featuring imperceptibility (according to the subjective tests), robustness against the three classes of attacks, and nonprohibitive computational cost.

8 citations

References
More filters
Journal ArticleDOI
TL;DR: A hybrid nonblind scheme based on DWT and singular value decomposition (SVD) is presented, and it is shown that it is considerably more robust and reliable than a pure SVD-based scheme.
Abstract: Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. As watermarking is identified as a major technology to achieve copyright protection, the relevant literature includes several distinct approaches for embedding data into a multimedia element. Because of its growing popularity, the discrete wavelet transform (DWT) is commonly used in recent watermarking schemes. In a DWT-based scheme, the DWT coefficients are modified with the data that represents the watermark. We present a hybrid nonblind scheme based on DWT and singular value decomposition (SVD). After decomposing the cover image into four bands (LL, HL, LH, and HH, where L stands for lowpass and H stands for highpass), we apply the SVD to each band, and modify the singular values of the cover image with the singular values of the visual watermark. Modification in all frequencies enables the development of a watermarking scheme that is robust to a wide range of attacks. We compare our hybrid algorithm with a pure SVD-based scheme, and show that it is considerably more robust and reliable.

185 citations

Journal ArticleDOI
TL;DR: An application of the fractional Fourier transform for the multimedia copyright protection is proposed and the watermark robustness as well as statistical performance are considered.

155 citations

Proceedings ArticleDOI
07 May 2007
TL;DR: This paper proposes a hybrid DWT-SVD domain watermarking scheme considering human visual properties that has advantages of robustness for its embedding data into all frequencies and large capacity for using SVD.
Abstract: As digital watermarking has become an important tool for copyright protection, various watermarking schemes have been proposed in literature. Among them both discrete wavelet transform (DWT) and singular value decomposition (SVD) are commonly used. In a DWT-based watermarking scheme, the host image is decomposed into four frequency bands, and DWT coefficients in each band are modified to hide watermark information. Modification in all frequencies enables watermarking schemes using DWT robust to a wide range of attacks. However, as most transform methods, DWT decomposes images in terms of a standard basis set which is not necessarily optimal for a given image. By contrast with DWT, SVD offers a tailor-made basis for a given image which packs maximum signal energy into as few coefficients as possible. SVD is used in image processing also for its properties of stability, proportion invariance and rotation invariance. In this paper we propose a hybrid DWT-SVD domain watermarking scheme considering human visual properties. After decomposing the host image into four subbands, we apply SVD to each subband and embed singular values of the watermark into them. The embedding strength is determined by a human visual model proposed in A.S. Lewis and G. Knowles, (1992) and improved in M. Bertran et al., (2001). Our scheme has advantages of robustness for its embedding data into all frequencies and large capacity for using SVD. In addition, the use of human visual model guarantees the imperceptibility of the watermark.

119 citations

Journal ArticleDOI
TL;DR: This paper develops a 2D DFRFT which can preserve the rotation properties and provide similar results to continuous FRFT.

98 citations

Proceedings ArticleDOI
11 Mar 2007
TL;DR: This paper proposes a technique against ambiguity in digital watermarking by embedding the singular vectors of the watermark image as a control parameter, and discusses the performance of the proposed method against some attacks.
Abstract: Singular Value Decomposition (SVD) has been used as a valuable transform technique for robust digital watermarking. This arises from the fact that, changing singular values (SV) of an image slightly does not affect the image quality much. In some SVD based methods, SVs of the watermark are embedded into SVs of the cover image. Then in detection, the watermark is constructed by using original singular vectors. If the singular vectors of another image rather than the original watermark are used, that image is constructed as the embedded watermark, causing the false positive probability to be one. In this paper, we propose a technique against this ambiguity by embedding the singular vectors of the watermark image as a control parameter. We discuss the performance of the proposed method against some attacks.

61 citations