scispace - formally typeset
Search or ask a question

Showing papers on "Watermark published in 2010"


Journal ArticleDOI
TL;DR: Simulation results demonstrate that the embedded watermarks can be almost fully extracted from images compressed with very high compression ratio.

207 citations


Journal ArticleDOI
TL;DR: The proposed scheme has high payload and superior performance against MP3 compression compared to the earlier audio watermarking schemes, and shows low error probability rates.

204 citations


Journal ArticleDOI
TL;DR: A novel Chinese Remainder Theorem (CRT)-based technique for digital watermarking in the Discrete Cosine Transform (DCT) domain that is robust to several common attacks is proposed and compared with recently proposed Singular Value Decomposition (SVD)-based and spatial CRT-based watermarked schemes.

187 citations


Patent
TL;DR: In this paper, a system for using a watermark embedded in an audio signal to remotely control a device is described. But the watermarks can be used with a "time gate" device, where detection of the watermark opens a time interval within which a user is allowed to perform an action, such as pressing a button, typing in an answer, turning a key in a lock, etc.
Abstract: A system for using a watermark embedded in an audio signal to remotely control a device. Various devices such as toys, computers, and appliances, equipped with an appropriate detector, detect the hidden signals, which can trigger an action, or change a state of the device. The watermarks can be used with a “time gate” device, where detection of the watermark opens a time interval within which a user is allowed to perform an action, such as pressing a button, typing in an answer, turning a key in a lock, etc.

186 citations


Journal ArticleDOI
TL;DR: Experimental results confirm the superiority of the proposed method against common attacks, such as Additive White Gaussian Noise (AWGN), JPEG compression, and rotation attacks, in comparison with the recently proposed techniques.
Abstract: In this paper, an improved multiplicative image watermarking system is presented. Since human visual system is less sensitive to the image edges, watermarking is applied in the contourlet domain, which represents image edges sparsely. In the presented scheme, watermark data is embedded in directional subband with the highest energy. By modeling the contourlet coefficients with General Gaussian Distribution (GGD), the distribution of watermarked noisy coefficients is analytically calculated. The tradeoff between the transparency and robustness of the watermark data is solved in a novel fashion. At the receiver, based on the Maximum Likelihood (ML) decision rule, an optimal detector by the aid of channel side information is proposed. In the next step, a blind extension of the suggested algorithm is presented using the patchwork idea. Experimental results confirm the superiority of the proposed method against common attacks, such as Additive White Gaussian Noise (AWGN), JPEG compression, and rotation attacks, in comparison with the recently proposed techniques.

146 citations


Journal ArticleDOI
TL;DR: A new blind and readable H.264 compressed domain watermarking scheme is proposed in which the embedding/extracting is performed using the syntactic elements of the compressed bit stream using a priority matrix defined which can be adjusted based on the application requirements.
Abstract: In this paper, a new blind and readable H.264 compressed domain watermarking scheme is proposed in which the embedding/extracting is performed using the syntactic elements of the compressed bit stream. As a result, it is not necessary to fully decode a compressed video stream both in the embedding and extracting processes. The method also presents an inexpensive spatiotemporal analysis that selects the appropriate submacroblocks for embedding, increasing watermark robustness while reducing its impact on visual quality. Meanwhile, the proposed method prevents bit-rate increase and restricts it within an acceptable limit by selecting appropriate quantized residuals for watermark insertion. Regarding watermarking demands such as imperceptibility, bit-rate control, and appropriate level of security, a priority matrix is defined which can be adjusted based on the application requirements. The resulted flexibility expands the usability of the proposed method.

111 citations


Journal ArticleDOI
TL;DR: Compared with Lee and Lin's [Dual watermark for image tamper detection and recovery, Pattern Recognition 41 (2008) 3497-3506] scheme, this scheme provides not only a better quality of recovered images but also better results at edge regions.

108 citations


Journal ArticleDOI
TL;DR: This paper presents a color image watermarking scheme that hides watermark signals in most distortion-tolerable signals within three color channels of the host image without resulting in perceivable distortion.
Abstract: Transparency and robustness are two conflicting requirements demanded by digital image watermarking for copyright protection and many other purposes. A feasible way to simultaneously satisfy the two conflicting requirements is to embed high-strength watermark signals in the host signals that can accommodate the distortion due to watermark insertion as part of perceptual redundancy. The search of distortion-tolerable host signals for watermark insertion and the determination of watermark strength are, hence, crucial to the realization of a transparent yet robust watermark. This paper presents a color image watermarking scheme that hides watermark signals in most distortion-tolerable signals within three color channels of the host image without resulting in perceivable distortion. The distortion-tolerable host signals or the signals that possess high perceptual redundancy are sought in the wavelet domain for watermark insertion. A visual model based upon the CIEDE2000 color difference equation is used to measure the perceptual redundancy inherent in each wavelet coefficient of the host image. By means of quantization index modulation, binary watermark signals are embedded in qualified wavelet coefficients. To reinforce the robustness, the watermark signals are repeated and permuted before embedding, and restored by the majority-vote decision making process in watermark extraction. Original images are not required in watermark extraction. Only a small amount of information including locations of qualified coefficients and the data associated with coefficient quantization is needed for watermark extraction. Experimental results show that the embedded watermark is transparent and quite robust in face of various attacks such as cropping, low-pass filtering, scaling, media filtering, white-noise addition as well as the JPEG and JPEG2000 coding at high compression ratios.

106 citations


Journal ArticleDOI
TL;DR: An effective video watermarking method based on a pseudo-3-D discrete cosine transform (DCT) and quantization index modulation (QIM) against several attacks is proposed that can survive filtering, compressions, luminance change, and noise attacks with a good invisibility and robustness.
Abstract: The increasing popularity of the internet means that digital multimedia are transmitted more rapidly and easily. And people are very aware for media ownership. However, digital watermarking is an efficient and promising means to protect intellectual properties. Based on the intellectual property attention in the information era, how to protect the personal ownership is extremely important and a necessary scheme. In this paper, we propose an effective video watermarking method based on a pseudo-3-D discrete cosine transform (DCT) and quantization index modulation (QIM) against several attacks. The watermark is mainly inserted into the uncompressed domain by adjusting the correlation between DCT coefficients of the selected blocks, and the watermark extraction is blind. This approach consists of a pseudo-3-D DCT, watermark embedding, and extraction. A pseudo-3-D DCT, which is taken DCT transformation twice, will be first utilized to calculate the embedding factor and to obtain the useful messages. Using the QIM, we embed the watermark into the quantization regions from the successive raw frames in the uncompressed domain and record the relative information to create a secret embedding key. This secret embedding key will further apply to extraction. Experimental results demonstrate that the proposed method can survive filtering, compressions, luminance change, and noise attacks with a good invisibility and robustness.

103 citations


Journal ArticleDOI
TL;DR: A new robust and secure perceptual image hashing technique based on virtual watermark detection that has been shown to outperform related state-of-the art techniques recently proposed in the literature in terms of robustness with respect to image processing manipulations and geometric attacks.
Abstract: This paper proposes a new robust and secure perceptual image hashing technique based on virtual watermark detection. The idea is justified by the fact that the watermark detector responds similarly to perceptually close images using a non embedded watermark. The hash values are extracted in binary form with a perfect control over the probability distribution of the hash bits. Moreover, a key is used to generate pseudo-random noise whose real values contribute to the randomness of the feature vector with a significantly increased uncertainty of the adversary, measured by mutual information, in comparison with linear correlation. Experimentally, the proposed technique has been shown to outperform related state-of-the art techniques recently proposed in the literature in terms of robustness with respect to image processing manipulations and geometric attacks.

103 citations


Journal ArticleDOI
TL;DR: The main contributions of this paper are the introduction of the 1D DFT along temporal direction for watermarking that enables the robustness against video compression, and the Radon transform-based watermark embedding and extraction that produces the robustity against geometric transformations.

Journal ArticleDOI
TL;DR: This paper focuses on the copyright protection for images taken by ordinary cameras, and considers not only the image contents itself, but the EXIF metadata, which serves as the role of watermark, to be integrated into the scheme to make copyright protection possible.

Journal ArticleDOI
TL;DR: Experimental results show that the embedded watermark is invisible and robust to attacks and the resilience of the watermarking algorithm against a series nine different attacks for different videos is tested.

Journal ArticleDOI
TL;DR: This paper proposes an efficient, blind, and robust data hiding scheme which is resilient to both geometric distortion and the general print-scan process, based on a near uniform log-polar mapping (ULPM).
Abstract: This paper proposes an efficient, blind, and robust data hiding scheme which is resilient to both geometric distortion and the general print-scan process, based on a near uniform log-polar mapping (ULPM). In contrast to performing inverse log-polar mapping (a mapping from the log-polar system to the Cartesian system) to the watermark signal or its index as done in the prior works, we apply ULPM to the frequency index (u, v) in the Cartesian system to obtain the discrete log-polar coordinate (l 1, l 2), then embed one watermark bit w(l 1 ,l 2 ) in the corresponding discrete Fourier transform coefficient c(u,v). This mapping of index from the Cartesian system to the log-polar system but embedding the corresponding watermark directly in the Cartesian domain not only completely removes the interpolation distortion and the interference distortion introduced to the watermark signal as observed in some prior works, but also largely expands the cardinality of watermark in the log-polar mapping domain. Both theoretical analysis and experimental results show that the proposed watermarking scheme achieves excellent robustness to geometric distortion, normal signal processing, and the general print-scan process. Compared to existing watermarking schemes, our algorithm offers significant improvement in terms of robustness against general print-scan, receiver operating characteristic (ROC) performance, and efficiency of blind resynchronization.

Journal ArticleDOI
TL;DR: A novel time domain synchronisation technique is presented together with a new blind watermarking scheme which works in the discrete Fourier transform (DFT or FFT) domain, which provides excellent imperceptibility results whilst achieving robustness against typical attacks.

Journal ArticleDOI
TL;DR: The current state-of-the- art watermarking techniques are surveyed and they are classified according to their intent, the way they express the watermark, the cover type, the granularity level, and their verifiability.
Abstract: Digital watermarking for relational databases emerged as a candidate so- lution to provide copyright protection, tamper detection, traitor tracing, maintaining integrity of relational data. Many watermarking techniques have been proposed in the literature to address these purposes. In this paper, we survey the current state-of-the- art and we classify them according to their intent, the way they express the watermark, the cover type, the granularity level, and their verifiability.

Proceedings ArticleDOI
12 Mar 2010
TL;DR: The characteristic of the proposed watermarking scheme is that the blind recovery of the watermark is possible at the receiver and the embedded watermark can be fully removed, Hence, ECG can be viewed by a clinician with zero distortion which is an essential requirement for bio-medical data.
Abstract: Use of wireless technology has made the bio-medical data vulnerable to attacks like tampering, hacking etc. This paper proposes the use of digital watermarking to increase the security of an ECG signal transmitted through a wireless network. A low frequency chirp signal is used to embed watermark which is patient’s identification taken as 15 digit code. The characteristic of the proposed watermarking scheme is that the blind recovery of the watermark is possible at the receiver and the embedded watermark can be fully removed. Hence, ECG can be viewed by a clinician with zero distortion which is an essential requirement for bio-medical data. Further, tampering such as noise addition and filtering attack can also be detected at the receiver.

Journal ArticleDOI
TL;DR: A novel image watermarking method in multiwavelet domain based on support vector machines (SVMs) is proposed in this paper, which can more effectively reduce image distortion than that of conventional single coefficient.

Patent
21 May 2010
TL;DR: A variety of fingerprint/watermark techniques identify characteristics of the channel of content from content samples as discussed by the authors, and are further used for signal synchronization and other pre-processing steps to assist in digital watermark decoding.
Abstract: Content fingerprints and watermarks are combined in various ways for content identification applications. Fingerprints are used to identify content generally while watermarks provide more detailed localization of parts within the content, and vice versa. Fingerprint techniques are further used for signal synchronization and other pre-processing steps to assist in digital watermark decoding. A variety of fingerprint/watermark techniques identify characteristics of the channel of content from content samples.

Journal ArticleDOI
TL;DR: Simulation shows outstanding robustness of the proposed scheme against common attacks, especially additive white noise and JPEG compression.
Abstract: A robust image watermarking scheme in the ridgelet transform domain is proposed in this paper. Due to the use of the ridgelet domain, sparse representation of an image which deals with line singularities is obtained. In order to achieve more robustness and transparency, the watermark data is embedded in selected blocks of the host image by modifying the amplitude of the ridgelet coefficients which represent the most energetic direction. Since the probability distribution function of the ridgelet coefficients is not known, we propose a universally optimum decoder to perform the watermark extraction in a distribution-independent fashion. Decoder extracts the watermark data using the variance of the ridgelet coefficients of the most energetic direction in each block. Furthermore, since the decoder needs the noise variance to perform decoding, a robust noise estimation scheme is proposed. Moreover, the implementation of error correction codes on the proposed method is investigated. Analytical derivation of bit error probability is also carried out and experimental results prove its accuracy. Simulation also shows outstanding robustness of the proposed scheme against common attacks, especially additive white noise and JPEG compression.

Journal ArticleDOI
TL;DR: A novel wavelet domain based semi-fragile watermarking scheme is presented for securing digital content and to concisely determine the regions where the integrity fails and shows the suitability of the proposed approach for accurate authentication and recovery based applications.

Proceedings ArticleDOI
16 May 2010
TL;DR: Experimental results indicate that the proposed SVD-based RGB color image watermarking technique is robust and produces high-quality watermarked images.
Abstract: In this paper, we propose a novel SVD-based RGB color image watermarking, in which the watermark is assumed to be an RGB color image whose detection and extraction are performed in a blind manner. The performance of the proposed watermarking method is investigated by measuring its imperceptible and robust capabilities. For the imperceptible capability, a quantitative index, Peek Signal-to-Noise Ratio (PSNR), is employed to evaluate the difference between an original image and its corresponding watermarked image. For the robust capability, the Correlation Coefficient (CC) is also used to evaluate the similarity between the original watermark and the extracted one. Experimental results indicate that our technique is robust and produces high-quality watermarked images.

Patent
16 Sep 2010
TL;DR: In this article, a system and associated method for securing sensitive data in a cloud computing environment is described, where a customer system associates a hashing directive with the record prior to sending the data out to a cloud for computing services.
Abstract: A system and associated method for securing sensitive data in a cloud computing environment. A customer system has proprietary data as a record stored in a database. The customer system associates a hashing directive with the record prior to sending the data out to a cloud for computing services. The hashing directive classifies each data field of the record into sensitive and transactional. The hashing directive controls a mode of hashing, either one-way hashing or two-way hashing for each sensitive data field associated with the hashing directive. A cloud receives the record secured according to the hashing directive and process the record to generate a result value for a cloud process result field of the record. The customer system reconstitutes the record the record according to the mode of hashing indicated in the hashing directive.

Journal ArticleDOI
TL;DR: A blind watermarking technique based on the so called wavelet-trees that exploits the significant features and relations between the color pixel components in the wavelet domain and survived the well known JPEG/JPEG2000 attacks.

Journal ArticleDOI
TL;DR: This paper proposes an original method using a watermarking technique to imperceptibly embed this information about the source signals into the mix signal to enable an end-user who has no access to the original sources to separate these signals from their mixture.
Abstract: In this paper, the issue of audio source separation from a single channel is addressed, i.e., the estimation of several source signals from a single observation of their mixture. This challenging problem is tackled with a specific two levels coder-decoder configuration. At the coder, source signals are assumed to be available before the mix is processed. Each source signal is characterized by a set of parameters that provide additional information useful for separation. We propose an original method using a watermarking technique to imperceptibly embed this information about the source signals into the mix signal. At the decoder, the watermark is extracted from the mix signal to enable an end-user who has no access to the original sources to separate these signals from their mixture. Hence, we call this separation process informed source separation (ISS). Thereby, several instruments or voice signals can be segregated from a single piece of music to enable post-mixing processing such as volume control, echo addition, spatialization, or timbre transformation. Good performances are obtained for the separation of up to four source signals, from mixtures of speech or music signals. Promising results open up new perspectives in both under-determined source separation and audio watermarking domains.

Proceedings ArticleDOI
09 Jan 2010
TL;DR: Analysis of a number of digital image watermark attacks and attempts to classify them into categories are provided to show the effect of these attacks on watermarks produced using different watermarking techniques.
Abstract: Digital watermarking is one of the most widely used techniques for protection of ownership rights of digital audio, images and video. Its commercial applications range from copyright protection to digital rights management. The success of a digital watermarking technology depends heavily on its robustness to withstand attacks that are aimed at removing or destroying the watermark from its host data. This paper provides analysis of a number of digital image watermark attacks and attempts to classify them into categories. A set of experimental results are also provided to show the effect of these attacks on watermarks produced using different watermarking techniques.

Journal ArticleDOI
TL;DR: Experimental results demonstrate that the technique not only possesses the robustness to resist on image-manipulation attacks under consideration but also, in average, is superior to other existing methods being considered in the paper.

Journal ArticleDOI
TL;DR: Experimental results demonstrate that the proposed scheme can provide sufficient robustness against geometric attacks as well as common image processing operations.

Proceedings ArticleDOI
09 Jul 2010
TL;DR: A design of a reversible tamper detection and recovery watermarking scheme was proposed that uses a 640x480x8 bits ultrasound grayscale image as a sample and the concept of ROI and RONI (Region Of Non Interest) were applied.
Abstract: This research paper discussed the usage of watermarking in medical images to ensure the authenticity and integrity of the image and reviewed some watermarking schemes that had been developed. A design of a reversible tamper detection and recovery watermarking scheme was then proposed. The watermarking scheme uses a 640x480x8 bits ultrasound grayscale image as a sample. The concept of ROI (Region Of Interest) and RONI (Region Of Non Interest) were applied. Watermark embedded can be used to detect tampering and recovery of the image can be done. The watermark is also reversible.

Journal ArticleDOI
TL;DR: Experimental comparisons with existing approaches validate the usefulness of the proposed multiple semi-fragile watermarking approach, based on integer wavelet transform with improved security against collage attack, enhanced robustness, and capability of producing better quality recovered image.