scispace - formally typeset
Search or ask a question

Showing papers on "Watermark published in 2013"


Journal ArticleDOI
TL;DR: A new image watermarking scheme based on the Redundant Discrete Wavelet Transform (RDWT) and the Singular Value Decomposition (SVD) that showed a high level of robustness not only against the image processing attacks but also against the geometrical attacks which are considered as difficult attacks to resist.
Abstract: Copyright protection and proof of ownership are two of the main important applications of the digital image watermarking. The challenges faced by researchers interested in digital image watermarking applications lie in the creation of new algorithms to serve those applications and to be resistant to most types of attacks, especially the geometrical attacks. Robustness, high imperceptibility, security, and large capacity are four essential requirements in any watermarking scheme. This paper presents a new image watermarking scheme based on the Redundant Discrete Wavelet Transform (RDWT) and the Singular Value Decomposition (SVD). The gray scale image watermark was embedded directly in the singular values of the RDWT sub-bands of the host image. The scheme achieved a large capacity due to the redundancy in the RDWT domain and at the same time preserved high imperceptibility due to SVD properties. Embedding the watermarking pixel's values without any modification inside the wavelet coefficient of the host image overcomes the security issue. Furthermore, the experimental results of the proposed scheme showed a high level of robustness not only against the image processing attacks but also against the geometrical attacks which are considered as difficult attacks to resist.

228 citations


Journal ArticleDOI
TL;DR: A new reversible watermarking scheme that can insert more data with lower distortion than any existing schemes and achieve a peak signal-to-noise ratio (PSNR) of about 1-2 dB greater than with the scheme of Hwang, the most efficient approach actually.
Abstract: In this paper, we propose a new reversible watermarking scheme. One first contribution is a histogram shifting modulation which adaptively takes care of the local specificities of the image content. By applying it to the image prediction-errors and by considering their immediate neighborhood, the scheme we propose inserts data in textured areas where other methods fail to do so. Furthermore, our scheme makes use of a classification process for identifying parts of the image that can be watermarked with the most suited reversible modulation. This classification is based on a reference image derived from the image itself, a prediction of it, which has the property of being invariant to the watermark insertion. In that way, the watermark embedder and extractor remain synchronized for message extraction and image reconstruction. The experiments conducted so far, on some natural images and on medical images from different modalities, show that for capacities smaller than 0.4 bpp, our method can insert more data with lower distortion than any existing schemes. For the same capacity, we achieve a peak signal-to-noise ratio (PSNR) of about 1-2 dB greater than with the scheme of Hwang , the most efficient approach actually.

207 citations


Patent
15 Mar 2013
TL;DR: In this article, perceptual and robustness evaluation is integrated into audio watermark embedding to optimize audio quality relative the original signal, and to optimize robustness or data capacity, which is applied to audio segments in audio embedder and detector configurations to support real-time operation.
Abstract: Audio signal processing enhances audio watermark embedding and detecting processes. Audio signal processes include audio classification and adapting watermark embedding and detecting based on classification. Advances in audio watermark design include adaptive watermark signal structure data protocols, perceptual models, and insertion methods. Perceptual and robustness evaluation is integrated into audio watermark embedding to optimize audio quality relative the original signal, and to optimize robustness or data capacity. These methods are applied to audio segments in audio embedder and detector configurations to support real time operation. Feature extraction and matching are also used to adapt audio watermark embedding and detecting.

174 citations


Journal ArticleDOI
TL;DR: A robust watermark strategy for quantum images that embeds the watermark image into the fourier coefficients of the quantum carrier image, which will not affect the carrier image’s visual effect.
Abstract: We present a robust watermark strategy for quantum images. The watermark image is embedded into the fourier coefficients of the quantum carrier image, which will not affect the carrier image's visual effect. Before being embedded into the carrier image, the watermark image is preprocessed to be seemingly meaningless using quantum circuit, which further ensures the security of the watermark image. The properties of fourier transform ensure that the watermark embedded in the carrier image resists the unavoidable noise and cropping.

148 citations


Journal ArticleDOI
TL;DR: Experimental results show that the proposed color image watermarking is not only robust against common image processing operations such as filtering, JPEG compression, histogram equalization, and image blurring, but also robust against the geometrical distortions.

123 citations


Journal ArticleDOI
TL;DR: The adoption of efficient methods for watermark embedding or detection on data that have been secured in some way provides an elegant way to solve the security concerns of fingerprinting applications.
Abstract: The paper illustrates recent results regarding secure watermarking to the signal processing community, highlighting both benefits and still open issues. Secure signal processing, by which indicates a set of techniques able to process sensitive signals that have been obfuscated either by encryption or by other privacy-preserving primitives, may offer valuable solutions to the aforementioned issues. More specifically, the adoption of efficient methods for watermark embedding or detection on data that have been secured in some way, which we name in short secure watermarking, provides an elegant way to solve the security concerns of fingerprinting applications.

122 citations


Journal ArticleDOI
TL;DR: Experimental results proved that the proposed DWT-based SVD video watermarking method survives attacks based on video characteristics and image processing techniques.
Abstract: This paper presents an efficient, robust, and imperceptible video watermarking technique based on singular value decomposition (SVD) performed in the Discrete Wavelet Transform (DWT) domain. In the proposed DWT-based SVD video watermarking method, the video frames are transformed with the DWT using two resolution levels. The high frequency band HH and the middle frequency bands LH and HL are SVD transformed and the watermark is hidden in them. The proposed DWT-based SVD video watermarking method is characterized by two improvements: (1) a cascade of two powerful mathematical transforms; the Discrete Wavelet Transform (DWT)-based SVD using additive method, and (2) an error correction code is applied and embeds the watermark with spatial and temporal redundancy. The aim of these improvements is to increase robustness against attacks based on video characteristics and the robustness against image processing attacks, realize high security level, protect the watermark against bit errors and obtain good perceptual quality. The proposed DWT-based SVD video watermarking method has been tested in the presence of video and image processing attacks and experimental results proved that the proposed DWT-based SVD video watermarking method survives attacks based on video characteristics and image processing techniques.

102 citations


Journal ArticleDOI
01 Dec 2013-Optik
TL;DR: Experimental results show that the proposed novel blind watermarking algorithm not only can resist both traditional signal processing attacks and geometric attacks, but also has more efficient in computational complexity.

98 citations


Journal ArticleDOI
TL;DR: A new adaptive audio watermarking algorithm based on Empirical Mode Decomposition (EMD) is introduced and the robustness of the hidden watermark for additive noise, MP3 compression, re-quantization, filtering, cropping and resampling is shown.
Abstract: In this paper a new adaptive audio watermarking algorithm based on Empirical Mode Decomposition (EMD) is introduced. The audio signal is divided into frames and each one is decomposed adaptively, by EMD, into intrinsic oscillatory components called Intrinsic Mode Functions (IMFs). The watermark and the synchronization codes are embedded into the extrema of the last IMF, a low frequency mode stable under different attacks and preserving audio perceptual quality of the host signal. The data embedding rate of the proposed algorithm is 46.9-50.3 b/s. Relying on exhaustive simulations, we show the robustness of the hidden watermark for additive noise, MP3 compression, re-quantization, filtering, cropping and resampling. The comparison analysis shows that our method has better performance than watermarking schemes reported recently.

97 citations


Journal ArticleDOI
TL;DR: A robust audio watermarking scheme based on singular value decomposition (SVD) and differential evolution (DE) using dither modulation (DM) quantization algorithm is proposed, which obtains more robustness against the selected attacks.
Abstract: In this paper, a robust audio watermarking scheme based on singular value decomposition (SVD) and differential evolution (DE) using dither modulation (DM) quantization algorithm is proposed. Two novel SVD-based algorithms, lifting wavelet transform (LWT)-discrete cosine transform (DCT)-SVD and discrete wavelet transform (DWT)-DCT-SVD, are developed for audio copyright protection. In our method, LWT\DWT is first applied to decompose the host signal and obtain the corresponding approximate coefficients followed by DCT to take advantage of “energy compaction” property. SVD is further performed to acquire the singular values and enhance the robustness of the scheme. The adaptive DM quantization is adopted to quantize the singular values and embed the watermark. To withstand desynchronization attacks, synchronization code is inserted using audio statistical characteristics. Furthermore, the conflicting problem of robustness and imperceptibility is effectively resolved by the DE optimization. Simulation results demonstrate that both the LWT-DCT-SVD and DWT-DCT-SVD methods not only have good imperceptibility performance, but also resist general signal processing, hybrid and desynchronization attacks. Compared with the previous DWT-DCT, support vector regression (SVR)-DWT-DCT and DWT-SVD methods, our method obtains more robustness against the selected attacks.

90 citations


Journal ArticleDOI
TL;DR: This paper proposes a watermark strategy for quantum images that can be used to verify the identity of the true owner of a carrier image, and the proposed method’s capacity reaches the largest.
Abstract: Quantum watermarking is the technique which embeds the invisible quantum signal such as the owner’s identification into quantum multimedia data (such as audio, video and image) for copyright protection. In this paper, a watermark strategy for quantum images is proposed based on flexible representation for quantum images (FRQI). Compared with the former strategy, which can only be used to verify the identity of the true owner of a carrier image, the proposed method can be used to find out who is the real owner, and our strategy’s capacity reaches the largest. It is impossible for anyone except the copyrighter to clear off or extract the watermark images.

Journal ArticleDOI
TL;DR: The experimental results show, that the algorithm achieves high image quality and high tampering detection resolution at a low watermark payload, compared to block-based authentication schemes.

Journal ArticleDOI
TL;DR: A new robust and reversible watermarking approach for the protection of relational databases based on the idea of difference expansion and utilizes genetic algorithm (GA) to improve watermark capacity and reduce distortion.

Journal ArticleDOI
TL;DR: Experiments show that the proposed robust image hashing is robust against content-preserving manipulations such as JPEG compression, watermark embedding, scaling, rotation, brightness and contrast adjustment, gamma correction and Gaussian low-pass filtering.

Journal ArticleDOI
TL;DR: The experiment results show that the proposed watermarking algorithm can ensure the invisibility and stronger robustness for the common image processing operations and geometric attacks, and the performance of this proposed method outperforms that of other proposed methods considered in this work.

Journal ArticleDOI
TL;DR: Experimental results prove that the proposed technique can provide patient authentication, image integrity service and information confidentiality service with excellent efficiency, and the embedded watermark does not affect the quality of the original image.

Journal ArticleDOI
TL;DR: A zero-watermark scheme using RST invariant features, the SVM and the PSO algorithm against RST attacks for image authentication and the experimental results show that the SZW method outperforms other existing methods against R ST attacks under consideration here.

Journal ArticleDOI
TL;DR: According to the experimental results, the proposed methodology has high robustness against the common mesh attacks while preserving the original object surface during watermarking.
Abstract: This paper proposes a new approach to 3D watermarking by ensuring the optimal preservation of mesh surfaces. A new 3D surface preservation function metric is defined consisting of the distance of a vertex displaced by watermarking to the original surface, to the watermarked object surface as well as the actual vertex displacement. The proposed method is statistical, blind, and robust. Minimal surface distortion according to the proposed function metric is enforced during the statistical watermark embedding stage using Levenberg-Marquardt optimization method. A study of the watermark code crypto-security is provided for the proposed methodology. According to the experimental results, the proposed methodology has high robustness against the common mesh attacks while preserving the original object surface during watermarking.

Journal ArticleDOI
TL;DR: A novel biometrically generated keys in the embedding process of a gray-scale watermark using a newly proposed mathematical transform, namely the fractional dual tree complex wavelet transform (FrDT-CWT), and singular value decomposition (SVD) are used.

Journal ArticleDOI
TL;DR: A zero-watermarking scheme implemented in the composite Contourlet Transform (CT)—Singular Value Decomposition (SVD) domain for unambiguous authentication of medical images and access to patient records is presented.
Abstract: Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT)—Singular Value Decomposition (SVD) domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR) code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu's invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks.

Journal ArticleDOI
TL;DR: This work investigates the quantum watermark strategy for quantum images based on quantum Fourier transform and argues that the watermarking algorithm claimed by the authors is incorrect.
Abstract: We investigate the quantum watermark strategy for quantum images based on quantum Fourier transform proposed by Zhang et al.(Quantum Inf Process 12(2):793---803, 2013). It is aimed to embed the watermark image into the Fourier coefficients of the quantum carrier image without affecting the carrier image's visual effect. However, in our opinion the protocol is not clearly described and several steps are ambiguous. Moreover, we argue that the watermarking algorithm claimed by the authors is incorrect. At last, a possible improvement strategy is presented.

Journal ArticleDOI
TL;DR: Experimental results show that a hardware-based video authentication system using this watermarking technique features minimum video quality degradation and can withstand certain potential attacks, i.e., cover-up attacks, cropping, and segment removal on video sequences.
Abstract: This paper presents a hardware implementation of a digital watermarking system that can insert invisible, semifragile watermark information into compressed video streams in real time. The watermark embedding is processed in the discrete cosine transform domain. To achieve high performance, the proposed system architecture employs pipeline structure and uses parallelism. Hardware implementation using field programmable gate array has been done, and an experiment was carried out using a custom versatile breadboard for overall performance evaluation. Experimental results show that a hardware-based video authentication system using this watermarking technique features minimum video quality degradation and can withstand certain potential attacks, i.e., cover-up attacks, cropping, and segment removal on video sequences. Furthermore, the proposed hardware-based watermarking system features low power consumption, low cost implementation, high processing speed, and reliability.

Journal ArticleDOI
TL;DR: A novel watermarking scheme is proposed by embedding a binary watermark into gray-scale images using a hybrid GA-BPN intelligent network, which is robust against selected attacks and is well optimized.

Journal ArticleDOI
Xinkai Wang1, Pengjun Wang1, Peng Zhang1, Shuzheng Xu1, Huazhong Yang1 
TL;DR: Combining the robustness of vector norm with that of the approximation components after the discrete wavelet transform (DWT), a blind and adaptive audio watermarking algorithm is proposed and experimental results indicate that this algorithm is still able to maintain good quality of the audio signal and tolerate a wide class of common attacks.

Journal ArticleDOI
TL;DR: A fragile zero watermarking scheme to detect and characterize malicious modifications made to a database relation, which characterizes the malicious data modifications to quantify the nature of tempering attacks and resolves the inherent conflict between security and imperceptibility.
Abstract: We put forward a fragile zero watermarking scheme to detect and characterize malicious modifications made to a database relation. Most of the existing watermarking schemes for relational databases introduce intentional errors or permanent distortions as marks into the database original content. These distortions inevitably degrade the data quality and data usability as the integrity of a relational database is violated. Moreover, these fragile schemes can detect malicious data modifications but do not characterize the tempering attack, that is, the nature of tempering. The proposed fragile scheme is based on zero watermarking approach to detect malicious modifications made to a database relation. In zero watermarking, the watermark is generated (constructed) from the contents of the original data rather than introduction of permanent distortions as marks into the data. As a result, the proposed scheme is distortion-free; thus, it also resolves the inherent conflict between security and imperceptibility. The proposed scheme also characterizes the malicious data modifications to quantify the nature of tempering attacks. Experimental results show that even minor malicious modifications made to a database relation can be detected and characterized successfully.

Journal ArticleDOI
TL;DR: An efficient blind copyright protection for e-government document images is proposed through a combination of the discrete cosine transform (DCT) and the singular value decomposition (SVD) based on genetic algorithm (GA) to improve its performance, security and robustness.

Journal ArticleDOI
TL;DR: This paper proposes a robust and efficient watermarking scheme for relational databases that is able to meet all above-mentioned four challenges and does not require that a database owner defines usability constraints for each type of application and every recipient separately.
Abstract: Ownership protection on relational databases--shared with collaborators (or intended recipients)-demands developing a watermarking scheme that must be able to meet four challenges: 1) it should be robust against different types of attacks that an intruder could launch to corrupt the embedded watermark; 2) it should be able to preserve the knowledge in the databases to make them an effective component of knowledge-aware decision support systems; 3) it should try to strike a balance between the conflicting requirements of database owners, who require soft usability constraints, and database recipients who want tight usability constraints that ensure minimum distortions in the data; and 4) last but not least, it should not require that a database owner defines usability constraints for each type of application and every recipient separately. The major contribution of this paper is a robust and efficient watermarking scheme for relational databases that is able to meet all above-mentioned four challenges. The results of our experiments prove that the proposed scheme achieves 100 percent decoding accuracy even if only one watermarked row is left in the database.

Journal ArticleDOI
TL;DR: Two watermarking algorithms for image content authentication with localization and recovery capability of the tampered regions are proposed and are compared with some previously proposed content authentication algorithms with recovery capability to show the better performance of the proposed algorithms.
Abstract: In this paper two watermarking algorithms for image content authentication with localization and recovery capability of the tampered regions are proposed. In both algorithms, a halftone version of the original gray-scale image is used as an approximated version of the host image (image digest) which is then embedded as a watermark sequence into given transform domains of the host image. In the first algorithm, the Integer Wavelet Transform (IWT) is used for watermark embedding which is denominated WIA-IWT (Watermarking-based Image Authentication using IWT), while in the second one, the Discrete Cosine Transform (DCT) domain is used for this purpose, we call this algorithm WIA-DCT (Watermarking-based Image Authentication using DCT). In the authentication stage the tampered regions are detected using the Structural Similarity index (SSIM) criterion, which are then recovered using the extracted halftone image. In the recovery stage, a Multilayer Perceptron (MLP) neural network is used to carry out an inverse halftoning process to improve the recovered image quality. The experimental results demonstrate the robustness of both algorithms against content preserved modifications, such as JPEG compression, as well as an effective authentication and recovery capability. Also the proposed algorithms are compared with some previously proposed content authentication algorithms with recovery capability to show the better performance of the proposed algorithms.

Journal ArticleDOI
TL;DR: A novel hybrid digital watermarking technique, based on the exploitation of both the RGB and the YCbCr colour spaces, using spatial domain techniques is presented, which withstands geometric and processing attacks to where commercial value of images would be lost.

Journal ArticleDOI
TL;DR: A novel video watermarking scheme based on visual cryptography and scene change detection in discrete wavelet transform domain is proposed, which can reveal the copyright ownership of the owner's share from the original video based on the frame mean in same scene and the binary watermark.
Abstract: There is wide interest in multimedia security and copyright protection due the explosion of data exchange in the Internet and the extensive use of digital media. We propose a novel video watermarking scheme based on visual cryptography and scene change detection in discrete wavelet transform domain. We start with a complete survey of the current image and video watermarking technologies, and have noticed that majority of the existing schemes are not capable of resisting all attacks. We propose the idea to use different parts of a single watermark into different scenes of a video for generation of the owner's share from the original video based on the frame mean in same scene and the binary watermark, and generation of the identification share based on the frame mean of probably attacked video. These two shares after stacking can reveal the copyright ownership. Experiments are conducted to verify the robustness through a series of experiments. The security requirement of the proposed algorithm is achieved with the visual cryptography.