To see the other types of publications on this topic, follow the link: Transform domain watermark.

Journal articles on the topic 'Transform domain watermark'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Transform domain watermark.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mukhammad Solikhin, Yohanssen Pratama, Purnama Pasaribu, Josua Rumahorbo, and Bona Simanullang. "Analisis Watermarking Menggunakan Metode Discrete Cosine Transform (DCT) dan Discrete Fourier Transform (DFT)." Jurnal Sistem Cerdas 5, no. 3 (2022): 155–70. http://dx.doi.org/10.37396/jsc.v5i3.192.

Full text
Abstract:
Digital image watermarking is the insertion of watermarks into digital image media. Several types of watermarking methods used are Discrete Cosine Transform (DCT) and Discrete Fourier Transform (DFT). Both of these watermarking methods work in the frequency domain (transform). Digital image watermarking using the frequency domain is carried out on the frequency coefficient. This study used 30 digital image data as material for digital image watermaking analysis with 10 data each in binary, grayscale and color digital images in jpg, png and bmp formats. Digital images in the binary and grayscale domains are conversions from digital images in the true color (RGB) domain. Digital image watermarking includes three main processes, namely embedding the watermarked image on the original digital image, extracting the watermarked image and measuring the correlation between the two digital images. Correlation aims to measure two variables that have the same relationship. The technology used in this research work is MATLAB (Matrix Laboratory) as a high-performance programming language for computing in solving problems with solutions expressed in mathematical notation. The results of the discussion prove that the watermarking process in terms of color, for DCT, RGB is better and binary is better for DFT. And the watermaking process, in terms of the type of watermark inserted, for both DCT and DFT, a good watermark is an invisible watermark.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Kaixuan. "Blind Digital Watermark Based on Discrete Fourier Transformation." Highlights in Science, Engineering and Technology 1 (June 14, 2022): 441–52. http://dx.doi.org/10.54097/hset.v1i.501.

Full text
Abstract:
The policy and security of digital images are concerned by all artists. Embedding blind digital watermarks to images is an effective solution to such problem. The existing blind digital watermark techniques for images are usually based on the spatial domain method, such as some build-in tools in some software like Photoshop. Those methods' imperceptibility is good, but the robustness is dissatisfactory. Therefore, blind digital watermark based on the frequency domain is becoming popular nowadays. The use of the frequency domain-based techniques can not only keep the imperceptibility but also ensure good robustness and non-removability. According to the reasons mentioned above, this thesis presents a frequency domain-based blind digital watermark technique. This method uses basic discrete Fourier transformation to transform an image to the frequency domain and then embeds a digital watermark. To increase the security, we also introduce some methods to encode watermarks before embedding them to the images. We conduct some experiments by applying the technique to some images with different watermarks. In the experiments, it can embed blind watermarks with the least effect on the quality of the original image and can also successfully extract watermarks from the watermarked image. The results show this technique is highly useable. We also conduct some experiments to simulate the attacks. This technique also shows great robustness after many kinds of different attacking methods.
APA, Harvard, Vancouver, ISO, and other styles
3

Budiman, Donny, Andriyan B. Suksmono, and Donny Danudirdjo. "Fibonacci Sequence – based FFT and DCT Performance Comparison in Audio Watermarking." International Journal of Engineering & Technology 8, no. 1.9 (2019): 209–14. http://dx.doi.org/10.14419/ijet.v8i1.9.26401.

Full text
Abstract:
Audio watermarking is a manner to hide watermark into the audio for copyright protection. Recently, there are many techniques based on audio watermarking. Frequency domain based audio watermarking is one of audio watermarking technique that has good watermark robustness against many attacks, good watermarked audio quality, and also high watermark payload. In this paper, FFT and DCT performance will be compared as transform technique for data hiding in audio. Host audio is first transformed into frequency domain in frame-based by FFT or DCT, then watermark is embedded into the frequency domain signal by Fibonacci sequence rule. Different than DCT which can embed watermark on full frame, in FFT, only a half of frame that can be embedded by watermark due to FFT properties. After embedding, the frequency domain signal is transformed to time domain by IFFT or IDCT to get watermarked audio. The simulation result of frequency based audio watermarking comparing FFT and DCT transform method shows that watermark payload for perfect robustness at no attack condition could reach up to 70 bps for FFT and 500 bps for DCT. With good watermarked audio quality due to ODG > -1 and SNR > 30 dB. Due to this performance, DCT is a recommended transform method for audio watermarking technique to obtain high imperceptibility, strong robustness and high capacity than FFT. Â
APA, Harvard, Vancouver, ISO, and other styles
4

Togu Novriansyah Turnip, Tegar Arifin Prasetyo, Nevi Aktasia Banjarnahor, Winda Mariana Pasaribu, and Sopian Manurung. "Application of Double Pictures to Audio Watermarking using Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) Methods." Journal of Applied Technology and Informatics Indonesia 1, no. 2 (2022): 7–13. http://dx.doi.org/10.54074/jati.v1i2.32.

Full text
Abstract:
One way to control the development of arbitrary distribution of audio is to apply audio watermarking. Audio Watermarking is used to identify the ownership rights of audio files by embedding a watermark while paying attention to the audio quality and the watermark's resistance to amplify, resampling, and invert attacks. Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) methods are frequency-domain methods that have a good robustness. The DCT and SVD methods are combined with inserting and extracting watermarks using two images as watermarks. From the test results, the effect of inserting an audio watermark with two images does not significantly impact the durability of the watermark and the quality of the audio inserted with the watermark. However, the alpha value has a significant effect. The higher the alpha value, the lower the audio SNR value by an average of 1.93 dB from an alpha value of 0.0008 and 0.001 for each type of classical, jazz, and rock audio genre.
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Yanwei, Jinxia Liu, Antonios Argyriou, Siwei Ma, Liming Wang, and Zhen Xu. "360-Degree VR Video Watermarking Based on Spherical Wavelet Transform." ACM Transactions on Multimedia Computing, Communications, and Applications 17, no. 1 (2021): 1–23. http://dx.doi.org/10.1145/3425605.

Full text
Abstract:
Similar to conventional video, the increasingly popular 360 virtual reality (VR) video requires copyright protection mechanisms. The classic approach for copyright protection is the introduction of a digital watermark into the video sequence. Due to the nature of spherical panorama, traditional watermarking schemes that are dedicated to planar media cannot work efficiently for 360 VR video. In this article, we propose a spherical wavelet watermarking scheme to accommodate 360 VR video. With our scheme, the watermark is first embedded into the spherical wavelet transform domain of the 360 VR video. The spherical geometry of the 360 VR video is used as the host space for the watermark so that the proposed watermarking scheme is compatible with the multiple projection formats of 360 VR video. Second, the just noticeable difference model, suitable for head-mounted displays (HMDs), is used to control the imperceptibility of the watermark on the viewport. Third, besides detecting the watermark from the spherical projection, the proposed watermarking scheme also supports detecting watermarks robustly from the viewport projection. The watermark in the spherical domain can protect not only the 360 VR video but also its corresponding viewports. The experimental results show that the embedded watermarks are reliably extracted both from the spherical and the viewport projections of the 360 VR video, and the robustness of the proposed scheme to various copyright attacks is significantly better than that of the competing planar-domain approaches when detecting the watermark from viewport projection.
APA, Harvard, Vancouver, ISO, and other styles
6

Thomas, Reji, Vibisha V, Tabassum A, and Thanuja S. "Digital Watermarking." International Research Journal of Computer Science 10, no. 05 (2023): 124–29. http://dx.doi.org/10.26562/irjcs.2023.v1005.04.

Full text
Abstract:
The paper introduces the digital watermarking technology which is a data hiding technique that embeds a message into a multimedia work such as an image or text or other digital object. The proposed technique has several important applications; the majorly important is the digital copyrights protection. The digital watermarking system as any other data hiding technique has its own requirements that make the digital watermark strong as possible. Technologies of digital watermarking are mainly classified depending on their domain to spatial domain watermarks, Watermarks belonging to frequency (transform) domain and wavelet domain watermarks. The digital watermarks suffer from different types of attacks that include either state-of-the-art watermarking attacks or watermark estimation attacks. The recovery from these attacks requires strong detection techniques; the digital watermark agent provides a professional solution for these attacks.
APA, Harvard, Vancouver, ISO, and other styles
7

Budiman, Gelar, Andriyan Bayu Suksmono, and Donny Danudirdjo. "FFT-Based Data Hiding on Audio in LWT-Domain Using Spread Spectrum Technique." Elektronika ir Elektrotechnika 26, no. 3 (2020): 20–27. http://dx.doi.org/10.5755/j01.eie.26.3.23950.

Full text
Abstract:
Audio watermarking is a process to hide digital data without being seen or heard by the sense of sight or hearing. Watermaking is applied to insert the copyright on digital media, such as an image file, an audio file or a video file. In this paper, we propose watermarking procedure to embed spread spectrum watermark into frequency domain of adaptive selected subband from host audio. Lifting Wavelet Transform (LWT) is used to decompose the host audio into several subbands, and then Fast Fourier Transform (FFT) transforms selected several subbands with lowest energy. The watermark image is converted into one-dimensional signal, then it is modulated by imperceptible pseudo-noise (PN) code with controlled gain. Next, the frequency domain of audio is added by modulated and imperceptible watermark prior to transforming it to time domain by Inverse FFT (IFFT) obtaining watermarked subbands. Finally, the watermarked subbands are combined with other unused subbands by inverse LWT (ILWT) becoming the perfect version of watermarked audio. The result of this method has good robustness against most attacks from stirmark benchmark experiments, good imperceptibility with Signal to Noise Ratio (SNR) more than 30 dB and payload 172.66 bps.
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Li, and Ji Chun Tan. "Multiple Watermarks Embedding Simultaneously to Identify Image Status Based on Fractional Fourier Transform." Advanced Materials Research 341-342 (September 2011): 758–62. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.758.

Full text
Abstract:
A new method of multiple watermarks embedding simultaneously to identify image status based on once and twice discrete fractional Fourier transform (DFRT) is presented. Random series watermark, chirp watermark and annotation watermark are embedded simultaneously in fractional Fourier transform domain to identify digital tamper detection, scanning detection, duplicate detection. According to the extracting situation of three kinds of watermarks from an image and the twice DFRT amplitude spectrum, we can know whether the image is tampered, scanned or duplicated. It provides a convenient way to identify the status of the image and will be an all-sided and comprehensive anti-counterfeiting technology.
APA, Harvard, Vancouver, ISO, and other styles
9

Omura, Hajime, and Teruya Minamoto. "Image quality degradation assessment based on the dual-tree complex discrete wavelet transform for evaluating watermarked images." International Journal of Wavelets, Multiresolution and Information Processing 15, no. 05 (2017): 1750046. http://dx.doi.org/10.1142/s0219691317500461.

Full text
Abstract:
We propose a new image quality degradation assessment method based on the dual-tree complex discrete wavelet transform (DT-CDWT) for evaluating the image quality of watermarked images. The peak signal-to-noise ratio (PSNR) and structural similarity (SSIM) are widely used to evaluate image quality degradation resulting from embedding a digital watermark. The majority of digital image watermarking methods embed a digital watermark in the spatial or frequency domain of an original image. They evaluate image quality degradation using only the spatial domain in spite of the fact that the majority of digital image watermarking methods embed a digital watermark in the spatial or frequency domain. As a result, they do not always fairly evaluate the image quality degradation. Therefore, our method evaluates image quality degradation of the watermarked images using features in the spatial and frequency domains. To extract the features, we defined three indices: 1-norm estimation using bit-planes in the spatial domain, the sharpness, and 1-norm estimation based on the DT-CDWT domains. We describe our image quality assessment method in detail and present experimental results demonstrating that there is a strong positive correlation between the result obtained by our method and a subjective evaluation, in comparison with PSNR and SSIM.
APA, Harvard, Vancouver, ISO, and other styles
10

Hadad, Abbas Abd-Alhussein, Hiyam N. Khalid, Zainab S. Naser, and Mustafa Sabah Taha. "A Robust Color Image Watermarking Scheme Based on Discrete Wavelet Transform Domain and Discrete Slantlet Transform Technique." Ingénierie des systèmes d information 27, no. 2 (2022): 313–19. http://dx.doi.org/10.18280/isi.270215.

Full text
Abstract:
Watermarking is primarily used to prevent unauthorized copying of digital data by inserting a watermark as a symbol of ownership in the digital data. The purpose of this work is to increase the imperceptibility and robustness of watermarked image by utilizing the Discrete Wavelet Transform (DWT) domain and Discrete Slantlet Transform (DST) technique. In compared to existing methodologies, the strategies used in this work considerably increased the robustness, imperceptibility, and protection of the watermarked image against JPEG compression and other types of noise attacks. The proposed method's robustness was determined by comparing the image's Normalized Cross-Correlation (NCC) value before and after the watermarking operation. The proposed method increased the NCC value to greater than 0.7 and the Peak Signal-to-Noise Ratio (PSNR) value to greater than 59 decibels (dB). Additionally, the proposed approach does not require knowledge of the original image in order to extract the watermarks.
APA, Harvard, Vancouver, ISO, and other styles
11

Wu, Weishuai, Yujiao Dong, and Guangyi Wang. "Image Robust Watermarking Method Based on DWT-SVD Transform and Chaotic Map." Complexity 2024 (May 15, 2024): 1–18. http://dx.doi.org/10.1155/2024/6618382.

Full text
Abstract:
The existing watermarking algorithms make it difficult to balance the invisibility and robustness of the watermark. This paper proposes a robust image watermarking method based on discrete wavelet transform (DWT), singular value decomposition (SVD), and chaotic maps. This method is a semiblind watermarking method. First, a chaotic logistic-tent map is introduced, employing an extensive chaotic parameter domain. This map is amalgamated with Arnold’s transformation to encrypt the watermark image, thereby bolstering the security of the watermark information. Subsequently, the frequency domain is obtained by applying DWT to the carrier image. Embedding watermarks in the frequency domain ensures the invisibility of the watermark, with a preference for a high-frequency subband after the DWT of the carrier image for enhanced watermark robustness. SVD is then applied to both the high-frequency subband of the carrier image after DWT and the encrypted watermark image. The final step involves embedding the singular values of the encrypted watermark image into the carrier image’s singular values, thereby completing the watermark information embedding process. In simulation experiments, an invisibility test was conducted on various carrier images, yielding peak signal-to-noise ratio (PSNR) values consistently exceeding 43, and structural similarity (SSIM) close to 1. Robustness testing against various types of attacks resulted in normalized correlation (NC) values consistently surpassing 0.9, with bit error rate (BER) values approaching 0. In conclusion, the proposed algorithm satisfies imperceptibility requirements while demonstrating formidable robustness.
APA, Harvard, Vancouver, ISO, and other styles
12

Omar, Adwan. "Robust Image Watermarking Method using Wavelet Transform." Signal & Image Processing: An International Journal (SIPIJ) 10, no. 5 (2019): 29–38. https://doi.org/10.5281/zenodo.3549396.

Full text
Abstract:
In this paper a robust watermarking method operating in the wavelet domain for grayscale digital images is developed. The method first computes the differences between the watermark and the HH1 sub-band of the cover image values and then embed these differences in one of the frequency sub-bands. The results show that embedding the watermark in the LH1 sub-band gave the best results. The results were evaluated using the RMSE and the PSNR of both the original and the watermarked image. Although the watermark was recovered perfectly in the ideal case, the addition of Gaussian noise, or compression of the image using JPEG with quality less than 100 destroys the embedded watermark. Different experiments were carried out to test the performance of the proposed method and good results were obtained.
APA, Harvard, Vancouver, ISO, and other styles
13

SEDDIK, HASSEN, MOUNIR SAYADI, FARHAT FNAIECH, and MOHAMED CHERIET. "IMAGE WATERMARKING BASED ON THE HESSENBERG TRANSFORM." International Journal of Image and Graphics 09, no. 03 (2009): 411–33. http://dx.doi.org/10.1142/s0219467809003514.

Full text
Abstract:
Watermarking is now considered as an efficient means for assuring copyright protection and data owner identification. Watermark embedding techniques depend on the representation domain of the image (spatial, frequency, and multiresolution). Every domain has its specific advantages and limitations. Moreover, each technique in a chosen domain is found to be robust to specific sets of attack types. So we need to propose more robust domains to defeat these limitations and respect all the watermarking criterions (capacity, invisibility and robustness). In this paper, a new watermarking method is presented using a new domain for the image representation and the watermark embedding: the mathematical Hessenberg transformation. This domain is found to be robust against a wide range of STIRMARK attacks such as JPEG compression, convolution filtering and noise adding. The robustness of the new technique in preserving and extracting the embedded watermark is proved after various attacks types. It is also improved when compared with other methods in use. In addition, the proposed method is blind and the use of the host image is not needed in the watermark detection process.
APA, Harvard, Vancouver, ISO, and other styles
14

JIN, CONG. "ROBUST WAVELET-DOMAIN WATERMARK SCHEME BASED ON FUZZY TECHNOLOGY." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 15, no. 06 (2007): 737–51. http://dx.doi.org/10.1142/s0218488507004972.

Full text
Abstract:
Digital watermark technology has been proposed as an effective method to protect the copyright of multimedia data. An adaptive image watermark scheme based on fuzzy inference system that in discrete wavelet transform domain is proposed. By exploiting the brightness and texture characteristics of human visual system and considering properties of the original image wavelet coefficient, a fuzzy inference system is designed whose inputs are parameters of brightness and texture of the original image and output is the strength of embedded watermarks. It ensures that the watermark embedding strength is determined adaptively. The experimental results show that the watermarks embed by the proposed scheme are robust against attacks commonly used image processing methods such as JPEG compression, Gaussian noise, cropping, mean filtering, median filtering, rotation, and rescaling etc. Proposed scheme are shown to provide very good results in term of image imperceptibility, too.
APA, Harvard, Vancouver, ISO, and other styles
15

Sahir, Mourad, Tewfik Bekkouche, Fairouz Belilita, and Nourredine Amardjia. "An Optimized Color Image Watermarking Scheme based on HD and SVD in DWT Domain." Engineering, Technology & Applied Science Research 15, no. 2 (2025): 21639–46. https://doi.org/10.48084/etasr.9504.

Full text
Abstract:
Digital watermarking is considered a trustworthy strategy for proving ownership of valuable digital files such as audio, image, and video documents. Most of the prevailing image watermarking systems embed grayscale or binary image watermarks, while only a few use color images as watermarks. In this paper, we develop a secure, imperceptible, and robust optimized semi-blind color image watermarking technique that uses color images as watermarks. It is based on Hessenberg Decomposition (HD) and Singular Value Decomposition (SVD) in the Discrete Wavelet Transform (DWT) domain. First, the color host image and color watermark image in RGB space are converted to YCbCr space, and then the watermark data are embedded into the luminance component (Y) of the host image. In this work, the principal component of the watermark's luminance (Y) is implanted into the associated singular value of the host image with an appropriate scaling factor that optimizes the robustness-imperceptibility tradeoff. The Artificial Bee Colony (ABC) algorithm is used to find the appropriate scaling factors. To further enhance the security, the Arnold transformation is used to scramble the Y channel of the watermark before it is injected into the host image. As demonstrated by the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) metrics, the proposed scheme exhibits high invisibility and is robust to most image processing manipulations, geometric operations, and combinational attacks. Compared to various existing color image watermarking schemes that use color images as watermarks, it shows higher imperceptibility and robustness.
APA, Harvard, Vancouver, ISO, and other styles
16

Korzhik, Valery, Guilermo Morales-Luna, Alexander Kochkarev, and Dmitriy Flaxman. "Concatenated digital watermarking system robust to different removal attacks." Computer Science and Information Systems 11, no. 4 (2014): 1581–94. http://dx.doi.org/10.2298/csis131218072k.

Full text
Abstract:
A new concatenated digital watermarking system that combines in a serial manner both ?holographic? transform domain and image-normalized method has been proposed and developed. Since the first procedure is resistant to watermarks removal attacks as cropping of windows, removal of rows and columns and JPEG compression, and the second procedure is especially robust against geometric transforms, we get a watermarking system embracing a resistance to the above mentioned attacks. The image corrupting after concatenated watermark usage and error correcting codes applying in order to improve a reliability of fingerprinting application of watermark have been also investigated.
APA, Harvard, Vancouver, ISO, and other styles
17

LI, LI, ZHIGENG PAN, and DAVID ZHANG. "A PUBLIC MESH WATERMARKING ALGORITHM BASED ON ADDITION PROPERTY OF FOURIER TRANSFORM." International Journal of Image and Graphics 06, no. 01 (2006): 35–43. http://dx.doi.org/10.1142/s0219467806002070.

Full text
Abstract:
This paper presents a public mesh watermarking algorithm whereby the resultant watermarked image minus the original image is the watermark information. According to the addition property of the Fourier transform, a change of spatial domain will cause a change in the frequency domain. The watermark information is then scaled down and embedded in one part of the x-coordinate of the original mesh. Finally, the x-coordinate of the test mesh is amplified before extraction. Experimental results prove that our algorithm is resistant to a variety of attacks without the need for any preprocessing.
APA, Harvard, Vancouver, ISO, and other styles
18

Hasan, Harith Raad. "Copyright Protection for Digital Certificate using Blind Watermarking Technique." Kurdistan Journal of Applied Research 3, no. 1 (2018): 75–79. http://dx.doi.org/10.24017/science.2018.1.15.

Full text
Abstract:
This paper proposes a copyright protection system for digital certificate image using blind watermarking technique by applying discrete wavelet transform algorithm (DWT). The proposed technique utilizes three interrelated watermarks namely, Red watermark (RW), Green-watermark (GW) and Blue-watermark (BW). Firstly, RGB cover and RGB watermark image are divided for three color space R,G,B. Then the R component is chosen for embedding (RW), the B component is selected for embedding the (BW) and the G component is selected for embedding the (GW), R,G and B of the cover image are converted into the transform domain using DWT, and is subsequently decomposed into three levels viz. LH1, LL2 and LL3 sub-bands. RW, GW and BW are then embedded onto LL3. Experimental results show that the performance of the proposed technique is very encouraging with average PSNR of 44 db, and NCC value of more than 0.99 for extracted watermarks after performing several types of attacks.
APA, Harvard, Vancouver, ISO, and other styles
19

Chen, Guang Xue, Bao Lin Tang, Qi Feng Chen, and Jing Lei Tai. "Research into Digital Watermark Algorithm Based on Wavelet Domain." Advanced Engineering Forum 6-7 (September 2012): 525–29. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.525.

Full text
Abstract:
In this paper, the key research was focused on the algorithm based on wavelet domain after analyzing and comparing several watermark algorithms. Disperse Wave Transform(DWT) watermark and Disperse Cosine Transform(DCT) watermark are both belong to transform domain technology, and they have more robustness than spatial-temporal domain technology, and DWT is superior to DCT. DWT can use the spatial-frequency characteristics of Human Visual System, and Mosaic will not appear in reconstruct image. DWT also can use image fusion technology to disperse watermark into multiple scales of carrier data, and got more robustness. In this paper, watermark embedding based on wavelet domain in which raster data are carrier was performed, then extracting and detecting watermark were done. Experiment results show that digital watermark based on wavelet domain will get better invisibility and robustness, and can be used in following the data by digital fingerprint.
APA, Harvard, Vancouver, ISO, and other styles
20

Omer Bin Hussain. "A Hybrid Domain-Based Digital Watermarking Technique for Robust and Imperceptible Image Copyright Protection." Journal of Information Systems Engineering and Management 10, no. 7s (2025): 494–510. https://doi.org/10.52783/jisem.v10i7s.893.

Full text
Abstract:
This work provides a strong digital watermarking method to attain undetectable and robust watermark embedding by combining many domain transformations and decomposition methods. To guarantee good watermark embedding and retrieval, the technique uses Discrete Wavelet Transform (DWT), Discrete Fourier Transform (DFT), Onion Peel Decomposition (OPD), Discrete Cosine Transform (DCT), and Singular Value Decomision (SVD). Using a strength value, the single values of the carrier picture are changed to incorporate the watermark, therefore guaranteeing low distortion and great imperceptibility. The sequence of transforms is reversed during extraction to faithfully retrieve the watermark. Under several assault scenarios—including JPEG compression, Gaussian noise, salt-and-pepper noise, scaling, cropping, and blurring—a thorough investigation was done to assess resilience. Performance was evaluated using the normalised cross-correlation (NCC) metric—which measures the resemblance between the original and extracted watermark. With an average NCC of 0.99 over all attacks, the proposed system matched or surpassed present state-of- the-art methods. The technique also generated a strong Mean Structural Similarity Index Metric (MSSIM) of 0.9966, the lowest Mean Absolute Error (MAE) of 4.2729, and the highest Peak Signal-to-- Noise Ratio (PSNR) of 36.0477.Comparatively with both random and non-random distribution approaches, comparison with average NCC values of 0.98 and 0.99 correspondingly indicated significant resilience. The random spread method exhibited higher resistance to blurring attacks, even if the non-random spread strategy was best in scaling and cropping attacks. Visual examinations confirmed considerable similarity between the watermarked and retrieved images under all attack scenarios. These results show how effectively the proposed approach balances imperceptibility and robustness, hence ensuring dependability for safe digital watermarking applications in demanding surroundings.
APA, Harvard, Vancouver, ISO, and other styles
21

Min-Rui Zhang, Chen-Hong Lu, and Ke-Chu Yi. "A novel transform-domain image watermark." Canadian Journal of Electrical and Computer Engineering 29, no. 3 (2004): 179–82. http://dx.doi.org/10.1109/cjece.2004.1532521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

LATIF, ALIMOHAMMAD, and AHMAD REZA NAGHSH-NILCHI. "AN ADAPTIVE DIGITAL IMAGE WATERMARKING USING FUZZY GRADIENT ON DCT DOMAIN." Journal of Circuits, Systems and Computers 20, no. 05 (2011): 801–19. http://dx.doi.org/10.1142/s021812661100761x.

Full text
Abstract:
In this paper, an adaptive digital image watermarking technique using fuzzy gradient on DCT domain is presented. In our approach, the image is divided into separate blocks and the DCT is applied on each block individually. Then, the watermark is inserted in the transform domain and the inverse transform is carried out. We increase the robustness of the watermark by increasing the watermark strength. However, this reduces the fidelity of the watermarking scheme. This is because the fidelity and robustness of watermarking are generally in conflict with each other. To improve the fidelity, a new fuzzy-based method is introduced. In this method, a fuzzy gradient-based mask is generated from the host image. Then, as a post-processing stage, the generated mask is combined with the watermarked image. Experimental results show that the proposed technique has high fidelity as well as high robustness against a variety of attacks.
APA, Harvard, Vancouver, ISO, and other styles
23

Ibrahim, Mohamed M., Neamat S. Abdel Kader, and M. Zorkany. "Video Multiple Watermarking Technique Based on Image Interlacing Using DWT." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/634828.

Full text
Abstract:
Digital watermarking is one of the important techniques to secure digital media files in the domains of data authentication and copyright protection. In the nonblind watermarking systems, the need of the original host file in the watermark recovery operation makes an overhead over the system resources, doubles memory capacity, and doubles communications bandwidth. In this paper, a robust video multiple watermarking technique is proposed to solve this problem. This technique is based on image interlacing. In this technique, three-level discrete wavelet transform (DWT) is used as a watermark embedding/extracting domain, Arnold transform is used as a watermark encryption/decryption method, and different types of media (gray image, color image, and video) are used as watermarks. The robustness of this technique is tested by applying different types of attacks such as: geometric, noising, format-compression, and image-processing attacks. The simulation results show the effectiveness and good performance of the proposed technique in saving system resources, memory capacity, and communications bandwidth.
APA, Harvard, Vancouver, ISO, and other styles
24

Sheng, Tan, and Xiu Ping Zhao. "Research of Digital Watermarking Algorithm in Wavelet Domain Based on Arnold Transformation and SVD." Applied Mechanics and Materials 262 (December 2012): 143–46. http://dx.doi.org/10.4028/www.scientific.net/amm.262.143.

Full text
Abstract:
In this paper, Arnold transform and Singular Value Decomposition(SVD) are combined to be introduced into the research of wavelet domain digital watermarking algorithm.During experiment,we embed the watermark through modifying the singular value of low-frequency domain of host image with the scrambled watermark information.The simulation experiments show that the algorithm realizes the embedding and extraction of watermark smoothly.There is no visual difference between watermarked image and original host image can be found by naked eye,that means the invisibility of the algorithm is well;the watermark still can be extracted after several kinds of algorithm and geometric attacks,that means the robustness of the algorithm is acceptable.The research has a certain value in the digital copyright protection and security printing.
APA, Harvard, Vancouver, ISO, and other styles
25

Varghese, Justin, Omer Bin Hussain, Saudia Subash, and Abdul Razak T. "An effective digital image watermarking scheme incorporating DCT, DFT and SVD transformations." PeerJ Computer Science 9 (July 10, 2023): e1427. http://dx.doi.org/10.7717/peerj-cs.1427.

Full text
Abstract:
Image watermarking prevents copyright infringements by attaching visible/invisible watermark images as authentication identities in the owner’s documents. The article made analysis on the advantages of different transformations for choosing better combinations to make the watermark embedding process and observed that watermarking techniques incorporating discrete cosine transform (DCT) provide better resistance towards JPEG based potential attacks, discrete Fourier transform (DFT) has strong energy compaction with geometrical invariance properties to resist geometric attacks while singular value decomposition (SVD) provides stability, proportion invariance and rotation invariance properties and it provides strong resistance against noise based attacks. Considering these advantages of different transformations, the article presents a new non-blind watermarking algorithm by utilizing advantages of DFT, DCT and SVD transforms while attaching secret contents in cover images. The algorithm starts by applying DFT followed by onion peel decomposition (OPD) for decomposing Fourier domain carrier image to four frequency sub images. The scheme then applies DCT on the frequency bands and orders them in zigzag fashion to form four individual frequency arrays. In the final step of embedding process, it embeds four copies of watermark singular value contents in DFT domain with the carrier image singular value contents to produce the watermarked image. The experimental results based on subjective and objective metrics on various test images from standard image databases with different test conditions demarcate the stability of new algorithm in producing high quality watermarked images with fewer distortions even when the watermarked images are extremely distorted by potential attacks.
APA, Harvard, Vancouver, ISO, and other styles
26

Lipiński, P. "On domain selection for additive, blind image watermarking." Bulletin of the Polish Academy of Sciences: Technical Sciences 60, no. 2 (2012): 317–21. http://dx.doi.org/10.2478/v10175-012-0042-5.

Full text
Abstract:
Abstract. Recently, a variety of digital watermarking schemes have been developed for copyright protection of digital images. In robust watermarking, which is used in copyright protection, transform-based algorithms are used to ensure resilience of the watermark to common signal processing attacks. The most frequently used watermarking algorithms for additive watermark embedding involve DCT, DFT, SVD and DWT domains. In this article we verify which domain is optimal for robust, the additive watermark embedding scheme. We demonstrate that in additive watermark embedding the embedding domain plays more important role than the embedding formula.
APA, Harvard, Vancouver, ISO, and other styles
27

Hidayati, Indri, Mohammad Andri Budiman, and Muhammad Zarlis. "Analysis of Embedding Locations in the Subband Frequency DCT on Scanned Images." Data Science: Journal of Computing and Applied Informatics 7, no. 1 (2023): 1–14. http://dx.doi.org/10.32734/jocai.v7.i1-10359.

Full text
Abstract:
Uploading an identity card as an image for the account verification process or transactions online can be a threat to application users. Identity card theft can be carried out by irresponsible persons if the application can be hacked. Therefore, protection of the image is required for authentication. In this study, the proposed technique is watermarking. A watermark in the form of a binary image will be embedded into the image as ownership using a Discrete Cosine Transform. The Discrete Cosine Transform works in the frequency domain. The location of the embedding of different watermarks was analysed in each 8×8 DCT block. The results of the analysis to assess the imperceptibility of original images and watermarked images using PSNR (Peak Signal to Noise Ratio) and SSIM (Structural Similarity Index Measure), while assessing the watermark robustness embedded using NCC (Normalized Cross Correlation). The results show PSNR (Peak Signal to Noise Ratio) ≥ 54 dB with a watermark strength of 0,1 and an average SSIM (Structural Similarity Index Measure) ≥ 0,9 on 4 scanned images in BMP format with a resolution of 100 DPI. A good watermark embedding is done on the green component at middle frequencies to maintain a balance between imperceptibility and robustness. In contrast, the red component at low frequency is vulnerable to attacks in the form of brightness +20 and contrast +50 with an average NCC (Normalized Cross Correlation) ≤ 0,85.
APA, Harvard, Vancouver, ISO, and other styles
28

Varun, Kodathala Sai, Ajay Kumar Mandava, and Rakesh Chowdary. "Robust DWT-SVD Domain Image Watermarking based on Iterative Blending." Journal of Physics: Conference Series 2070, no. 1 (2021): 012111. http://dx.doi.org/10.1088/1742-6596/2070/1/012111.

Full text
Abstract:
Abstract Copyright protection for digital multimedia has become a research hotspot in recent years. As an efficient solution, the digital watermarking scheme has emerged at the right moment. In this article, a highly robust and hybrid watermarking method is proposed. The discrete wavelet transform (DWT) and the singular value decomposition (SVD) as well as iterative blending are adopted in this method to insert and recover the watermark. To enhance the watermark imperceptibility, the second low-level (LL2) coefficients after SVD are modified by using the watermark. Compared with the conventional DWT-SVD-based watermarking method and other watermarking techniques, the watermarked images obtained by the proposed method have higher image quality. In addition, the proposed method achieves high robustness in resisting various image processing attacks.
APA, Harvard, Vancouver, ISO, and other styles
29

K. Jayanthi, S., and K. Sridevi. "Mean Square Error Optimization to Authenticate Multi-Modality Medical Images in Wavelet Domain." International Journal of Engineering & Technology 7, no. 3.27 (2018): 265. http://dx.doi.org/10.14419/ijet.v7i3.27.17890.

Full text
Abstract:
Medical image watermarking which hides patient’s information in the medical image ensures its imperceptibility and at the same time provides robustness to the information that is embedded. Current research scenario embeds the authenticated message as watermark in the frequency domain to get watermarked image which has most of its values as real numbers. Since pixel intensity values must be represented as integers, the watermarked image is converted into spatial domain where the rounding error problem occurs and the embedded message cannot be extracted to prove its authenticity. In proposed work, a new watermarking scheme in Discrete Wavelet Transform (DWT) domain based on Genetic Algorithm (GA) is implemented to ensure correct retrieval of embedded watermark by optimizing Mean Square Error (MSE) measure.
APA, Harvard, Vancouver, ISO, and other styles
30

Fu, Yong Gang. "A Print-Scan Resilient Image Watermarking Scheme Based on Radon Transform." Applied Mechanics and Materials 687-691 (November 2014): 3812–17. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.3812.

Full text
Abstract:
In this paper, a print-scan resilient image watermarking scheme based on Radon transform and DCT(discrete cosine transform) is proposed. The watermark is preprocessed with a chaotic sequence, then the host image is transformed to frequency domain by block DCT. The preprocessed watermark is adaptively embedded into the transform domain coefficients by modulating the relationship between neighbor coefficients. The watermark detection process is accomplished without referring to the original image. Simulation results show good robustness against several attacks, such Jpeg compression, cropping, filtering and so on.
APA, Harvard, Vancouver, ISO, and other styles
31

AGARWAL, RASHMI, and M. S. SANTHANAM. "DIGITAL WATERMARKING IN THE SINGULAR VECTOR DOMAIN." International Journal of Image and Graphics 08, no. 03 (2008): 351–68. http://dx.doi.org/10.1142/s0219467808003131.

Full text
Abstract:
Many current watermarking algorithms insert data in the spatial or transform domains like the discrete cosine, the discrete Fourier, and the discrete wavelet transforms. In this paper, we present a data-hiding algorithm that exploits the singular value decomposition (SVD) representation of the data. We compute the SVD of the host image and the watermark and embed the watermark in the singular vectors of the host image. The proposed method leads to an imperceptible scheme for digital images, both in grey scale and color and is quite robust against attacks like noise and JPEG compression.
APA, Harvard, Vancouver, ISO, and other styles
32

Zhao, Jian, Shuaishuai Fan, Jian Jia, et al. "Texture Directionality-Based Digital Watermarking in Nonsubsample Shearlet Domain." Mathematical Problems in Engineering 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/6581279.

Full text
Abstract:
Digital watermarking is a technique used to protect an author’s copyright and has become widespread due to the rapid development of multimedia technologies. In this paper, a novel watermarking algorithm using the nonsubsample shearlet transform is proposed, which combines the directional edge features of an image. A shearlet provides an optimal multiresolution and multidirectional representation of an image based on distributed discontinuities such as edges, which ensures that the embedded watermark does not blur the image. In the proposed algorithm, the nonsubsample shearlet transform is used to decompose the cover image into directional subbands, where different directional subbands represent different directional and textured features. The subband whose texture directionality is strongest is selected to carry the watermark and is thus suitable for the human visual system. Next, singular value decomposition is performed on the selected subband image. Finally, the watermark is embedded in the singular value matrix, which is beneficial for the watermarking robustness and invisibility. In comparison with related watermarking algorithms based on discrete wavelet transforms and nonsubsample contourlet transform domains, experimental results demonstrate that the proposed scheme is highly robust against scaling, cropping, and compression.
APA, Harvard, Vancouver, ISO, and other styles
33

Zhou, Qifei, Hua Sun, Xinyan Pang, et al. "Watermarking Algorithm for Remote Sensing Images Based on Ring-Shaped Template Watermark and Multiscale LCM." Remote Sensing 16, no. 14 (2024): 2535. http://dx.doi.org/10.3390/rs16142535.

Full text
Abstract:
Identifying template watermarks under severe geometric distortions is a significant scientific problem in the current watermarking research for remote sensing images. We propose a novel watermarking algorithm that integrates the ring-shaped template watermark with the multiscale local contrast measure (LCM) method. In the embedding stage, the ring-shaped template watermark is embedded into the discrete Fourier transform (DFT) magnitude coefficients, converting the watermark into small targets in the DFT domain. During the detection stage, the multiscale LCM, a classic infrared small target detection method, enhances these small targets and generates a contrast map. Peak detection is then performed on the contrast map to determine the radius of the template watermark. Finally, circular edge local binarization is applied to extract the watermark information. The proposed method enables synchronization recovery of watermarks under blind conditions. The experimental results demonstrate that the method possesses strong robustness against various geometric attacks such as rotation, scaling, translation, and cropping. It outperforms comparative algorithms in terms of robustness and also exhibits good imperceptibility.
APA, Harvard, Vancouver, ISO, and other styles
34

Amhar, Fahmi, Endang Purnama Giri, Florence Elfriede Sinthauli Silalahi, et al. "Ownership Protection on Digital Elevation Model (DEM) Using Transform-Based Watermarking." ISPRS International Journal of Geo-Information 11, no. 3 (2022): 200. http://dx.doi.org/10.3390/ijgi11030200.

Full text
Abstract:
This research aims to protect Digital Elevation Model (DEM) data from piracy or counterfeiting. An invisible watermark inserted into the data, which will not considerably change the data value, is necessary. The proposed method involves the use of the two-dimensional discrete cosine transform (2D DCT), a combination of 2D DCT and discrete wavelet transform (DWT), and two-dimensional discrete Fourier transform (2D DFT) in the frequency domain. The data used include a National DEM file downloaded from the geoportal of the Geospatial Information Agency (Badan Informasi Geospasial—BIG). Three files represent mountainous, lowland/urban, and coastal areas. An “attack” is also conducted on the watermarked DEM by cropping. The results indicate that the watermarked DEM is well recognized. The watermark can be read 100% for 2D DCT, while that for 2D DFT can be read 90.50%. The distortion value of the elevation data under the DCT technique demonstrates the smallest maximum value of 0.1 m compared with 4.5 and 1.1 m for 2D DFT and 2D DCT–DWT. Meanwhile, the height difference (Max Delta), the peak signal-to-noise ratio, and the root mean squared error (RMSE) are highest in mountainous, lowland, and coastal areas, respectively. Overall, the 2D DCT is also superior to the 2D DFT and the2D DCT–DWT. Although only one can recognize the nine watermarks inserted on each sheet, DEMs attacked by the cropping process can still be identified. However, this finding can sufficiently confirm that DEMs belong to BIG.
APA, Harvard, Vancouver, ISO, and other styles
35

DEJEY and R. S. RAJESH. "AN IMPROVED WAVELET DOMAIN DIGITAL WATERMARKING FOR IMAGE PROTECTION." International Journal of Wavelets, Multiresolution and Information Processing 08, no. 01 (2010): 19–31. http://dx.doi.org/10.1142/s021969131000333x.

Full text
Abstract:
Watermarking is a potential method for the protection of ownership rights on digital images. A robust, invisible, non-blind watermarking scheme in the wavelet domain is proposed in this paper. The watermark is embedded in the mid frequency band after performing a single level wavelet decomposition using Discrete Wavelet Transform (DWT). The coefficients are grouped randomly prior to watermarking. The watermarked image is tested for various attacks including filtering and geometric attacks. The novelty of the proposed approach is that it provides better resistance to collusion attack also when compared with existing spatial domain approach. The appropriate mid frequency band for embedding the watermark is tested and the HL band proves to be the best.
APA, Harvard, Vancouver, ISO, and other styles
36

Maulida, Kurnia. "Studi Komparasi Video Watermarking dengan Algoritma Discrete Wavelet Transform dan Discrete Cosine Transform." MATHunesa: Jurnal Ilmiah Matematika 8, no. 3 (2020): 254–60. http://dx.doi.org/10.26740/mathunesa.v8n3.p254-260.

Full text
Abstract:
Perkembangan teknologi di era digital berkembang dengan sangat cepat setiap harinya. Dengan perkembangan teknologi digital saat ini, media sosial dapat memudahkan kita untuk mengakses serta mendistribusikan teks, gambar, video, dan lainnya. Risiko terjadinya kejahatan di video lebih tinggi dibandingkan dengan teks dan gambar. Digital watermarking dapat digunakan untuk melindungi informasi digital dari manipulasi dan distribusi illegal. Penyisipan watermark umumnya dilakukan dalam domain spasial atau domain frekuensi. Metode yang digunakan adalah Discrete Wavelet Transform (DWT) dan Discrete Cosine Transform (DCT). DWT digunakan untuk mendapatkan komponen multi-resolusi yaitu horisontal, vertikal dan diagonal dari suatu gambar. Sedangkan, DCT memisahkan setiap blok gambar menjadi pita frekuensi rendah, sedang dan tinggi. PSNR adalah rasio antara kekuatan maksimum yang mungkin dari sinyal dan kekuatan noise yang merusak. Berdasarkan penelitian yang dilakukan penulis semakin besar koefisien DCT/DWT maka semakin bagus kualitas gambar hasil ekstrak. Hasil uji coba menunjukkan nilai PSNR video watermark menggunakan DWT lebih besar daripada nilai PSNR video watermark menggunakan DCT. Namun, selisih nilai PSNR antara DWT dan DCT sangat kecil. Nilai PSNR video watermark lebih kecil dari 30 mengindikasikan kedua video memiliki kemiripan yang rendah. Semakin besar nilai PSNR video semakin bagus kualitas video tersebut.
APA, Harvard, Vancouver, ISO, and other styles
37

Deng, Ming Hui, Qing Shuang Zeng, and Xiu Li Zhou. "Robust Watermarking Algorithm Based on Hilbert-Huang Theory." Advanced Materials Research 255-260 (May 2011): 2291–95. http://dx.doi.org/10.4028/www.scientific.net/amr.255-260.2291.

Full text
Abstract:
In this paper, we introduce a robust image watermarking method based on Hilbert-Huang Transform (HHT) against geometric distortion. This watermarking is detected by a linear frequency change. The HHT transformation is used to detect the watermark. The chirp signals are used as watermarks and this type of signals is resistant to all stationary filtering methods and exhibits geometrical symmetry. In the two-dimensional Radon-Wigner transformation domain, the chirp signals used as watermarks change only its position in space/spatial-frequency distribution, after applying linear geometrical attack, such as scale rotation and cropping. But the two-dimensional Radon-Wigner transformation needs too much difficult computing. So the image is put into a series of 1D signal by choosing scalable local time windows. The watermark embedded in the HHT transformation domain. The watermark thus generated is invisible and performs well in StirMark test and is robust to geometrical attacks. Compared with other watermarking algorithms, this algorithm is more robust, especially against geometric distortion, while having excellent frequency properties.
APA, Harvard, Vancouver, ISO, and other styles
38

Ohura, Ryuji, and Teruya Minamoto. "A blind digital image watermarking method based on the dyadic wavelet packet transform and fast interval arithmetic techniques." International Journal of Wavelets, Multiresolution and Information Processing 13, no. 05 (2015): 1550040. http://dx.doi.org/10.1142/s021969131550040x.

Full text
Abstract:
We propose a new digital image watermarking method based on the dyadic wavelet packet transform (DYWPT) and fast interval arithmetic (IA) techniques. Because the DYWPT has a redundant representation, like the dyadic wavelet transform (DYWT), the amount of information that the watermark must contain is greater than in the case of methods based on ordinary discrete wavelet transforms (DWTs) and the discrete wavelet packet transform (DWPT). However, the order of the high frequency components is not necessarily the same as the order of their frequency domain. Therefore, in our approach, we rearrange the order of the high frequency components in descending order of frequency components and embed a watermark selectively into higher frequency components. Our watermark is a ternary-valued logo that is embedded into higher frequency components through use of the DYWPT and fast IA techniques. We describe our watermarking procedure in detail and present experimental results demonstrating that our method produces watermarked images that have better quality and are robust with respect to various types of attacks, including marking, clipping, median filtering, contrast tuning (histeq and imadjust commands in the MATLAB Image Processing Toolbox), addition of Gaussian white noise, addition of salt & pepper noise, JPEG and JPEG 2000 compressions, rotation, and resizing.
APA, Harvard, Vancouver, ISO, and other styles
39

Ruban, Igor, Nataliia Bolohova, Vitalii Martovytskyi, and Roman Yaroshevych. "METHODOLOGY FOR ASSESSING THE EFFECTIVENESS OF METHODS FOR EMBEDDING DIGITAL WATERMARKS." Advanced Information Systems 5, no. 3 (2021): 112–18. http://dx.doi.org/10.20998/2522-9052.2021.3.15.

Full text
Abstract:
In recent years, we have seen a significant increase in traffic moving across various networks and channels. The development of technology and global network leads to an increase in the amount of multimedia traffic. To authenticate and avoid abuse, data should be protected with watermarks. This paper discusses various robust and invisible watermarking methods in the spatial domain and the transform domain. The basic concepts of digital watermarks, important characteristics and areas of application of watermarks are considered in detail. The paper also presents the most important criteria for assessing the digital watermark effectiveness. Based on the analysis of the current state of the digital watermarking methods, robustness, imperceptibility, security and payload have been determined as the main factors in most scientific works. Moreover, researchers use different methods to improve / balance these factors to create an effective watermarking system. Our research identified the main factors and new techniques used in modern research. And the assessment of watermark method effectiveness was proposed.
APA, Harvard, Vancouver, ISO, and other styles
40

Soualmi, Abdallah, Adel Alti, and Lamri Laouamer. "Multiple Blind Watermarking Framework for Security and Integrity of Medical Images in E-Health Applications." International Journal of Computer Vision and Image Processing 11, no. 1 (2021): 1–16. http://dx.doi.org/10.4018/ijcvip.2021010101.

Full text
Abstract:
Nowadays, e-health applications carry the most advanced information and communication technologies for ensuring quality, remote healthcare services, and support diagnostics. These applications are sharing and transmitting of medical data over the internet, which makes them serious targets for alteration and illegal access. Image watermarking presents a compelling solution for protecting patient's information and ensures medical image integrity. This paper gives a new secure framework to protect medical data based on blind multiple watermarking schemes. The proposed approach consists of combining LWT (lifting wavelet transform), QR decomposition, and Arnold chaotic map in transform domain for the first watermark, while for the second watermark is encrusted in the spatial domain. During the de-watermarking process, both extracted watermarks are compared to detect any alterations during transmitting. The experimentation results demonstrate that the suggested method achieves good image fidelity and alters detection and robustness contra different kinds of attacks.
APA, Harvard, Vancouver, ISO, and other styles
41

Younis, Dr Hameed A. "Robust Image Watermarking in the Wavelet Domain." Journal of Kufa for Mathematics and Computer 1, no. 2 (2010): 23–34. http://dx.doi.org/10.31642/jokmc/2018/010203.

Full text
Abstract:
The growth of new imaging technologies has created a need for techniques that can be used for copyright protection of digital images. In this paper, a new and robust spread spectrum basedwatermarking scheme has been proposed.The proposed scheme depend on both Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT). First, we decompose the image by DWT into asingle level. Then, the approximation part is divided into blocks. The embedding is done in an adaptive fashion depending on the mean (M) of the block. A chaotic sequence of real numbers, depends on asecret key, is embedded as a watermark in the DCT coefficients of the selected blocks. Detection stage generates a watermark which would be compared with the original watermark, by the correlation measure, to determine the existing of the watermark or not. Different tests have been experimented to explain the transparency and the robust of the proposed scheme.
APA, Harvard, Vancouver, ISO, and other styles
42

Manpreet, Kaur* &. Er. Sandeep Singh Dhaliwal. "ROBUST AND SECURE IMAGE WATERMARKING USING DWT-SVD-PCA WITH RANDOM KEY ENCRYPTION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 8, no. 6 (2019): 152–63. https://doi.org/10.5281/zenodo.3256051.

Full text
Abstract:
A watermark is a form of image or text that is impressed onto the paper that provides evidence of its authenticity. Although various watermarking techniques have been developed studied in literature and it&rsquo;s a valuable tool for copyright protection, information hiding and data integrity. Watermarking may be done in spatial domain or transform domain such as DCT or wavelet. We choose to insert the mark in DWT domain because this is domain still used by many algorithms and have advantages over DCT standard. We use DES algorithm to encrypt the watermark image and transform ciphers are used to transform the text watermark. This method is useful to achieve certain level of quality. The performance of our proposed system is evaluating by calculating PSNR and MSE values of original and watermark image. The results prove that the algorithm is robust enough to handle the various types of attacks. Our system can preserve the appropriate level of quality. By embedding the watermark into DWT is far better than embedding the watermark in DCT domain. The Proposed research aims to develop an improved Watermarking approach which is based on DWT and SVD along with encryption. Of color images with higher imperceptibility/quality, large capacity/payload and better in robustness/resistance to attacks. Images as well as text messages can be hide within the images using sequential and random methods. It will incorporate cryptography to achieve high security and random pixel embedding to attain high immunity to attacks. Performance of the same had been analyzed by calculating normalized correlation (NC), peak signal to noise ratio(PSNR) men square error (MSE) for various attacks. Moreover the performance of had been compared with&nbsp;&nbsp; Tapas <em>etal </em>Algorithm, DSAWM Algorithm. Here we have tested this system on 50 different images. Maximum observed values of the proposed system for PSNR is 68.41 without attaks and 58.94 with attacks. Minimun MSE values of the existing test cases comes out to be 0.0018992. whereas value of NC is evaluated as 0.9984. These values are far better than that of existing systems.&nbsp; In the proposed system a new technique is developed to watermark the images after encryption process. In addition to DES algorithm we use DWT and SVD to apply the watermark. Proposed system is also tested on various types of attacks on the watermarked images to check the robustness of the system.
APA, Harvard, Vancouver, ISO, and other styles
43

Sharma, Akankasha, Amit Kumar Singh, and Pardeep Kumar. "Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images." Journal of Intelligent Systems 27, no. 1 (2018): 91–103. http://dx.doi.org/10.1515/jisys-2017-0032.

Full text
Abstract:
Abstract In this paper, we present an introduction of digital image watermarking followed by important characteristics and potential applications of digital watermarks. Further, recent state-of-the-art watermarking techniques as reported by noted authors are discussed in brief. It includes the performance comparison of reported transform/spatial domain based watermarking techniques presented in tabular form. This comprehensive survey will be significant for researchers who will be able to implement more efficient watermarking techniques. Moreover, we present a robust watermarking technique using fusion of discrete wavelet transform (DWT) and Karhunen-Loeve transform for digital images. Further, visual quality of the watermarked image is enhanced by using different image de-noising techniques. The results are obtained by varying the gain factor, size of the image watermark, different DWT sub-bands, and image processing attacks. Experimental results demonstrate that the method is imperceptible and robust for different image processing attacks.
APA, Harvard, Vancouver, ISO, and other styles
44

Gen, Lim Chen, Siti Nur Avivah, and Abu Jafar Md Muzahid. "Image Watermarking for Ensuring Image Integrity and Robust Copyright Protection Based on Discrete Wavelet Transform." IJACI : International Journal of Advanced Computing and Informatics 1, no. 1 (2025): 28–38. https://doi.org/10.71129/ijaci.v1.i1.pp28-38.

Full text
Abstract:
Digital media faces growing challenges related to unauthorized access, manipulation, and copyright infringement, necessitating robust solutions for authentication and copyright protection. This research introduces a novel dual watermarking scheme based on Discrete Wavelet Transform (DWT) to address these issues. The primary goal is to offer robust copyright protection by embedding a watermark containing ownership and copyright information in the spatial domain using DWT, serving as a digital signature for identifying and tracing rightful ownership. Additionally, the frequency domain embedding improves the watermark's resilience to common attacks. The scheme also incorporates a fragile watermark for content authentication, embedded in the least significant bit to detect tampering. By comparing the fragile watermark, the content's integrity and authenticity are verified. Experimental results confirm the scheme's effectiveness, showing high imperceptibility and robust performance in protecting against unauthorized alterations while preserving visual quality. The proposed scheme achieved robustness performance with NC value of 0.98 under JPEG compression, the scheme also has ability to ensure the tamper detection with accuracy of 0.996 under tampering rate of 0.84.
APA, Harvard, Vancouver, ISO, and other styles
45

Liang, Yucheng, Ke Niu, Yingnan Zhang, Yifei Meng, and Fangmeng Hu. "A Video Dual-Domain Blind Watermarking Algorithm Based on Hadamard Transform." Mathematics 12, no. 18 (2024): 2938. http://dx.doi.org/10.3390/math12182938.

Full text
Abstract:
Addressing the compatibility challenges surrounding the robustness and reversibility of existing video watermarking techniques, this study introduces a novel video dual-domain blind watermarking algorithm leveraging the Hadamard transform. Specifically tailored for H.264 video copyright protection, the algorithm initially organizes video frames and identifies key frames for watermark embedding. Prior to embedding, the robust watermark undergoes coding preprocessing to optimize its integration. Subsequently, a 4×4 block is expanded based on the selected embedding position within the frame, followed by the application of the Hadamard transform to the enlarged block. The 1-bit robust watermark information is then embedded via the coefficient pair located in the first row of the Hadamard coefficient matrix corresponding to the expanded block. Additionally, a reversible watermark, designed to mitigate the distortions introduced during robust embedding, is generated and embedded into the remaining coefficients of the coefficient matrix using reversible embedding techniques. During watermark extraction, the dual-domain watermark can be retrieved exclusively through reversible extraction methodologies by analyzing the size relationship of coefficient pairs, eliminating the need for access to the original video data. To bolster the algorithm’s robustness, a majority-subordinate voting system is devised and implemented, effectively enhancing its resilience. Experimental findings demonstrate that, compared to similar approaches, this algorithm not only enhances the reversibility of video restoration but also exhibits superior robustness and meets the requirements for imperceptibility.
APA, Harvard, Vancouver, ISO, and other styles
46

Ye, Conghuan, Shenglong Tan, Jun Wang, Li Shi, Qiankun Zuo, and Bing Xiong. "Double Security Level Protection Based on Chaotic Maps and SVD for Medical Images." Mathematics 13, no. 2 (2025): 182. https://doi.org/10.3390/math13020182.

Full text
Abstract:
The widespread distribution of medical images in smart healthcare systems will cause privacy concerns. The unauthorized sharing of decrypted medical images remains uncontrollable, though image encryption can discourage privacy disclosure. This research proposes a double-level security scheme for medical images to overcome this problem. The proposed joint encryption and watermarking scheme is based on singular-value decomposition (SVD) and chaotic maps. First, three different random sequences are used to encrypt the LL subband in the discrete wavelet transform (DWT) domain; then, HL and LH sub-bands are embedded with watermark information; in the end, we obtain the watermarked and encrypted image with the inverse DWT (IDWT) transform. In this study, SVD is used for watermarking and encryption in the DWT domain. The main originality is that decryption and watermark extraction can be performed separately. Experimental results demonstrate the superiority of the proposed method in key spaces (10225), PSNR (76.2543), and UACI (0.3329). In this implementation, the following key achievements are attained. First, our scheme can meet requests of different security levels. Second, encryption and watermarking can be performed separately. Third, the watermark can be detected in the encrypted domain. Thus, experiment results and security analysis demonstrate the effectiveness of the proposed scheme.
APA, Harvard, Vancouver, ISO, and other styles
47

Thanki, Rohit, Surekha Borra, and Ashish Kothari. "Fragile Watermarking Framework for Tamper Detection of Color Biometric Images." International Journal of Digital Crime and Forensics 13, no. 2 (2021): 35–56. http://dx.doi.org/10.4018/ijdcf.2021030103.

Full text
Abstract:
Application of fragile watermarking on biometric images stored at a server or cloud ensures proper authentication and tamper detection when access to the servers was shared. In this paper, a hybrid domain fragile watermarking technique for authenticity of color biometric images, using hybridization of various transforms such as discrete cosine transform (DCT), fast discrete curvelet transform (FDCuT), and singular value decomposition (SVD) is proposed. The hybrid transform coefficients are modified according to the scrambled color watermark to obtain watermarked color biometric image. The security of this technique is strengthened with the usage of Arnold scrambling, and by using multiple secret keys. The proposed technique is analyzed on FEI Brazilian face database. The experimental results show that this technique performs better than the existing fragile watermarking techniques.
APA, Harvard, Vancouver, ISO, and other styles
48

Gao, Zhan Wei, Yong Mei Zhang, Cong Liu, Jie Geng, and De Kai Ba. "Dual Video Watermarking Scheme Based on Transform Domain." Applied Mechanics and Materials 155-156 (February 2012): 815–19. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.815.

Full text
Abstract:
The single watermark algorithms always merely have single function. In order to overcome the drawback, this paper proposed a dual video watermarking scheme based on transform domain. To implement the video copyright and integrality authentication, this paper embedded robust watermarking and fragile watermark. At the same time, this scheme made good use of the wavelet transform to embed the two different kinds of watermarking in the same video respectively. The fragile watermarking is to serve the robust watermarking. Experiments demonstrate this scheme can not only protect the copyright of the video effectively, but also protect against some attacks, such as shearing attack, JPEG lossy compression attack, noise attack etc. This scheme has better robustness and invisibility.
APA, Harvard, Vancouver, ISO, and other styles
49

Pereira, S., S. Voloshynoskiy, and T. Pun. "Optimal transform domain watermark embedding via linear programming." Signal Processing 81, no. 6 (2001): 1251–60. http://dx.doi.org/10.1016/s0165-1684(01)00042-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Sridhar, P., and . "A Robust Digital Image Watermarking in Hybrid Frequency Domain." International Journal of Engineering & Technology 7, no. 3.6 (2018): 243. http://dx.doi.org/10.14419/ijet.v7i3.6.14981.

Full text
Abstract:
Image watermarking is a method to hide the secret information in a host image for copyright protection of watermark data during the transmission by means of insecure channel. The proposed scheme protects our data with adaptive level of visual quality and robustness against signal processing and geometric attacks. The proposed method divides the host image into four non-overlapping segments labelled as sub-images, DWT is applied on each sub images and then block based DCT is applied on mid frequency channels LH and HL of discrete wavelet transform. Embedded matrix is formed using hybrid transformed coefficients where matrix elements are chosen from the localized two mid frequency coefficients of each block in DCT. SV Decomposition is applied on embedded matrix to factorize it into singular values, left and right singular vectors and embed the scrambled watermark image along with scaling factor in singular value matrix. This repetition of watermark data in each sub-image reduces the PSNR values of the watermarked image. Despite this proposed scheme scales down PSNR value, changing the scaling factor favours to adjust the PSNR to the acceptable level and withstand the signal processing attacks such as JPEG compression and geometrical attack such as rotation, translation. Compared to the other method, the proposed scheme gives better correlation coefficient value for above mentioned kinds of attacks and also provide adaptive PSNR for imperceptibility on watermarked image.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography