To see the other types of publications on this topic, follow the link: Watermark.

Journal articles on the topic 'Watermark'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Watermark.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Palani, Aberna, and Agilandeeswari Loganathan. "Multi-image Feature Map-Based Watermarking Techniques Using Transformer." International Journal of Electrical and Electronics Research 11, no. 2 (May 30, 2023): 339–44. http://dx.doi.org/10.37391/ijeer.110214.

Full text
Abstract:
Nowadays, protecting multimedia data is a significant challenge because of the advancement of technology and software. The embedding process heavily relies on watermarking to accomplish multimedia security in terms of content authentication, proof of ownership, and tamper detection. Our objective is to develop an invariant watermark that can survive different signal-processing attacks. We presented a unique hybrid technique (DWT-QR-SWT) and multi-image invariant features generated as a watermark using a Transformer encoder-decoder model. The encoded image features are subsampled using PCA in order to decrease the dimensionality of the watermark image. The first two images are used as watermark1 and the next two images as watermark2 to produce multi-watermark feature maps. To embed the watermark, a hybrid DWT-QR decomposition has been applied to the original image1. On the primary watermarked image, two Level Stationary Wavelet Transform (SWT) were applied to embed the secondary watermark2. At the extraction phase, the tampered image is recovered by passing the extracted watermark image as input to the transformer decoder. A multi-image watermark increases data embedding capabilities and also achieves two-level content authentication, tamper detection, localization, and recovery. With a PSNR of 59.05 dB, the testing result demonstrates great resilience and improved imperceptibility.
APA, Harvard, Vancouver, ISO, and other styles
2

Hassan, Mohammed. "WATERMARK TECHNIQUE FOR AUTHENTICATION OF VISIBLY WATERMARK IMAGES." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 2 (October 24, 2021): 121–38. http://dx.doi.org/10.55562/jrucs.v25i2.447.

Full text
Abstract:
With the rapid spread of computer networks and the wide use of multimedia technologies, many watermarking techniques are now under development and investigation for protecting owner's intellectual rights. Watermarks can be divided into two types, visible and invisible watermarks, physical visible watermarks have been used for centuries. Now days it is used in digital library, in video broad casting, and other multimedia services. The visible watermark may face several problems. Among these problems, watermark removal and unauthorized insertion are two main concern. This paper proposes a method of invisible watermark to overcome these problems. The watermarking process based on hiding a selected watermark object, that holds a little a mount of information relative to the source object, inside the cover image which has to be authenticated. The processes are based on using invisible watermarks to protect visibly watermarked images which are done by using different techniques. The experiments have shown that the proposed algorithm can provide a very effective protection for watermarked images.
APA, Harvard, Vancouver, ISO, and other styles
3

Mokashi, Bhargavi, Vandana S. Bhat, Jagadeesh D. Pujari, S. Roopashree, T. R. Mahesh, and D. Stalin Alex. "Efficient Hybrid Blind Watermarking in DWT-DCT-SVD with Dual Biometric Features for Images." Contrast Media & Molecular Imaging 2022 (September 8, 2022): 1–14. http://dx.doi.org/10.1155/2022/2918126.

Full text
Abstract:
In the modern era of virtual computers over the notional environment of computer networks, the protection of influential documents is a major concern. To bring out this motto, digital watermarking with biometric features plays a crucial part. It utilizes advanced technology of cuffing data into digital media, i.e., text, image, video, or audio files. The strategy of cuffing an image inside another image by applying biometric features namely signature and fingerprint using watermarking techniques is the key purpose of this study. To accomplish this, a combined watermarking strategy consisting of Discrete Wavelet Transform, Discrete Cosine Transform, and Singular Value Decomposition (DWT-DCT-SVD) is projected for authentication of image that is foolproof against attacks. Here, singular values of watermark1 (fingerprint) and watermark2 (signature) are obtained by applying DWT-DCT-SVD. Affixing both the singular values of watermarks, we acquire the transformed watermark. Later, the same is applied to cover image to extract the singular values. Then we add these values to the cover image and transformed watermark to obtain a final watermarked image containing both signature and fingerprint. To upgrade the reliability, sturdiness, and originality of the image, a fusion of watermarking techniques along with dual biometric features is exhibited. The experimental results conveyed that the proposed scheme achieved an average PSNR value of about 40 dB, an average SSIM value of 0.99, and an embedded watermark resilient to various attacks in the watermarked image.
APA, Harvard, Vancouver, ISO, and other styles
4

Juarez-Sandoval, Oswaldo Ulises, Laura Josefina Reyes-Ruiz, Francisco Garcia-Ugalde, Manuel Cedillo-Hernandez, Jazmin Ramirez-Hernandez, and Robert Morelos-Zaragoza. "Additional Information Delivery to Image Content via Improved Unseen–Visible Watermarking." Electronics 10, no. 18 (September 7, 2021): 2186. http://dx.doi.org/10.3390/electronics10182186.

Full text
Abstract:
In a practical watermark scenario, watermarks are used to provide auxiliary information; in this way, an analogous digital approach called unseen–visible watermark has been introduced to deliver auxiliary information. In this algorithm, the embedding stage takes advantage of the visible and invisible watermarking to embed an owner logotype or barcodes as watermarks; in the exhibition stage, the equipped functions of the display devices are used to reveal the watermark to the naked eyes, eliminating any watermark exhibition algorithm. In this paper, a watermark complement strategy for unseen–visible watermarking is proposed to improve the embedding stage, reducing the histogram distortion and the visual degradation of the watermarked image. The presented algorithm exhibits the following contributions: first, the algorithm can be applied to any class of images with large smooth regions of low or high intensity; second, a watermark complement strategy is introduced to reduce the visual degradation and histogram distortion of the watermarked image; and third, an embedding error measurement is proposed. Evaluation results show that the proposed strategy has high performance in comparison with other algorithms, providing a high visual quality of the exhibited watermark and preserving its robustness in terms of readability and imperceptibility against geometric and processing attacks.
APA, Harvard, Vancouver, ISO, and other styles
5

Togu Novriansyah Turnip, Tegar Arifin Prasetyo, Nevi Aktasia Banjarnahor, Winda Mariana Pasaribu, and Sopian Manurung. "Application of Double Pictures to Audio Watermarking using Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) Methods." Journal of Applied Technology and Informatics Indonesia 1, no. 2 (February 8, 2022): 7–13. http://dx.doi.org/10.54074/jati.v1i2.32.

Full text
Abstract:
One way to control the development of arbitrary distribution of audio is to apply audio watermarking. Audio Watermarking is used to identify the ownership rights of audio files by embedding a watermark while paying attention to the audio quality and the watermark's resistance to amplify, resampling, and invert attacks. Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) methods are frequency-domain methods that have a good robustness. The DCT and SVD methods are combined with inserting and extracting watermarks using two images as watermarks. From the test results, the effect of inserting an audio watermark with two images does not significantly impact the durability of the watermark and the quality of the audio inserted with the watermark. However, the alpha value has a significant effect. The higher the alpha value, the lower the audio SNR value by an average of 1.93 dB from an alpha value of 0.0008 and 0.001 for each type of classical, jazz, and rock audio genre.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Kaixuan. "Blind Digital Watermark Based on Discrete Fourier Transformation." Highlights in Science, Engineering and Technology 1 (June 14, 2022): 441–52. http://dx.doi.org/10.54097/hset.v1i.501.

Full text
Abstract:
The policy and security of digital images are concerned by all artists. Embedding blind digital watermarks to images is an effective solution to such problem. The existing blind digital watermark techniques for images are usually based on the spatial domain method, such as some build-in tools in some software like Photoshop. Those methods' imperceptibility is good, but the robustness is dissatisfactory. Therefore, blind digital watermark based on the frequency domain is becoming popular nowadays. The use of the frequency domain-based techniques can not only keep the imperceptibility but also ensure good robustness and non-removability. According to the reasons mentioned above, this thesis presents a frequency domain-based blind digital watermark technique. This method uses basic discrete Fourier transformation to transform an image to the frequency domain and then embeds a digital watermark. To increase the security, we also introduce some methods to encode watermarks before embedding them to the images. We conduct some experiments by applying the technique to some images with different watermarks. In the experiments, it can embed blind watermarks with the least effect on the quality of the original image and can also successfully extract watermarks from the watermarked image. The results show this technique is highly useable. We also conduct some experiments to simulate the attacks. This technique also shows great robustness after many kinds of different attacking methods.
APA, Harvard, Vancouver, ISO, and other styles
7

Peng, Li Sen, Yong Qiang Chen, and Han Ping Hu. "A Video Watermark Method Based on Chaotic Encryption." Applied Mechanics and Materials 44-47 (December 2010): 3383–87. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.3383.

Full text
Abstract:
An effective and integrated video watermark scheme mainly includes watermark generation, watermark embedding, watermark detecting, and watermark attack. The watermark data come from a meaningful binary image encrypted by two-dimensional chaotic stream encryption to improve watermark security. In the procedure of watermark embedding, watermarks are embedded into the random selected video frames through modifying the DCT coefficients. After robust and frame processes, watermarks can be mainly extracted and identified through watermark extracting algorithm. The experimental results show that the proposed video watermark method has some performances of security, imperceptibility and robustness.
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Li, Rui Bai, Shanqing Zhang, Chin-Chen Chang, and Mengtao Shi. "Screen-Shooting Resilient Watermarking Scheme via Learned Invariant Keypoints and QT." Sensors 21, no. 19 (September 30, 2021): 6554. http://dx.doi.org/10.3390/s21196554.

Full text
Abstract:
This paper proposes a screen-shooting resilient watermarking scheme via learned invariant keypoints and QT; that is, if the watermarked image is displayed on the screen and captured by a camera, the watermark can be still extracted from the photo. A screen-shooting resilient watermarking algorithm should meet the following two basic requirements: robust keypoints and a robust watermark algorithm. In our case, we embedded watermarks by combining the feature region filtering model to SuperPoint (FRFS) neural networks, quaternion discrete Fourier transform (QDFT), and tensor decomposition (TD). First we applied FRFS to locate the embedding feature regions which are decided by the keypoints that survive screen-shooting. Second, we structured watermark embedding regions centered at keypoints. Third, the watermarks were embedded by the QDFT and TD (QT) algorithm, which is robust for capturing process attacks. In a partial shooting scenario, the watermark is repeatedly embedded into different regions in an image to enhance robustness. Finally, we extracted the watermarks from at least one region at the extraction stage. The experimental results showed that the proposed scheme is very robust for camera shooting (including partial shooting) different shooting scenarios, and special attacks. Moreover, the efficient mechanism of screen-shooting resilient watermarking could have propietary protection and leak tracing applications.
APA, Harvard, Vancouver, ISO, and other styles
9

Mareen, Hannes, Niels Van Kets, Peter Lambert, and Glenn Van Wallendael. "Fast Fallback Watermark Detection Using Perceptual Hashes." Electronics 10, no. 10 (May 13, 2021): 1155. http://dx.doi.org/10.3390/electronics10101155.

Full text
Abstract:
Forensic watermarking is often used to enable the tracing of digital pirates that leak copyright-protected videos. However, existing watermarking methods have a limited robustness and may be vulnerable to targeted attacks. Our previous work proposed a fallback detection method that uses secondary watermarks rather than the primary watermarks embedded by existing methods. However, the previously proposed fallback method is slow and requires access to all watermarked videos. This paper proposes to make the fallback watermark detection method faster using perceptual hashes instead of uncompressed secondary watermark signals. These perceptual hashes can be calculated prior to detection, such that the actual detection process is sped up with a factor of approximately 26,000 to 92,000. In this way, the proposed method tackles the main criticism about practical usability of the slow fallback method. The fast detection comes at the cost of a modest decrease in robustness, although the fast fallback detection method can still outperform the existing primary watermark method. In conclusion, the proposed method enables fast and more robust detection of watermarks that were embedded by existing watermarking methods.
APA, Harvard, Vancouver, ISO, and other styles
10

D HARIKA and SYED NOORULLAH. "IMPLEMENTATION OF IMAGE AUTHENTICATION USING DIGITAL WATERMARKING WITH BIOMETRIC." international journal of engineering technology and management sciences 7, no. 1 (2023): 154–67. http://dx.doi.org/10.46647/ijetms.2023.v07i01.023.

Full text
Abstract:
The rapid global development of E-commerce in terms of digitalization and distribution of digital contents in the form of image, audio, video, increases the possibility of unrestricted duplication and broadcasting of copyrighted data and the protection of crucial documents is highly significant. Digital watermarking inserts watermark into the cover or host data by unnoticeable modification. In this work digital watermarking with biometric features is done. In this work a technique to implement the hiding of an image inside another image using biometric features namely signature and fingerprint using watermarking techniques is done. To accomplish this, a hybrid watermarking scheme consisting of Discrete Wavelet Transform, Discrete Cosine Transform and Singular Value Decomposition (DWT-DCT-SVD) is proposed for image authentication that is robust against attacks. Here, singular values of watermark1 (fingerprint) and watermark2 (signature) are obtained by applying DWT-DCT-SVD. By adding both the singular values of watermarks we acquire the transformed watermark. To improve the security, robustness and provide authenticity for the image, a two-step watermarking method is demonstrated. The evaluation parameters like PSNR (Peak Signal to Noise Ratio), SSIM (Structured Similarity Index Method), normalized correlation coefficient (NCC) are used for image quality assessment.
APA, Harvard, Vancouver, ISO, and other styles
11

Yen, Chih Ta, Ing Jr Ding, and Zong Wei Lai. "A Coded Digital Watermarking Recognition Using Neural Network Method." Applied Mechanics and Materials 284-287 (January 2013): 2961–64. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.2961.

Full text
Abstract:
Digital watermarking is an encryption technology commonly used to protect intellectual property and copyright. Although watermarks possess advantageous secrecy and robustness, environmental interference in the image propagation through the Internet is inevitable and, certainly, human-based image modification can also destroy the watermark. In this study, we restored watermarks that had already been affected by noise interference, used the Walsh-Hadamard codes as the watermark identification codes, and applied salt-and-pepper noise and Gaussian noise to destroy watermarks. First, we used a low-pass filter and median filter to remove noise interferences. Although these filters can suppress noises, watermarked images remain unidentifiable when the noise interferences strongly. Finally, we used a back-propagation neural network algorithm to filter noises, obtaining results that exceeded our expectations. We removed nearly all noise and recovered the originally embedded watermarks of Walsh-Hadmard codes.
APA, Harvard, Vancouver, ISO, and other styles
12

Zubova, Nataliia, Serhii Naumenko, and Viktor Somov. "TYPES OF WATERMARKS ON BANKNOTES AND METHODS OF THEIR IMITATION." Criminalistics and Forensics, no. 67 (August 9, 2022): 448–65. http://dx.doi.org/10.33994/kndise.2022.67.45.

Full text
Abstract:
The article deals with the consideration of ways to imitate watermarks in the manufacture of counterfeit banknotes. The watermark is an important public security element for banknotes issued for cash circulation. The basis of any banknote related to paper money is banknote paper. The article briefly describes the stages of the technological process of manufacturing banknote paper and methods for forming watermarks on it. The criteria for the classification of watermarks depending on their location on the banknote (general, local stripe), in relation to the overall tone of the paper (one-tone, two-tone, local, filigree, combined), composition, as well as drawings illustrating these types of watermarks are given. signs. The watermarks developed using modern technologies in recent decades are described, as well as their illustrations. The levels of counterfeiting are determined depending on the subject and its technical capabilities for the manufacture of counterfeit banknotes. The ways of imitation of watermarks are generalized. Firstly, watermarked paper intended for other purposes can be used to make counterfeit banknotes. Secondly, the imitation of watermarks is possible using specially made forms: embossed, used for embossing paper, and printed-screen or letterpress. Widely used to imitate watermarks of copiers. Less common are watermarks, which are imitated using fat-containing substances, or painted with a dye. The article provides examples of the implementation of the relevant methods with their illustration based on studies of counterfeit banknotes. Key words: banknote, banknote paper, watermark, types of watermarks, watermark imitation.
APA, Harvard, Vancouver, ISO, and other styles
13

Ernawan, Ferda, Siau-Chuin Liew, Zuriani Mustaffa, and Kohbalan Moorthy. "A Blind Multiple Watermarks based on Human Visual Characteristics." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 4 (August 1, 2018): 2578. http://dx.doi.org/10.11591/ijece.v8i4.pp2578-2587.

Full text
Abstract:
<span lang="EN-MY">Digital watermarking is an alternative solution to prevent unauthorized duplication, distribution and breach of ownership right. </span><span>This paper proposes a watermarking scheme for multiple watermarks embedding. The embedding of multiple watermarks use a block-based scheme based on human visual characteristics. A threshold is used to determine the watermark values by modifying first column of the orthogonal <em>U</em> matrix obtained from Singular Value Decomposition (SVD). The tradeoff between normalize cross-correlation and imperceptibility of watermarked image from quantization steps was used to achieve an optimal threshold value. The results show that our proposed multiple watermarks scheme exhibit robustness against signal processing attacks. The proposed scheme demonstrates that the watermark recovery from chrominance blue was resistant against different types of attacks.</span>
APA, Harvard, Vancouver, ISO, and other styles
14

Ma, Qiang, Ling Xing, and Bin Wu. "A Semantic Watermarking Technique for Authenticating Video of H.264." Applied Mechanics and Materials 411-414 (September 2013): 1197–200. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.1197.

Full text
Abstract:
A novel watermarking technique to authenticate video of H.264 is presented in this paper, using Uniform Content Locator (UCL) to semantically indexing video content and dual watermarks to preserve and enhance video content integrity and authentication. UCL index information is firstly extracted from video content and is formatted as semantic watermark to be embedded in video content. The UCL watermark is regarded as robust watermark and is then embedded into medium frequencies of DCT-coefficients of H.264 video I-frames in order to protect video attributes property (e.g., video author, copyright, content category). Features information obtained from the previously watermarked DCT-coefficients are treated as fragile watermark and are embedded into the motion vectors of H.264 video P-frames in order to ensure video secrecies (e.g., video integrity, authentication). Experiments demonstrate that this proposed technique can fulfill the requirements of H.264 video authentication and has negligible effects on video code rate change and content distortion.
APA, Harvard, Vancouver, ISO, and other styles
15

Kaur, Randeep, and Kamaljit Kaur Dhillon. "GRAYSCALE IMAGE WATERMARK DETECTION." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (August 1, 2012): 100–105. http://dx.doi.org/10.24297/ijct.v3i1b.2748.

Full text
Abstract:
A Digital watermarking is a technique that provides a solution to the longstanding problems faced with copyrighting digital data. Digital watermarks are pieces of information added to digital data (audio, video, or still images) that can be detected or extracted later to make an assertion about the data. This information can be textual data about the author, its copyright, etc; or it can be an image itself. Watermarking Based on DCT Coefficient Modulation technique embeds the watermark in the DCT domain to increase the robustness of the watermarking scheme.DCT based watermarking is an example of frequency domain watermarking. The objective of this research work is to implement DCT based watermarking technique on gray scale image. The study focuses on evaluating the robustness of watermarked image after having three different attacks on watermarked image and extraction of watermark from that particular image. To compare the DCT based watermarking with LSB based watermarking and to validate the proposed work & the comparative results of watermarking using DCT and LSB are also presented. This paper recommends DCT based technique for achieving robustness in digital image watermarking.
APA, Harvard, Vancouver, ISO, and other styles
16

Cun, Xiaodong, and Chi-Man Pun. "Split then Refine: Stacked Attention-guided ResUNets for Blind Single Image Visible Watermark Removal." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 2 (May 18, 2021): 1184–92. http://dx.doi.org/10.1609/aaai.v35i2.16205.

Full text
Abstract:
Digital watermark is a commonly used technique to protect the copyright of medias. Simultaneously, to increase the robustness of watermark, attacking technique, such as watermark removal, also gets the attention from the community. Previous watermark removal methods require to gain the watermark location from users or train a multi-task network to recover the background indiscriminately. However, when jointly learning, the network performs better on watermark detection than recovering the texture. Inspired by this observation and to erase the visible watermarks blindly, we propose a novel two-stage framework with a stacked attention-guided ResUNets to simulate the process of detection, removal and refinement. In the first stage, we design a multi-task network called SplitNet. It learns the basis features for three sub-tasks altogether while the task-specific features separately use multiple channel attentions. Then, with the predicted mask and coarser restored image, we design RefineNet to smooth the watermarked region with a mask-guided spatial attention. Besides network structure, the proposed algorithm also combines multiple perceptual losses for better quality both visually and numerically. We extensively evaluate our algorithm over four different datasets under various settings and the experiments show that our approach outperforms other state-of-the-art methods by a large margin.
APA, Harvard, Vancouver, ISO, and other styles
17

Marjuni, Aris, Ahmad Zainul Fanani, and Oky Dwi Nurhayati. "Visual Quality Improvement of Watermarked Image Based on Singular Value Decomposition Using Walsh Hadamard Transform." Cybernetics and Information Technologies 23, no. 1 (March 1, 2023): 110–24. http://dx.doi.org/10.2478/cait-2023-0006.

Full text
Abstract:
Abstract Embedding the watermark is still a challenge in image watermarking. The watermark should not reduce the visual quality of the image being watermarked and hard to distinguish from its original. Embedding a watermark of a small size might be a good solution. However, the watermark might be easy to lose if there is any tampering with the watermarked image. This research proposes to increase the visual quality of the watermarked image using the Walsh Hadamard transform, which is applied to the singular value decomposition-based image watermarking. Technically, the watermark image is converted into a low bit-rate signal before being embedded in the host image. Using various watermark sizes, experimental results show that the proposed method could produce a good imperceptibility with 47.10 dB on average and also gives robustness close to the original watermark with a normalized correlation close to 1 on average. The proposed method can also recognize the original watermark from the tampered watermarked image at different levels of robustness.
APA, Harvard, Vancouver, ISO, and other styles
18

Zhang, Mengmeng, Rongrong Ni, and Yao Zhao. "A Blind Print-Recapture Robust Watermark Scheme by Calculating Self-Convolution." International Journal of Digital Crime and Forensics 11, no. 4 (October 2019): 28–49. http://dx.doi.org/10.4018/ijdcf.2019100103.

Full text
Abstract:
A blind print-recapture robust watermark scheme is proposed. Watermark patterns are embedded into the space domain of a color image and can be detected from a print-recaptured version of the image without knowledge of the original image. The process of embedding invisible watermarks to convert RGB color images to CIE Lab color spaces and embed periodic watermarks in both color channels at the same time. Watermark extraction is achieved by calculating self-convolution and inverting the geometric transformation such as rotation and scale. Normalized correlation coefficients between the extracted and the embedded watermark pattern is calculated to determine whether there is watermark. The decision about the presence/absence of the watermark pattern is then determined by a threshold which is set 0.13, and the detection rate of 241 pictures is about 0.79.
APA, Harvard, Vancouver, ISO, and other styles
19

Ting, Grace C. W., Bok Min Goi, and S. W. Lee. "Cryptanalysis of a Fragile Watermark Based H.264/AVC Video Authentication Scheme." Applied Mechanics and Materials 145 (December 2011): 552–56. http://dx.doi.org/10.4028/www.scientific.net/amm.145.552.

Full text
Abstract:
H.264/AVC is a widespread standard for high definition video (HD) for example DVD and HD videos on the internet. To prevent unauthorized modifications, video authentication can be used. In this paper, we present a cryptanalysis of a H.264/AVC video authentication scheme proposed by Saadi et al. [1] at EUSIPCO 2009. Our result will prevent situations where newer schemes are developed from the scheme thus amplifying the flaw. The designers claimed that the scheme can detect modifications on watermarked video. However, we show that an attacker can modify the watermarked video and compute a valid watermark such that the recipient will retrieve a watermark from the modified watermarked video that will match what the recipient computes during video authentication check. Thus, the recipient will think the tampered video is authentic. The first main problem of the scheme is its use of hash functions for watermark generation. Since hash functions are public functions not depending on any secret, the attacker can modify the watermarked video and feed this through the hash function to compute a new watermark. The second problem is that it is possible for the attacker to perform watermark embedding thus producing a modified watermarked video. On receiving the modified video, the recipient recomputes the watermark and compares this with the watermark extracted from the video. They will match because the embedded watermark and recomputed watermark use the same hash function based watermark generation and the same input i.e. the modified video. Our cryptanalysis strategy applies to any watermarking based video authentication scheme where the watermark and embedding are not functions of secrets. As countermeasure, the functions should be designed so that only legitimate parties can perform them. We present two improved schemes that solve this problem based on private key signing functions and message authentication functions respectively.
APA, Harvard, Vancouver, ISO, and other styles
20

Wang, Chunpeng, Yushuo Liu, Zhiqiu Xia, Qi Li, Jian Li, Xiaoyu Wang, and Bin Ma. "CWAN: Covert Watermarking Attack Network." Electronics 12, no. 2 (January 6, 2023): 303. http://dx.doi.org/10.3390/electronics12020303.

Full text
Abstract:
Digital watermarking technology is widely used in today’s copyright protection, data monitoring, and data tracking. Digital watermarking attack techniques are designed to corrupt the watermark information contained in the watermarked image (WMI) so that the watermark information cannot be extracted effectively or correctly. While traditional digital watermarking attack technology is more mature, it is capable of attacking the watermark information embedded in the WMI. However, it is also more damaging to its own visual quality, which is detrimental to the protection of the original carrier and defeats the purpose of the covert attack on WMI. To advance watermarking attack technology, we propose a new covert watermarking attack network (CWAN) based on a convolutional neural network (CNN) for removing low-frequency watermark information from WMI and minimizing the damage caused by WMI through the use of deep learning. We import the preprocessed WMI into the CWAN, obtain the residual feature images (RFI), and subtract the RFI from the WMI to attack image watermarks. At this point, the WMI’s watermark information is effectively removed, allowing for an attack on the watermark information while retaining the highest degree of image detail and other features. The experimental results indicate that the attack method is capable of effectively removing the watermark information while retaining the original image’s texture and details and that its ability to attack the watermark information is superior to that of most traditional watermarking attack methods. Compared with the neural network watermarking attack methods, it has better performance, and the attack performance metrics are improved by tens to hundreds of percent in varying degrees, indicating that it is a new covert watermarking attack method.
APA, Harvard, Vancouver, ISO, and other styles
21

Arrazaki, Mohammed, Abdelouahed Sabri, Mohamed Zohry, and Tarek Zougari. "Adaptive image watermarking using bidimensional empirical mode decomposition." Bulletin of Electrical Engineering and Informatics 12, no. 5 (October 1, 2023): 2955–63. http://dx.doi.org/10.11591/eei.v12i5.4688.

Full text
Abstract:
Digital watermarking is considered one of the technological means used to guarantee the security and authenticity of data transmitted over communication systems. A new method of image watermarking using the bidimensional empirical mode decomposition (BEMD) will be presented in this article, where the new idea is to use the BEMD of both the cover image and the watermark image. The embedding process consists of adding to each intrinsic modal function (IMF) of the cover image the corresponding IMF of the watermark image. The watermarked image contains three different watermarks and appropriate frequencies, which makes it more robust. We use this method for two reasons: first, to conserve the constituent characteristics of each IMF and second, to ensure the invisibility of the watermark. The results obtained showed a good response against different kinds of attacks. This technique has been compared with other methods of image watermarking based on decomposition BEMD, which showed good results.
APA, Harvard, Vancouver, ISO, and other styles
22

Bander Albarakati, Abdullah Basuhail, Gibrael Abo Samra, Bander Albarakati, Abdullah Basuhail, Gibrael Abo Samra. "A Fuzzy Controlled Image Watermarking Based on a Dual Transform Technique." journal of king abdulaziz university computing and information technology sciences 5, no. 1 (May 27, 2016): 83–92. http://dx.doi.org/10.4197/comp.5-1.6.

Full text
Abstract:
This paper presents a new watermarking technique using hybrid image transforms that aims to be very robust against attacks. It also aims to reduce the amount of distortion created from embedding the watermark as much as possible, and have good capacity. The proposed system uses a hybrid watermarking technique that is based on Non-Subsampled Contourlet Transform and Discrete Wavelet Transform. In addition, the proposed system makes use of the fuzzy logic to automatically choose the strength of the embedded watermark. Furthermore, the system uses Spread Spectrum Code Division Multiple Access to embed and recover the watermark after transforming the image. To enhance recoverability of the watermarks, the system uses a high level of redundancy in the embedding process, which allows a powerful Error Correcting Code to be used in the recovery process. The fuzzy logic is used to help the system in producing watermarked images that reserve their quality and not be heavily altered after embedding the watermark. Experiments were performed to measure the quality of the proposed system using JPEG compression attacks. The results showed that the proposed system is robust and has good capacity and imperceptibly although it suffers from being computationally complex.
APA, Harvard, Vancouver, ISO, and other styles
23

Dr Shiv Kumar, Lakshman Ji,. "ROBUST DIGITAL WATERMARKING TECHNIQUES FOR PROTECTING COPYRIGHT." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 18, 2021): 1374–78. http://dx.doi.org/10.17762/itii.v9i1.279.

Full text
Abstract:
Digital watermarking is the effective method of copyright defence. Typically robot-proof watermarks used to secure copyright, and are immune to some deletion or adjustment of protected documents. Fragile watermarks are typically used for content identification and are vulnerable to small alterations. In this paper, we suggest a hybrid watermarking approach that combines a solid and fragile watermark with copyright and material authentication. This mechanism is often resistant to manipulation and to clone attacks at the same time. The relationship between a delicate watermark and a stable watermark is characterised by our involvement. DCT coefficients are used to integrate the values of the watermark.
APA, Harvard, Vancouver, ISO, and other styles
24

S, Rohith, and B. K Sujatha. "A Novel Compressed Encrypted and Encoded Watermark Embedding Scheme for Digital Images." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 1222. http://dx.doi.org/10.14419/ijet.v7i3.12.17842.

Full text
Abstract:
In this research work a novel idea of compressed, encrypted and encoded watermark embedding scheme for digital images is proposed. Initially watermark is compressed using Huffman encoder. Compressed watermark is encrypted using combined binary key sequence {Ki} derived from sequence of logistic map and Lozi map. The compressed and encrypted binary watermark is encoded using (n,1) repetition code. This compressed, encrypted and encoded binary watermark is embedded in alternate locations of cover image pixels using of Least Significant Bit (LSB) and Second Least Significant Bit (SLSB). To study the watermarked image quality, parameters such as Signal to Noise Ratio (SNR) and Mean Square Error (MSE) are used. Also performance of the proposed system is compared with uncompressed, encrypted, encoded watermark embedding scheme. There is a significant improvement in MSE, SNR of watermarked image, when compressed watermark embedding scheme is compared to uncompressed watermark embedding scheme.
APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Hai Peng, Xuan Jing Shen, and Ying Da Lv. "A Robust Digital Watermarking Algorithm of Identification for Image Authenticity." Applied Mechanics and Materials 121-126 (October 2011): 1873–78. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.1873.

Full text
Abstract:
To accurately determine whether an image has been tampered, a robust digital watermarking algorithm based on the frequency domain was proposed. Watermarks will be embedded in the middle frequency domain of the coefficient matrix, and combining with the JPEG luminance quantization table, better balance will be achieved between the watermark transparency and the robustness of the algorithm. Moreover, before being embedded in the host image, the watermark information is encoded using the chaotic sequence, to improve the security of the algorithm. Experiment results showed that, the watermarked image generated by the proposed algorithm has higher quality. When suffering JPEG compression, cropping and other tampering attacks, the image authenticity can be determined by the similarity between the extracted watermarking and the original watermarking.
APA, Harvard, Vancouver, ISO, and other styles
26

Belim, S. V., and S. N. Munko. "ALGORITHM FOR DYNAMIC FORMATION OF A DIGITAL WATERMARK IN THE PROGRAM MEMORY." Applied Mathematics and Fundamental Informatics 7, no. 4 (2020): 012–17. http://dx.doi.org/10.25206/2311-4908-2020-7-4-12-17.

Full text
Abstract:
An algorithm for embedding digital watermarks into the memory of the executable program is proposed. Digital watermarks are used for copy protection and copyright confirmation of digital objects. The proposed approach makes it possible to form a digital watermark in the operative memory of an executable program for a limited period of time. The address of the embedded information in RAM is random, which greatly complicates its detection and identification. Extraction of digital watermark is performed by passphrase. The embedding, extraction and removal of a digital watermark is implemented using a dynamic library, which is an integral part of the user authentication process, which prevents third-party removal of the digital watermark.
APA, Harvard, Vancouver, ISO, and other styles
27

Embaby, A. Al, Mohamed A. Wahby Shalaby, and Khaled Mostafa Elsayed. "FCM-Based Approach for Locating Visible Video Watermarks." Symmetry 12, no. 3 (February 27, 2020): 339. http://dx.doi.org/10.3390/sym12030339.

Full text
Abstract:
The increased usage demand for digital multimedia has induced significant challenges regarding copyright protection, which is the copy control and proof of ownership. Digital watermarking serves as a solution to these kinds of problems. Among different types of digital watermarking, visible watermarking protects the copyrights effectively, since the approach not only prevents pirates but also visually proves the copyright of the broadcasted video. A visible watermark could be in any location on the frame (corner, center, diagonal, etc.). In addition, it could either completely or partially disappear for some frames. The same video also might have multiple watermarks. In order to strengthen the techniques of adding visible watermarks, there is a need to discover the weakness of the used watermarks. Since the major step of attacking a visible watermark is to locate it accurately, in this paper, a Fuzzy C-Means (FCM)-based approach is proposed to locate visible watermarks in video. Broadcasting channels are used to utilize video logos, which can be considered as a form of visible watermark that represents a trademark or symbol to declare the intellectual property ownership. In general, a high-standard video watermark has such properties as a clear background with distinctive shape without additional texture obscuring the watermark area. In addition, the probability of the logo appearing in the four corners of the video frames is higher than in the center. Based on these common properties of the video watermark, the proposed scheme locates the visible watermark using the Fuzzy C-Means technique without any prior information. The proposed technique has two stages: the first stage is positioning, and the second is masking (extracting the watermark mask). Due to real-world limitations such as noise, shadowing, and variations in cameras, the positioning stage is developed by employing gradient and Fuzzy C-Means classifier techniques. By using the dilation and erosion operators, the masking stage is developed to extract the watermark mask. Using a set of trademark videos, the proposed algorithm is tested and evaluated. A comparative study shows that the proposed FCM-based technique is able to achieve higher accuracy at a reasonable computational cost in comparison to the most related and recent published work. The proposed technique could locate different watermarks with high symmetry in their pattern, even if they appeared mutually in the same location. Still, it will be a challenge if the symmetry is low between used watermarks in the same location.
APA, Harvard, Vancouver, ISO, and other styles
28

Thomas, Reji, Vibisha V, Tabassum A, and Thanuja S. "Digital Watermarking." International Research Journal of Computer Science 10, no. 05 (June 23, 2023): 124–29. http://dx.doi.org/10.26562/irjcs.2023.v1005.04.

Full text
Abstract:
The paper introduces the digital watermarking technology which is a data hiding technique that embeds a message into a multimedia work such as an image or text or other digital object. The proposed technique has several important applications; the majorly important is the digital copyrights protection. The digital watermarking system as any other data hiding technique has its own requirements that make the digital watermark strong as possible. Technologies of digital watermarking are mainly classified depending on their domain to spatial domain watermarks, Watermarks belonging to frequency (transform) domain and wavelet domain watermarks. The digital watermarks suffer from different types of attacks that include either state-of-the-art watermarking attacks or watermark estimation attacks. The recovery from these attacks requires strong detection techniques; the digital watermark agent provides a professional solution for these attacks.
APA, Harvard, Vancouver, ISO, and other styles
29

Lin, Chia-Chen, Thai-Son Nguyen, and Chin-Chen Chang. "LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases." Symmetry 13, no. 11 (November 17, 2021): 2191. http://dx.doi.org/10.3390/sym13112191.

Full text
Abstract:
In 2002, Agrawal and Kiernan defined six basic requirements, including preventing illegal watermark embedding and authentication, reversibility, robustness, and others, which must be satisfied when a reversible watermark is designed for relational databases. To meet these requirements, in this paper, a lossless watermarking scheme for a categorical relational database called LRW-CRDB (lossless robust watermarking for categorical relational databases) is proposed. In our LRW-CRDB scheme, the database owner needs to generate two secret embedding keys, K1 and K2, in advance. Then, two reference sets are generated based on two different secret embedding keys and a symmetry-based data hiding strategy, and then these are used for the watermark embedding phases. Experimental results confirmed that our LRW-CRDB scheme successfully detects 100% of hidden watermarks, even when more than 95% of the watermarked relational database has been deleted. In other words, the robustness of our proposed LRW-CRDB scheme outperforms other existing schemes under a variety of possible attacks, such as alteration, sorting, deletion, and mix-match attacks.
APA, Harvard, Vancouver, ISO, and other styles
30

Liu, Li, and Ji Chun Tan. "Multiple Watermarks Embedding Simultaneously to Identify Image Status Based on Fractional Fourier Transform." Advanced Materials Research 341-342 (September 2011): 758–62. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.758.

Full text
Abstract:
A new method of multiple watermarks embedding simultaneously to identify image status based on once and twice discrete fractional Fourier transform (DFRT) is presented. Random series watermark, chirp watermark and annotation watermark are embedded simultaneously in fractional Fourier transform domain to identify digital tamper detection, scanning detection, duplicate detection. According to the extracting situation of three kinds of watermarks from an image and the twice DFRT amplitude spectrum, we can know whether the image is tampered, scanned or duplicated. It provides a convenient way to identify the status of the image and will be an all-sided and comprehensive anti-counterfeiting technology.
APA, Harvard, Vancouver, ISO, and other styles
31

Mukhammad Solikhin, Yohanssen Pratama, Purnama Pasaribu, Josua Rumahorbo, and Bona Simanullang. "Analisis Watermarking Menggunakan Metode Discrete Cosine Transform (DCT) dan Discrete Fourier Transform (DFT)." Jurnal Sistem Cerdas 5, no. 3 (December 11, 2022): 155–70. http://dx.doi.org/10.37396/jsc.v5i3.192.

Full text
Abstract:
Digital image watermarking is the insertion of watermarks into digital image media. Several types of watermarking methods used are Discrete Cosine Transform (DCT) and Discrete Fourier Transform (DFT). Both of these watermarking methods work in the frequency domain (transform). Digital image watermarking using the frequency domain is carried out on the frequency coefficient. This study used 30 digital image data as material for digital image watermaking analysis with 10 data each in binary, grayscale and color digital images in jpg, png and bmp formats. Digital images in the binary and grayscale domains are conversions from digital images in the true color (RGB) domain. Digital image watermarking includes three main processes, namely embedding the watermarked image on the original digital image, extracting the watermarked image and measuring the correlation between the two digital images. Correlation aims to measure two variables that have the same relationship. The technology used in this research work is MATLAB (Matrix Laboratory) as a high-performance programming language for computing in solving problems with solutions expressed in mathematical notation. The results of the discussion prove that the watermarking process in terms of color, for DCT, RGB is better and binary is better for DFT. And the watermaking process, in terms of the type of watermark inserted, for both DCT and DFT, a good watermark is an invisible watermark.
APA, Harvard, Vancouver, ISO, and other styles
32

Hidayati, Indri, Mohammad Andri Budiman, and Muhammad Zarlis. "Analysis of Embedding Locations in the Subband Frequency DCT on Scanned Images." Data Science: Journal of Computing and Applied Informatics 7, no. 1 (January 31, 2023): 1–14. http://dx.doi.org/10.32734/jocai.v7.i1-10359.

Full text
Abstract:
Uploading an identity card as an image for the account verification process or transactions online can be a threat to application users. Identity card theft can be carried out by irresponsible persons if the application can be hacked. Therefore, protection of the image is required for authentication. In this study, the proposed technique is watermarking. A watermark in the form of a binary image will be embedded into the image as ownership using a Discrete Cosine Transform. The Discrete Cosine Transform works in the frequency domain. The location of the embedding of different watermarks was analysed in each 8×8 DCT block. The results of the analysis to assess the imperceptibility of original images and watermarked images using PSNR (Peak Signal to Noise Ratio) and SSIM (Structural Similarity Index Measure), while assessing the watermark robustness embedded using NCC (Normalized Cross Correlation). The results show PSNR (Peak Signal to Noise Ratio) ≥ 54 dB with a watermark strength of 0,1 and an average SSIM (Structural Similarity Index Measure) ≥ 0,9 on 4 scanned images in BMP format with a resolution of 100 DPI. A good watermark embedding is done on the green component at middle frequencies to maintain a balance between imperceptibility and robustness. In contrast, the red component at low frequency is vulnerable to attacks in the form of brightness +20 and contrast +50 with an average NCC (Normalized Cross Correlation) ≤ 0,85.
APA, Harvard, Vancouver, ISO, and other styles
33

Aditya, B. P., U. G. K. Avaneesh, K. Adithya, Akshay Murthy, R. Sandeep, and B. Kavyashree. "Invisible Semi-Fragile Watermarking and Steganography of Digital Videos for Content Authentication and Data Hiding." International Journal of Image and Graphics 19, no. 03 (July 2019): 1950015. http://dx.doi.org/10.1142/s0219467819500153.

Full text
Abstract:
In the current digital age, the piracy of digital media content has become rampant. Illegal distribution of movies and video clips on a global scale causes a significant loss to the media industry. To prevent such theft and distribution of content, we use a watermarking technique for videos where copyright information is hidden inside the original video in the form of a watermark video. Using a video as the watermark facilitates the user in hiding a large amount of information. The watermarking scheme used in this paper is semi-fragile, such that tampering of videos can be detected with relative ease. To improve the robustness of the watermark, we embed the watermark in frequency domain, where we use DWT+DCT+SVD to embed the watermark. The original video and watermark video are transformed by using the DWT and DCT sequentially, then the singular values of the watermark with some embedding strength are added to the singular values of the original video thus obtaining a watermarked video. Some detection tools which are available today cannot detect the watermark video inside the original video. This method equalizes the frames of the watermark and original video to reduce time consumed as well as complexity. The effects of various attacks on the watermarked video have been analyzed using the calculated PSNR values.
APA, Harvard, Vancouver, ISO, and other styles
34

Wang, Jun Jie, Qian Mo, Dong Xia Mei, and Su Li. "A Blind Watermarking Algorithm for Digital Image." Applied Mechanics and Materials 333-335 (July 2013): 1110–13. http://dx.doi.org/10.4028/www.scientific.net/amm.333-335.1110.

Full text
Abstract:
Based on the method of SVD, a novel watermark algorithm is designed in this paper. Firstly, the SVD is performed on each segment of the original host image; Secondly, the watermark bits are formed by chaotic encrypting;Thirdly, the secret bits are embedded into the S component of the matrix by quantization; Lastly, the inverse SVD transformation is performed on each block and the watermarked image is constructed. The original host image is not required in the secret watermark recovery. Experimental results show that the watermarked image has transparent feature, and the quality of the recovered watermark is satisfying. The algorithm is strongly robust to many attacks, such as JPEG compression attack, Noise Interference and so on..
APA, Harvard, Vancouver, ISO, and other styles
35

Liu, Keyang, Weiming Zhang, and Xiaojuan Dong. "A Cloud-User Protocol Based on Ciphertext Watermarking Technology." Security and Communication Networks 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/4376282.

Full text
Abstract:
With the growth of cloud computing technology, more and more Cloud Service Providers (CSPs) begin to provide cloud computing service to users and ask for users’ permission of using their data to improve the quality of service (QoS). Since these data are stored in the form of plain text, they bring about users’ worry for the risk of privacy leakage. However, the existing watermark embedding and encryption technology is not suitable for protecting the Right to Be Forgotten. Hence, we propose a new Cloud-User protocol as a solution for plain text outsourcing problem. We only allow users and CSPs to embed the ciphertext watermark, which is generated and embedded by Trusted Third Party (TTP), into the ciphertext data for transferring. Then, the receiver decrypts it and obtains the watermarked data in plain text. In the arbitration stage, feature extraction and the identity of user will be used to identify the data. The fixed Hamming distance code can help raise the system’s capability for watermarks as much as possible. Extracted watermark can locate the unauthorized distributor and protect the right of honest CSP. The results of experiments demonstrate the security and validity of our protocol.
APA, Harvard, Vancouver, ISO, and other styles
36

Fu, Lijun, Bei Shi, Ling Sun, Jiawen Zeng, Deyun Chen, Hongwei Zhao, and Chunwei Tian. "An Improved U-Net for Watermark Removal." Electronics 11, no. 22 (November 16, 2022): 3760. http://dx.doi.org/10.3390/electronics11223760.

Full text
Abstract:
Convolutional neural networks (CNNs) with different layers have performed with excellent results in watermark removal. However, how to extract robust and effective features via CNNs of black box in watermark removal is very important. In this paper, we propose an improved watermark removal U-net (IWRU-net). Taking the robustness of obtained information into account, a serial architecture is designed to facilitate useful information for guaranteeing performance in watermark removal. Taking the problem of long-term dependency into account, U-nets based simple components are integrated into the serial architecture to extract more salient hierarchical information for addressing watermark removal problems. To increase the adaptability of IWRU-net to the real world, we use randomly distributed blind watermarks to implement a blind watermark removal model. The experiment results illustrate that the proposed method is superior to other popular watermark removal methods in terms of quantitative and qualitative evaluations.
APA, Harvard, Vancouver, ISO, and other styles
37

Huang, Hao, Yongtao Wang, Zhaoyu Chen, Yuze Zhang, Yuheng Li, Zhi Tang, Wei Chu, Jingdong Chen, Weisi Lin, and Kai-Kuang Ma. "CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 1 (June 28, 2022): 989–97. http://dx.doi.org/10.1609/aaai.v36i1.19982.

Full text
Abstract:
Malicious applications of deepfakes (i.e., technologies generating target facial attributes or entire faces from facial images) have posed a huge threat to individuals' reputation and security. To mitigate these threats, recent studies have proposed adversarial watermarks to combat deepfake models, leading them to generate distorted outputs. Despite achieving impressive results, these adversarial watermarks have low image-level and model-level transferability, meaning that they can protect only one facial image from one specific deepfake model. To address these issues, we propose a novel solution that can generate a Cross-Model Universal Adversarial Watermark (CMUA-Watermark), protecting a large number of facial images from multiple deepfake models. Specifically, we begin by proposing a cross-model universal attack pipeline that attacks multiple deepfake models iteratively. Then, we design a two-level perturbation fusion strategy to alleviate the conflict between the adversarial watermarks generated by different facial images and models. Moreover, we address the key problem in cross-model optimization with a heuristic approach to automatically find the suitable attack step sizes for different models, further weakening the model-level conflict. Finally, we introduce a more reasonable and comprehensive evaluation method to fully test the proposed method and compare it with existing ones. Extensive experimental results demonstrate that the proposed CMUA-Watermark can effectively distort the fake facial images generated by multiple deepfake models while achieving a better performance than existing methods. Our code is available at https://github.com/VDIGPKU/CMUA-Watermark.
APA, Harvard, Vancouver, ISO, and other styles
38

Li, Jian, Jinwei Wang, Shuang Yu, and Xiangyang Luo. "A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation." International Journal of Digital Crime and Forensics 11, no. 1 (January 2019): 100–113. http://dx.doi.org/10.4018/ijdcf.2019010108.

Full text
Abstract:
This article proposes a novel robust reversible watermarking algorithm. The proposed watermarking scheme is reversible because the original image can be recovered after extracting watermarks from the watermarked image, as long as it is not processed by an attacker. The scheme is robust because watermarks can still be extracted from watermarked images, even if it is undergone some malicious or normal operations like rotation and JPEG compression. It first selects two circles, which are centred at the centroid and the centre of image. Then, statistic quantities of these two circles are employed for robust watermark embedding by altering the pixels' value. The side information generated by above embedding process will be embedded as fragile watermarks at another stage to ensure the recovery of original image. Experimental results verify the high performance of the proposed algorithm in resisting various attacks, including JPEG compression and geometric transformation.
APA, Harvard, Vancouver, ISO, and other styles
39

He, Shun, Yu Hui Li, Bo Li, and Yu Lian. "A Method about Embedding Watermark in PDF Document." Applied Mechanics and Materials 530-531 (February 2014): 841–45. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.841.

Full text
Abstract:
A method about embedding watermark in PDF document is proposed in this paper. First, PDF document is converted into a image format. Watermark image is converted into a scrambling image by Arnold transformation.And then the watermark is embedded into the PDF document image by discrete wavelet transform for PDF document image and matrix singular value decomposition for watermark image. Not only can watermark be extracted without the original image, but also increase the safety by this means. Experiment express, on the condition that the same size of the watermark image,the method made more copyright information as watermark be embedded into PDF document and the amount of the watermarked PDF document data be affected less with the increase of copyright information.
APA, Harvard, Vancouver, ISO, and other styles
40

Cao, Xiu Quan, De Ping Yu, Chao Li, and Jin Yao. "A Novel Design of Automatic Welding System for White Watermarks." Applied Mechanics and Materials 365-366 (August 2013): 52–56. http://dx.doi.org/10.4028/www.scientific.net/amm.365-366.52.

Full text
Abstract:
Watermarks, which are often used as security features of banknotes to prevent counterfeiting, are made onto the banknote paper using the dandy roll that is a roller of copper net with white watermarks accurately welded on it. The positioning accuracy of the white watermarks on the copper net is critical. However, the current technologies are inefficient, inaccurate and/or expensive. Therefore, in this paper a novel design of automatic system for white watermark is proposed. It is realized by thorough analysis of the welding procedure of the white watermark, design of a novel mechanical structure for the automatic feeding and accurate positioning of the white watermark to its welding position on the copper net and integration with the available spot welder. Compared with the current technologies, the proposed design could greatly improve the efficiency and accuracy for welding the white watermarks, and its total cost is low. Therefore, the proposed design could be adopted in the banknote printing industry to realize the automatic welding of the white watermarks.
APA, Harvard, Vancouver, ISO, and other styles
41

Liu, Yanwei, Jinxia Liu, Antonios Argyriou, Siwei Ma, Liming Wang, and Zhen Xu. "360-Degree VR Video Watermarking Based on Spherical Wavelet Transform." ACM Transactions on Multimedia Computing, Communications, and Applications 17, no. 1 (April 16, 2021): 1–23. http://dx.doi.org/10.1145/3425605.

Full text
Abstract:
Similar to conventional video, the increasingly popular 360 virtual reality (VR) video requires copyright protection mechanisms. The classic approach for copyright protection is the introduction of a digital watermark into the video sequence. Due to the nature of spherical panorama, traditional watermarking schemes that are dedicated to planar media cannot work efficiently for 360 VR video. In this article, we propose a spherical wavelet watermarking scheme to accommodate 360 VR video. With our scheme, the watermark is first embedded into the spherical wavelet transform domain of the 360 VR video. The spherical geometry of the 360 VR video is used as the host space for the watermark so that the proposed watermarking scheme is compatible with the multiple projection formats of 360 VR video. Second, the just noticeable difference model, suitable for head-mounted displays (HMDs), is used to control the imperceptibility of the watermark on the viewport. Third, besides detecting the watermark from the spherical projection, the proposed watermarking scheme also supports detecting watermarks robustly from the viewport projection. The watermark in the spherical domain can protect not only the 360 VR video but also its corresponding viewports. The experimental results show that the embedded watermarks are reliably extracted both from the spherical and the viewport projections of the 360 VR video, and the robustness of the proposed scheme to various copyright attacks is significantly better than that of the competing planar-domain approaches when detecting the watermark from viewport projection.
APA, Harvard, Vancouver, ISO, and other styles
42

Reyes-Reyes, Rogelio, Clara Cruz-Ramos, Volodymyr Ponomaryov, Beatriz P. Garcia-Salgado, and Javier Molina-Garcia. "Color Image Self-Recovery and Tampering Detection Scheme Based on Fragile Watermarking with High Recovery Capability." Applied Sciences 11, no. 7 (April 2, 2021): 3187. http://dx.doi.org/10.3390/app11073187.

Full text
Abstract:
In this paper, a fragile watermarking scheme for color image authentication and self-recovery with high tampering rates is proposed. The original image is sub-sampled and divided into non-overlapping blocks, where a watermark used for recovery purposes is generated for each one of them. Additionally, for each recovery watermark, the bitwise exclusive OR (XOR) operation is applied to obtain a single bit for the block authentication procedure. The embedding and extraction process can be implemented in three variants (1-LSB, 2-LSB or 3-LSB) to solve the tampering coincidence problem (TCP). Three, six or nine copies of the generated watermarks can be embedded according to the variant process. Additionally, the embedding stage is implemented in a bit adjustment phase, increasing the watermarked image quality. A particular procedure is applied during a post-processing step to detect the regions affected by the TCP in each recovery watermark, where a single faithful image used for recovery is generated. In addition, we involve an inpainting algorithm to fill the blocks that have been tampered with, significantly increasing the recovery image quality. Simulation results show that the proposed framework demonstrates higher quality for the watermarked images and an efficient ability to reconstruct tampered image regions with extremely high rates (up to 90%). The novel self-recovery scheme has confirmed superior performance in reconstructing altered image regions in terms of objective criteria values and subjective visual perception via the human visual system against other state-of-the-art approaches.
APA, Harvard, Vancouver, ISO, and other styles
43

Saturwar, Jitendra, and D. N. Chaudhari. "Performance Evaluation of watermarking Schemes to Decide Meaningful Number of Shares." IRA-International Journal of Technology & Engineering (ISSN 2455-4480) 7, no. 2 (S) (July 10, 2017): 93. http://dx.doi.org/10.21013/jte.icsesd201709.

Full text
Abstract:
<p>With the growth in digital world, it is becoming more important to find a method to<br />protect the security of digital media. An image watermarking model based on visual secret<br />sharing (VSS) is proposed for protection of ownership. In the embedding phase, the<br />watermark is first divided by VSS into two parts, a hiding watermark and a secret watermark.<br />Then only the hiding watermark is embedded into the original image and the secret<br />watermark is reserved for watermark extracting by the owner. In the extracting phase, the<br />hiding watermark is extracted from the watermarked image first and then directly<br />superimposed on the secret watermark to recover the watermark information. Digital<br />watermarking has been proposed as a possible brick of such protection systems. However,<br />application of watermarking for multimedia content protection in realistic scenarios poses<br />several security issues.<br />A digital watermarking technique is used to generate meaningful shares. The secret image<br />shares are watermarked with different cover images and are transmitted. At the receiving side,<br />the cover images are extracted from the shares and stacked one by one which reveals the secret<br />image progressively. Digital watermarking using visual cryptography provides improved security<br />for encrypting secret images.</p>
APA, Harvard, Vancouver, ISO, and other styles
44

Hasan, Harith Raad. "Copyright Protection for Digital Certificate using Blind Watermarking Technique." Kurdistan Journal of Applied Research 3, no. 1 (June 30, 2018): 75–79. http://dx.doi.org/10.24017/science.2018.1.15.

Full text
Abstract:
This paper proposes a copyright protection system for digital certificate image using blind watermarking technique by applying discrete wavelet transform algorithm (DWT). The proposed technique utilizes three interrelated watermarks namely, Red watermark (RW), Green-watermark (GW) and Blue-watermark (BW). Firstly, RGB cover and RGB watermark image are divided for three color space R,G,B. Then the R component is chosen for embedding (RW), the B component is selected for embedding the (BW) and the G component is selected for embedding the (GW), R,G and B of the cover image are converted into the transform domain using DWT, and is subsequently decomposed into three levels viz. LH1, LL2 and LL3 sub-bands. RW, GW and BW are then embedded onto LL3. Experimental results show that the performance of the proposed technique is very encouraging with average PSNR of 44 db, and NCC value of more than 0.99 for extracted watermarks after performing several types of attacks.
APA, Harvard, Vancouver, ISO, and other styles
45

Li, Chen, Yi Yang, Kai Liu, and Lihua Tian. "A Semi-Fragile Video Watermarking Algorithm Based on H.264/AVC." Wireless Communications and Mobile Computing 2020 (June 20, 2020): 1–11. http://dx.doi.org/10.1155/2020/8848553.

Full text
Abstract:
With the increasing application of advanced video coding (H.264/AVC) in the multimedia field, a great significance to research in video watermarking based on this video compression standard has been established. We propose a semifragile video watermarking algorithm, which can simultaneously implement frame attack and video tamper detection, herein. In this paper, the frame number is selected as the watermark information, and the relationship of the discrete cosine transform (DCT) nonzero coefficients is used as the authentication code. The 4×4 subblocks, whose DCT nonzero coefficients are sufficiently complex, are selected to embed the watermark. The parities of these nonzero coefficients in the medium frequency are modulated to embed watermarks. The experimental results show that the visual quality of the embedded watermarked video is virtually unaffected, and the algorithm exhibits good robustness. Furthermore, the algorithm can correctly implement frame attack and video tamper detection.
APA, Harvard, Vancouver, ISO, and other styles
46

Wu, Yongdong, and Hweehua Pang. "A Lightweight Buyer-Seller Watermarking Protocol." Advances in Multimedia 2008 (2008): 1–7. http://dx.doi.org/10.1155/2008/905065.

Full text
Abstract:
The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001) and C.-L. Lei et al. (2004)) have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours isntimes faster in terms of computation, wherenis the number of watermark elements, while incurring onlyO(1/lN)times communication overhead given the finite field parameterlN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.
APA, Harvard, Vancouver, ISO, and other styles
47

Hassan, Nidaa Flaih, Akbas Ezaldeen Ali, Teaba Wala Aldeen, and Ayad Al-Adhami. "Video mosaic watermarking using plasma key." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (May 1, 2021): 619. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp619-628.

Full text
Abstract:
Video watermarking is one of the most widespread techniques amongst the many watermarking techniques presently are used; this is because the extreme existences of copyright abuse and misappropriation occur for video content. In this paper, a new watermarking algorithm is proposed to embed logo in digital video for copyright protection. To make the watermarks more robust to attack, host frame and host embedding indices must be changeable. A new algorithm is proposed to determined host frames by plasma function, Host location indices in frames are also determined by another plasma function. Logo is divided using the mosaic principle, the size of mosaic blocks is determined initially according to the degree of protection, whenever the size of mosaic blocks is small, it leads to safe embedding, and vice versa. Digital watermarks are embedded easily without any degradation for video quality, In the other side, the watermarked is retrieved by applying the reverse of proposed embedding algorithm and extracted watermark is still recognizable. The experimental results confirm that watermark is robust against three types of attacks which are addition of Gaussian noise, JPEG compression, and rotation process.
APA, Harvard, Vancouver, ISO, and other styles
48

Xiao, Jun, Deng Yu Li, Xiao Xu Leng, and Jiao Rao Su. "False Alarm and Missing Alarm Models of Multiple Bits Watermarking." Applied Mechanics and Materials 543-547 (March 2014): 2155–58. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2155.

Full text
Abstract:
False alarm and missing alarm are two of the most important performances for multiple bits watermarking systems. In this paper, we study false alarm and missing alarm probability models when multiple watermarks or multiple bits watermarks embedded. We derive the false alarm and missing alarm probability models for dither modulation from the detection principle of the detectors. The theoretical results are compared with the experimental results obtained in the case of random work and watermark, and the comparison validates the accuracy of the models, and it also shows that random work and watermark have little influence on the false alarm and missing alarm probabilities, and this is the same with the situation when only one bit watermark is embedded by DM.
APA, Harvard, Vancouver, ISO, and other styles
49

Favorskaya, M. N., and E. I. Savchina. "DIGITAL WATERMARKING OF 3D MEDICAL VISUAL OBJECTS." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-2/W12 (May 9, 2019): 61–67. http://dx.doi.org/10.5194/isprs-archives-xlii-2-w12-61-2019.

Full text
Abstract:
<p><strong>Abstract.</strong> At present, medical equipment provides often 3D models of scanning organs instead of ordinary 2D images. This concept is supported by Digital Imaging and COmmunications in Medicine (DICOM) standard available for telemedicine. This means that the confidential information under transmission ought to be protected by special techniques, particularly digital watermarking scheme instead of textual informative files represented, for example, on CD disks. We propose a multilevel protection, for which a fragile watermark is the first level of protection. The Region Of Interest (ROI) watermark and textual watermarks with information about patient and study (the last ones can be combines as a single textual watermark) form the second level of protection. Encryption of the ROI and textual watermarks using Arnold’s transform is the third level of protection. In the case of 3D models, we find the ROI in each of 2D sliced images, apply the digital wavelet transform or digital shearlet transform (depending on the volume of watermarks) for the ROI and textual watermarks embedding, and embed a fragile watermark using digital Hadamard transform. The main task is to find the relevant regions for embedding. To this and, we develop the original algorithm for selecting relevant regions. The obtained results confirm the robustness of our approach for rotation, scaling, translation, and JPEG attacks.</p>
APA, Harvard, Vancouver, ISO, and other styles
50

Jiang, Jian-Wei, Tian Zhang, Wei Li, and Shu-Mei Wang. "A Quantum Image Watermarking Scheme Based on Quantum Hilbert Scrambling and Steganography about the Moiré Fringe." Quantum Engineering 2023 (March 7, 2023): 1–12. http://dx.doi.org/10.1155/2023/3746357.

Full text
Abstract:
In order to boost the security and confidentiality of information in quantum images, on the foundation of the NEQR model, a novel quantum watermarking scheme combining quantum Hilbert scrambling with steganography based on the Moiré fringe is designed in this paper. First of all, for carrier image, and watermark image, the color information and position information are denoted, respectively, by the NEQR model. Next, the watermark image is converted to a disordered image by quantum Hilbert scrambling, and the message of the original watermark image cannot be gained from the disordered image. At last, the watermark image after scrambling is embedded into the carrier image through the steganography of the Moiré fringe, obtaining the watermarked image. Due to the unitary image of the quantum gate, quantum Hilbert inverse scrambling is the opposite process of quantum Hilbert scrambling. In addition, the watermark image can be completely extracted from the watermarked image. What’s more, the experimental simulation and performance analysis of the scheme are done. The experimental simulation proves the feasibility of this algorithm. Visually, there is no difference between the carrier image and the watermarked image. The PSNR between the watermarked image and the carrier image is measured, which quantitatively shows the high similarity. In addition, the time complexity of the quantum circuit is lower than some other quantum image watermarking schemes, which proves the simplicity of this scheme.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography