The first 50 years of electronic watermarking

Free download. Book file PDF easily for everyone and every device. You can download and read online The first 50 years of electronic watermarking file PDF Book only if you are registered here. And also you can download or read online all Book PDF file that related with The first 50 years of electronic watermarking book. Happy reading The first 50 years of electronic watermarking Bookeveryone. Download file Free Book PDF The first 50 years of electronic watermarking at Complete PDF Library. This Book have some digital formats such us :paperbook, ebook, kindle, epub, fb2 and another formats. Here is The CompletePDF Book Library. It's free to register here to get Book file PDF The first 50 years of electronic watermarking Pocket Guide.

References Publications referenced by this paper. Xinmin Zhou. Audio watermark detection using undetermined[J]. Seok Jongwon , Malik Hafiz. Improvement to a semi-fragile watermarking scheme against a proposed counterfeiting attack Hossein Kourkchi , Shahrokh Ghaemmaghami.

Background

Rathore , S. Digital image scrambling technology and its Matlab implementation[J]. Journal of Guilin College of Aerospace Technology,,28 4 Cox , Matthew L. Digital image scrambling technology and its Matlab implementation [ J ]. Research of Digital Image Watermarking[J]. Communications,,21 8 Ruizhen Liu , Tieniu Tan.

William A. It is shown below. The original coordinate returns to initial position after 4 iterations. In general, it is claimed that as the value of image size increases, the period tends to increase, but it is not always true Pages. This shows that PM is robust. The unweighted average UA is also shown in the table. Comparison of different methods: a Gaussian noise, b Blurring, c Sharpening and d Gamma correction attacks. The original binary watermark is encrypted by using the cat map and is shown in Fig. The ownership share is prepared based on the encrypted watermark and the original image and it is shown in Fig.

The identification share is prepared from the watermarked image and is shown in Fig. The superimposed image of the ownership share and the identification share is shown in Fig. It is blurred and not recognizable. The reduction superimposed image before the decryption is shown in Fig. No attack: a Original watermark, b Encrypted watermark, c Ownership share, d Identification share, e Superimposed share, f Superimposed share after reduction and g Extracted watermark.

NC values are It clearly shows the superior performance for the JPEG compression attack. It clearly shows the superior performance for the rotation attack. It clearly shows the superior performance for the median filter attack. The performance of LM is better than the other methods for the cropping attack. It clearly shows the superior performance for the scaling attack.

It clearly shows the better performance of the proposed method for impulse noise attack. The better performance of PM is due to inbuilt restoration scheme against the impulse noise attack. It clearly shows the better performance of the proposed method for Gaussian noise attack. The better performance of PM is due to inbuilt restoration scheme against the Gaussian noise attack. Methods proposed by Lou et al. An unauthorized image can be used to extract or detect the watermark producing the watermark, though the quality is not good.

This means that anyone who can detect watermark can claim ownership. Our method solves this false claim by encrypting the watermark prior to the ownership share generation, and it decrypts at the time of detection. It shows that the NC values of the proposed algorithm for both images lie above Errors in detection for the rotation angles are comparatively low. The minimum error in magnitude is 0. It shows that the proposed method is very effective to handle the rotation attack.

The paper describes a new watermarking algorithm based on the shuffled singular value decomposition and the visual cryptography for copyright protection of digital images in the DWT domain. The robustness of the proposed method was verified on different types of images for different attacks. Comparison with the other related VC-based algorithms reveals that the proposed method gives better performance.

CNA - 数据内容识别 - Google Patents

BPD is the first author of this paper. KMS is the corresponding author of this paper. He is working as an associate professor at NIT Manipur. SR is the third author of this paper. He is working as a professor at Assam University, Silchar. Both authors are involved in writing and revision process of this manuscript. Both authors read and approved the final manuscript.

The First 50 Years of Electronic Watermarking

Pushpa Devi, Email: moc. Manglem Singh, Email: moc. Sudipta Roy, Email: moc. National Center for Biotechnology Information , U. Published online Jul Pushpa Devi , Kh. Manglem Singh , and Sudipta Roy. Pushpa Devi.

Manglem Singh. Author information Article notes Copyright and License information Disclaimer. Corresponding author. Received Jan 7; Accepted Jun Abstract This paper proposes a new watermarking algorithm based on the shuffled singular value decomposition and the visual cryptography for copyright protection of digital images. Keywords: Copyright protection, Singular value decomposition, Orthogonal matrix, Visual cryptography, Robust. Background Copyright ownership of multimedia data is vulnerable to the image processing attacks as it can be copied easily without loss of quality with no limitation on the number of copies, tempered and redistributed illegally without authorization due to the growth of the digital multimedia technology tools and omnipresent of the Internet.

Preliminaries This section gives a brief overview of the cat map for image pixel shuffling, discrete wavelet transform, singular value decomposition and visual cryptography. Discrete wavelet transform Wavelet is a waveform of limited duration that has an average value of zero, and is used a basal function for representing signals Mallat Singular value decomposition The singular value decomposition is an important topic in linear algebra to diagonalize and decompose a matrix into its eigenvectors and eigenvalues Ranade et al.

Visual cryptography Naor and Shamir introduced visual cryptography in their seminal work in which a secret message is encrypted in a perfectly secure way in more than one shares such that the secret can be decrypted directly by the human visual system Naor and Shamir Open in a separate window. Restoration scheme against the rotation, impulse noise and Gaussian noise attacks The image is passed through a test for the rotation attack. Proposed technique In this section, the proposed copyright protection scheme is proposed.

Schematic block diagram of the proposed embedding and extraction scheme. Identification share generation scheme Steps of the identification share generation are described below. Experimental results A set of experiments was performed to verify the robustness of the proposed copyright protection algorithm using several images and a binary watermark. Cropping attack The performance of LM is better than the other methods for the cropping attack.

Conclusions The paper describes a new watermarking algorithm based on the shuffled singular value decomposition and the visual cryptography for copyright protection of digital images in the DWT domain. Competing interests The authors declare that they have no competing interests.

Contributor Information B. References Abusitta AH. A visual cryptography based digital image copyright protection. J Inf Secur. Robust ROI watermarking scheme based on visual cryptography: applications on mammograms. J Inf Process Syst. A colour image copyright protection scheme based on visual cryptography and discrete cosine transform. Imaging Sci J. In: Pan JS et al eds Genetic and evolutionary computing, advances in intelligent systems and computing, vol On the security of a copyright protection scheme based on visual cryptography.

Comput Stand Interfaces.

Eurasip J Appl Signal Process. An efficient and secure medical image protection scheme based on chaotic map. Comput Biol Med. False-positive-free SVD-based image watermarking. J Vis Commun Image Represent. Multimedia watermarking techniques.

A robust image watermarking technique based on quantization noise visibility thresholds

Proc IEEE. Self watermarking based on visual cryptography. World Acad Sci Eng Technol. A new robust blind copyright protection scheme based on visual cryptography and steerable pyramid. Int J Netw Secur. Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt Eng. A digital image copyright protection scheme based on visual cryptography. Tamkang J Sci Eng.

In: Yeo S-S et al eds Lecture notes in electrical engineering, computer science and its applications, vol , pp — Keshavarzian R, Aghagolzadeh A. Int J Electron Commun. An SVD-based watermarking scheme for protecting rightful ownership. A copyright protection scheme for digital images using visual cryptography technique. A theory for multiresolution signal decomposition: the wavelet representation. In: Proceedings of advances cryptology. Last accessed 28 April Petticolas F. Information hiding techniques for steganography and digital watermarking.

Stefen Katzenbeisser: Artech House Inc; A variation on SVD based compression. Image Vis Comput. A zero-watermarking scheme using discrete wavelet transform.

Proc Comput Sci. A publicly verifiable lossless watermarking scheme for copyright protection and ownership assertion. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Process. Dual watermarking scheme for copyright protection.



admin