Digital watermarking algorithms for multimedia data

Author(s):  
Sk Hafizul Islam ◽  
Arup Kumar Pal ◽  
Shiv Prasad ◽  
Soumitra Roy ◽  
Raunak Rungta ◽  
...  
2013 ◽  
Vol 321-324 ◽  
pp. 2609-2612
Author(s):  
Yan Liang ◽  
Gao Yan ◽  
Chun Xia Qi

Digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia data in a networked environment. It makes possible to tightly associated to a digital document a code allowing the identification of the data creator, owner, authorized consumer, and so on. In this paper a new DCT-domain system for digital watermarking algorithm for digital images is presented: the method, which operates in the frequency domain, embeds a pseudo-random sequence of scrambled image in a selected set of DCT coefficients. After embedding, the watermark is adapted to the image by exploiting the masking characteristics of the human visual system, thus ensuring the watermark invisibility. By exploiting the statistical properties of the embedded sequence, the mark can be reliably extracted without resorting to the original uncorrupted image. Experimental results demonstrate that the watermark is robust to several signal processing techniques, including JPEG compression, cut, fuzzy, addition of noise, and sharpen.


Author(s):  
V. Santhi ◽  
D. P. Acharjya

Advances in technologies facilitate the end users to carry out unauthorized manipulation and duplication of multimedia data with less effort. Because of these advancements, the two most commonly encountered problems are (1) copyright protection and (2) unauthorized manipulation of multimedia data. Thus a scheme is required to protect multimedia data from those two above said problems. Digital Watermarking is considered as one of the security mechanisms to protect copyrights of multimedia data. The literature review reveals that the calculation of scaling and embedding parameters are not completely automated. In order to automate the procedure of calculating scaling and embedding parameters the computational intelligence need to be incorporated in the watermarking algorithm. Moreover the quality of the watermarked images could also be preserved by combining computational intelligence concepts. Thus watermarking schemes utilizing computational intelligence concepts could be called as intelligence based watermarking schemes and it is presented in this chapter in detail.


2013 ◽  
pp. 691-712
Author(s):  
Dumitru Dan Burdescu ◽  
Liana Stanescu ◽  
Marian Cristian Mihaescu

The rapid growth of digital multimedia technologies brings tremendous attention to the field of digital authentication. Digital watermarking has become widely recognized as an effective measure for copyright protection of multimedia data. The owner or the distributor of the digital images can insert a unique watermark into copies for different customers or receivers, which will be helpful to identify the source of illegal copies. In this chapter the authors present two original spatial authentication techniques for digital images. These new algorithms yield an invisible watermark that is robust to various kinds of attacks. The main principle is the utilization of a virtual (2D or 3D) graph embedded into the digital images. Then, the colors of some vertices of the virtual graph are slightly modified for obtaining the watermark. The proposed techniques modify pixels or voxels of the object by a spatial watermark insertion scheme. These techniques can be used for all kinds of digital images, color or black and white, and the new algorithms produce an invisible robust watermark. The techniques lower the computational complexity that normally rises with the traditional watermarking algorithms. This approach reduces computation and implementation complexity of the algorithms. These techniques seem to replace advantages of the transform domain techniques with those of the spatial domain techniques.


Author(s):  
M. Monsignori ◽  
P. Nesi ◽  
M. Spinu

Content protection for multimedia data is widely recognized especially for data types that are frequently distributed, sold or shared in digital and via Internet. Particularly, the music industry dealing with audio files realized the necessity for content protection. Distribution of music sheets will face the same problems. Digital watermarking techniques provide a certain level of protection for music sheets. Classical image-oriented watermarking algorithms for images suffer from several drawbacks when directly applied to image representations of music sheets. Therefore, new solutions have been developed which are designed regarding the content of the music sheets. In comparison to other media types, the development of watermarking algorithms for music scores is a rather young technology. The chapter reviews the evolution of the early approaches and describes the current state of the art in the field.


Author(s):  
Farook Sattar ◽  
Dan Yu

Today, the Internet is a worldwide broadcasting capability, a mechanism for information dissemination and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. With the rapid evolution of digital networks, digital libraries and World Wide Web (WWW) services, the convenient broadcasting or exposition of digital products on the global network leads easily to illegal copying, modifying and retransmission. The Internet has spawned many copyright issues involving multimedia content distribution. Let’s say an owner would like to sell or distribute a work to legal/registered users only. If the work were subsequently copied/redistributed illegally, how could the owner find who was responsible? Cryptographic techniques provide an effective solution for securing the delivery process and controlling the use of the contents that an user has obtained. However, with flawless transmission through the network, the contents after decryption are exactly the same as the original data. The contents can be copied perfectly infinite times. A user can also manipulate the contents. Digital watermarking (Arnold, Schmucker, & Wolthusen, 2003; Katzenbeisser & Petitcolas, 2000) offers a way to counter copyright piracy on global networks that are not solvable by cryptography. It provides proof and tracking capabilities to illegal copying and distribution of multimedia information. Most existing digital watermarking schemes are based on some assumptions for watermark detection and extraction. Some schemes require the previous knowledge of watermark locations, strengths or some thresholds. In some algorithms, the watermark is estimated with the help of the original watermark information. To ensure the robustness and invisibility of the watermark, the optimum embedding locations are usually different for different images. For a large image database, it could be a disadvantage to require watermark location and strength information for watermark detection and extraction. A large amount of information then needs to be stored. On the Internet, an owner would like to distribute multimedia data by signing different watermarks to different users in order to prevent illegal redistribution of the data by a legal user. In this scenario, watermark detection and extraction algorithms requiring information of either watermark embedding locations and strengths or the original watermark should fail, since one does not know exactly which watermark is embedded in a particular copy of the watermarked image. To this end, we present a new blind watermarking scheme (Yu, Sattar, & Ma, 2002; Yu & Sattar, 2003, 2005) based on Independent Component Analysis (ICA) (Hyvarinen, 1999; Hyvärinen & Oja, 1999; Lee, 1998) for color images, which can overcome existing problems of watermark detection and extraction as described above. The new ICA-based scheme is found to be efficient in the application of data tracking/tracing for multimedia distribution through the Internet against other digital watermarking schemes. By adopting this ICA-based watermarking scheme, an efficient multimedia distribution framework/protocol for copyright protection can be accomplished. This article is organized as follows: The watermark embedding and extraction algorithms for color image watermarking using the new ICA-based scheme are presented next, followed by a discussion and comments on the results, security issues, summary and future works.


2014 ◽  
Vol 687-691 ◽  
pp. 3992-3995
Author(s):  
Xiao Qiang Yang

Digital watermarking is a new information security technology, and it uses the information to protect the security of multimedia data hiding technique. Digital watermarking in wavelet domain can make effective use of the human visual system characteristics, and can be compatible with the international compression standard, and the embedding watermark signal energy can be distributed to all of the pixel space. Based on the characteristic of multi-resolution wavelet decomposition and human visual system model matching, digital watermarking algorithm based on wavelet transform is proposed in this paper. The algorithm for tamper proof is designed by quantifying the significant wavelet coefficients to embed watermark sequence. Preprocessing and quantifying the image of this algorithm are studied, which resolves the rounding error and overflow problem brought by the watermarked image pixel values of wavelet transform. Through various attack test and analysis, the experimentation shows that it has strong robustness, can resist many common image attacks, and has strong practicability.


Author(s):  
A. G. Zotin ◽  
A. V. Proskurin

Abstract. In recent years, digital watermarking of photo and video materials has become more and more important in connection with the transmission of multimedia data over unsecured communication channels. Digital watermarking allows to reduce the amount of transmitted information and to protect embedded metadata. Improving robustness and security of embedded data increases computational costs, which obstruct usage of digital watermarks in mobile devices. In this research, we propose a number of improvements to the digital watermarking process based on Arnold and discrete wavelet transforms to reduce the computational cost. Considering the watermark as a linear sequence of pixels allows us to speed up its processing. The two-dimensional lookup table allows performing an Arnold transform in constant time regardless of the number of iterations. Number of iteration for each block of watermark is determined using hash function applied to the secret key. Also, the structure of the lookup table is proposed to accelerate the embedding of watermark. This table allows to determine the frequency coefficients for embedding based on the key hash code. Proposed improvements allow to speed up the watermark preparation by an average 14 times and the overall embedding process by 1.22 times for 1920×1080 images.


The illegal act of digital multimedia data loss the value of information and integrity. The loss of information and integrity born the process of piracy of digital data. The piracy of digital data loss the brand value of documents and products. For the prevention of piracy used the digital watermarking technique. The digital watermarking techniques provide copyright protection and increase the value of brands — Watermarking techniques used in various fields such as image, video, audio, and text. The process of watermarking techniques proceeds in two manners spatial domain and frequency domain. The processing of frequency based watermarking techniques is roughest and fast processing of watermarking. Now in the current scenario, various transform function is used for the embedding process of watermarking techniques. In this approach present the studied of digital watermarking techniques based-on different transform function such as DCT, DWT, FFT, and many more transform function. The transform function based watermarking techniques faced a problem of geometrical attack. The Geometrical attack deforms the watermark and gets information. The prevention of watermarking techniques against the Geometrical attacks is a big challenge for the researcher in the field of digital watermarking.


Sign in / Sign up

Export Citation Format

Share Document