Multipurpose Image Watermarking Scheme Based on Self-Embedding and Data Hiding into Halftone Image

Author(s):  
Carlos Santiago Avila ◽  
Mariko Nakano Miyatake
Author(s):  
Abhishek Basu ◽  
Susmita Talukdar

In this paper, a saliency and phase congruency based digital image watermarking scheme has been projected. The planned technique implants data at least significant bits (LSBs) by means of adaptive replacement. Here more information is embedded into less perceptive areas within the original image determined by a combination of spectral residual saliency map and phase congruency map. The position of pixels with less perceptibility denotes the most unimportant region for data hiding from the point of visibility within an image. Therefore any modification within these regions will be less perceptible to one observer. The model gives a concept of the areas which has excellent data hiding capacity within an image. Superiority of the algorithm is tested through imperceptibility, robustness, along with data hiding capacity.


2018 ◽  
pp. 1391-1430
Author(s):  
Abhishek Basu ◽  
Susmita Talukdar

In this paper, a saliency and phase congruency based digital image watermarking scheme has been projected. The planned technique implants data at least significant bits (LSBs) by means of adaptive replacement. Here more information is embedded into less perceptive areas within the original image determined by a combination of spectral residual saliency map and phase congruency map. The position of pixels with less perceptibility denotes the most unimportant region for data hiding from the point of visibility within an image. Therefore any modification within these regions will be less perceptible to one observer. The model gives a concept of the areas which has excellent data hiding capacity within an image. Superiority of the algorithm is tested through imperceptibility, robustness, along with data hiding capacity.


Author(s):  
Jaime Sarabia-Lopez ◽  
Diana Nunez-Ramirez ◽  
David Mata-Mendoza ◽  
Eduardo Fragoso-Navarro ◽  
Manuel Cedillo-Hernandez ◽  
...  

Entropy ◽  
2021 ◽  
Vol 23 (2) ◽  
pp. 255
Author(s):  
Mario Gonzalez-Lee ◽  
Hector Vazquez-Leal ◽  
Luis J. Morales-Mendoza ◽  
Mariko Nakano-Miyatake ◽  
Hector Perez-Meana ◽  
...  

In this paper, we explore the advantages of a fractional calculus based watermarking system for detecting Gaussian watermarks. To reach this goal, we selected a typical watermarking scheme and replaced the detection equation set by another set of equations derived from fractional calculus principles; then, we carried out a statistical assessment of the performance of both schemes by analyzing the Receiver Operating Characteristic (ROC) curve and the False Positive Percentage (FPP) when they are used to detect Gaussian watermarks. The results show that the ROC of a fractional equation based scheme has 48.3% more Area Under the Curve (AUC) and a False Positives Percentage median of 0.2% whilst the selected typical watermarking scheme has 3%. In addition, the experimental results suggest that the target applications of fractional schemes for detecting Gaussian watermarks are as a semi-fragile image watermarking systems robust to Gaussian noise.


2013 ◽  
Vol 416-417 ◽  
pp. 1210-1213
Author(s):  
Hua Wen Ai ◽  
Ping Feng Liu ◽  
Sheng Cong Dong

In order to resist print and scan attacks, a kind of digital halftone image watermarking algorithm is proposed, which is based on the edge detection and improved error diffusion. The edge of gray image is gotten using canny detection. Calculate the noise visibility function values of the edge points. Then, sort the values in ascending order and select the size that equal to the length of watermark as the location of watermark embedding. While the grayscale image turns to halftone image using the improved error diffusion algorithm, binary watermark is embedded in the edge position. Watermark is pretreated with Arnold before embedding to improve the safety of watermark. Experiment results show that the algorithm is good resistance to print and scan attacks, while resistance to shearing, noise and jpeg compression attacks.


Sign in / Sign up

Export Citation Format

Share Document