The usage of block average intensity in tamper localization for image watermarking

Author(s):  
Siau-Chuin Liew ◽  
Jasni Mohamad Zain
2020 ◽  
Vol 2020 ◽  
pp. 1-13 ◽  
Author(s):  
Shaozhang Xiao ◽  
Zhengwei Zhang ◽  
Yue Zhang ◽  
Changhui Yu

Considering the existing medical image watermarking algorithms, a single function often has limitations, and a multipurpose watermarking algorithm for medical images is proposed. First, medical images are divided into regions of interest (ROIs) and regions of noninterest (RONIs). Then, the authentication watermark produced for each subblock of the ROI is embedded into the corresponding mapping subblock. The visible watermark is embedded into the RONI, and, finally, the watermark information and constructed authentication information in each subblock of the ROI are embedded into the corresponding RONI subblock. Simulation results show that the embedded visible watermark can protect and facilitate medical image management. In addition, the proposed algorithm has strong robustness and very good visual quality. It can simultaneously realize copyright protection and content authentication and also has high tamper localization capability.


Author(s):  
Chauhan Usha ◽  
Singh Rajeev Kumar

Digital Watermarking is a technology, to facilitate the authentication, copyright protection and Security of digital media. The objective of developing a robust watermarking technique is to incorporate the maximum possible robustness without compromising with the transparency. Singular Value Decomposition (SVD) using Firefly Algorithm provides this objective of an optimal robust watermarking technique. Multiple scaling factors are used to embed the watermark image into the host by multiplying these scaling factors with the Singular Values (SV) of the host image. Firefly Algorithm is used to optimize the modified host image to achieve the highest possible robustness and transparency. This approach can significantly increase the quality of watermarked image and provide more robustness to the embedded watermark against various attacks such as noise, geometric attacks, filtering attacks etc.


Sign in / Sign up

Export Citation Format

Share Document