Image digital watermarking algorithm using muldresolution wavelet transform

Author(s):  
Jianyong Huang ◽  
Changsheng Yang
Author(s):  
Hiroaki Date ◽  
Satoshi Kanai ◽  
Takeshi Kishinami

Abstract Recently, much interest is being taken in a method to protect the copyright of digital data and prevent illegal duplication of it. However, in the area of CAD/CAM and CG, there are no effective ways to protect the copyright of the 3D geometric models. As a first step to solve this problem, a new digital watermarking method for 3D polygonal models is introduced in this paper. Watermarking is one of the copyright protection methods where an invisible watermark is secretly embedded into the original data. The proposed watermarking method is based on the wavelet transform (WT) and multi-resolution representation (MRR) of the polygonal model. The watermark can be embedded in the large wavelet coefficient vectors at various resolution levels of the MRR. This makes the embedded watermark imperceptible and invariant to the affine transformation, and also makes the control of the geometric error caused by the watermarking reliable.


2020 ◽  
Vol 6 (3) ◽  
pp. 92-99
Author(s):  
A. Zhuvikin

One of the most promising application of the digital watermarking is the selective image authentication (SIA) systems. In order to implement such a system one requires an embedding algorithm with an appropriate capacity. In addition, an embedding method is to be robust for the class of non-malicious manipulations which the SIA system is designed for. We propose the new method which has a significant embedding capacity while still being tolerant to JPEG compression, brightness and contrast adjustments. This was possible due to the extension of the well-known discrete wavelet transform embedding technique. We propose two-step embedding scheme and the use of image histogram equalisation and recovering operations. The experiment results show acceptable tolerance to JPEG compression, brightness and contrast adjustments with good visual quality in terms of PSNR just after embedding.


Author(s):  
V. Santhi ◽  
D. P. Acharjya

Advances in technologies facilitate the end users to carry out unauthorized manipulation and duplication of multimedia data with less effort. Because of these advancements, the two most commonly encountered problems are (1) copyright protection and (2) unauthorized manipulation of multimedia data. Thus a scheme is required to protect multimedia data from those two above said problems. Digital Watermarking is considered as one of the security mechanisms to protect copyrights of multimedia data. The literature review reveals that the calculation of scaling and embedding parameters are not completely automated. In order to automate the procedure of calculating scaling and embedding parameters the computational intelligence need to be incorporated in the watermarking algorithm. Moreover the quality of the watermarked images could also be preserved by combining computational intelligence concepts. Thus watermarking schemes utilizing computational intelligence concepts could be called as intelligence based watermarking schemes and it is presented in this chapter in detail.


2013 ◽  
Vol 333-335 ◽  
pp. 1051-1055
Author(s):  
Chao Han ◽  
Meng Meng Li ◽  
Wei Wu

Aiming at the problem that security of digital watermarking is imperfect, a new digital watermarking algorithm based on holography is put forward. In embedment watermarking stage, first, original watermarking information is divided into two parts: amplitude and phase information. Then, a hologram which will be used as new watermarking information is generated by interference of the phase information light and the reference beam, and the amplitude information will be the key when original watermarking is extracted. At last, host image is transformed by the multilevel structures wavelet transform, and the new watermarking information is embedded into its suitable wavelet domain. In extraction watermarking information stage, the original watermarking information is obtained by the extracted watermarking information combined with the amplitude information. The theory and simulation show our algorithm has excellent performance in security, shear resistance and anti interference of white noise.


Sign in / Sign up

Export Citation Format

Share Document