Affine Correction Based Image Watermarking Robust to Geometric Attacks

Author(s):  
Wuyong Zhang ◽  
Jianhua Chen ◽  
Rongshu Wang ◽  
Xiaolong Wang ◽  
Tian Meng
Author(s):  
Chauhan Usha ◽  
Singh Rajeev Kumar

Digital Watermarking is a technology, to facilitate the authentication, copyright protection and Security of digital media. The objective of developing a robust watermarking technique is to incorporate the maximum possible robustness without compromising with the transparency. Singular Value Decomposition (SVD) using Firefly Algorithm provides this objective of an optimal robust watermarking technique. Multiple scaling factors are used to embed the watermark image into the host by multiplying these scaling factors with the Singular Values (SV) of the host image. Firefly Algorithm is used to optimize the modified host image to achieve the highest possible robustness and transparency. This approach can significantly increase the quality of watermarked image and provide more robustness to the embedded watermark against various attacks such as noise, geometric attacks, filtering attacks etc.


2018 ◽  
Vol 8 (3) ◽  
pp. 410 ◽  
Author(s):  
Chengyou Wang ◽  
Yunpeng Zhang ◽  
Xiao Zhou

2020 ◽  
Author(s):  
Satyanarayana Murty. P ◽  
Purna Ramesh Addanki

Abstract Robust watermarking proposals supported on human visual characteristics with a series of hybrid transform of type discrete wavelet transform (DWT) followed by singular value decomposition (SVD) is wished-for. By analyzing the matrices U or V through SVD, it is bringing into being that there stay alive a well-built relationship amid the internal column elements of U or internal row elements of V. Hence, this work will make the most of these chattels for image watermarking. At the outset, visual digital data is segregated into 8 × 8 non-overlapping pixel blocks and each block is processed for brinks by using the algorithm of detection for a canny brink. An appropriate block is decided to pick in such a way that the number of brinks in each block is only about or equal to a threshold. A threshold is defined by finding the mean of the brinks in each block of the host visual digital data. Using these appropriate blocks, we will form an image of reference. This reference image is processed by a series of operations DWT-SVD. Then, the watermark is implanted by adapting the nth column of the U matrix of the host image with the nth column of the U matrix of the watermark image. The same operation is applied on the V matrix instead of a column vector, use a row vector. The adapted relation is wont to retrieve a watermark. The experimental findings demonstrate that the ideal watermarking algorithm will guarantee that the typical image processing operations and geometric attacks are invisible and more stable. The efficiency of this proposed method is out of shape than other proposed methods examined in this research.


Author(s):  
Dr. Sheshang D. Degadwala ◽  
Sanjay Chaudhary ◽  
Sanjay Gaur ◽  
Dhairya Vyas

Watermarking is raised to apparatus for the Privacy of Intellectual Property Rights (IPR) of combination dates. In this paper, in the starting we have to fill the user name field and password field which will be secure afterwards that it will be make QR-code using zxing library and it is transformed into binary patterns for share-1 that is called Visual cryptography algorithm. Now share-2 is store into server database and it will be furthered use in future situation at receiver way. Now share-1 is hiding into the LL-Band with the help of DWT-SVD into block manner with Pseudo Zernike moment. Then it is sent to the network or internet. As in network there are many unlike attackers whose apply any Rotation, Scaling or Translation attacks on the hiding image. Attack image is expected at the end side or receiver side. To get prevent against attacks here at the starting stage use Pseudo Zernike moment then after Surf based feature extraction and it will recover the attacks pixel and scaling parameters value and using affine transformation recover the rotational parameters value. So then scale value and angle value is apply on attack image recovered watermark image. Now using DWT+SVD block method extract the water mark share-1. So on system with share-1 and another share-2 will be in server side so now by using EX-OR process for getting QR-Code. At the last stage QR-code is translated and fill field user name and password vale to login the system successfully.


2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Yong-Seok Lee ◽  
Young-Ho Seo ◽  
Dong-Wook Kim

This paper proposes a new adaptive watermarking scheme for digital images, which has the properties of blind extraction, invisibility, and robustness against attacks. The typical scheme for invisibility and robustness consisted of two main techniques: finding local positions to be watermarked and mixing or embedding the watermark into the pixels of the locations. In finding the location, however, our scheme uses a global space such that the multiple watermarking data is spread out over all four lowest-frequency subbands, resulting from n-level Mallat-tree 2D (dimensional) DWT, where n depends on the amount of watermarking data and the resolution of the host image, without any further process to find the watermarking locations. To embed the watermark data into the subband coefficients, weighting factors are used according to the type and energy of each subband to adjust the strength of the watermark, so we call this an adaptive scheme. To examine the ability of the proposed scheme, images with various resolutions are tested for various attacks, both pixel-value changing attacks and geometric attacks. With experimental results and comparison to the existing works we show that the proposed scheme has better performance than the previous works, except those which specialize in certain types of attacks.


Sign in / Sign up

Export Citation Format

Share Document