A robust digital watermarking technique with improved performance under JPEG compression

2006 ◽  
Author(s):  
Fang Fang ◽  
Songxin Tan
2020 ◽  
Vol 6 (3) ◽  
pp. 92-99
Author(s):  
A. Zhuvikin

One of the most promising application of the digital watermarking is the selective image authentication (SIA) systems. In order to implement such a system one requires an embedding algorithm with an appropriate capacity. In addition, an embedding method is to be robust for the class of non-malicious manipulations which the SIA system is designed for. We propose the new method which has a significant embedding capacity while still being tolerant to JPEG compression, brightness and contrast adjustments. This was possible due to the extension of the well-known discrete wavelet transform embedding technique. We propose two-step embedding scheme and the use of image histogram equalisation and recovering operations. The experiment results show acceptable tolerance to JPEG compression, brightness and contrast adjustments with good visual quality in terms of PSNR just after embedding.


2011 ◽  
Vol 65 ◽  
pp. 104-107 ◽  
Author(s):  
Jian Hua Song ◽  
Yong Zhu

Digital watermarking is an efficient method for the intellectual property protection and identification. A digital watermarking method by double encryption based on Arnold and chaos in DCT domain was proposed in this paper. First, the digital watermarking was transformed by Arnold scrambling, and then the watermarking was encrypted by chaos system again, so it made the watermarking get double encryption. The encrypted watermarking was embedded into the parts of low-frequency coefficients. The experimental results show that the algorithm is effective and robust for several attacks such as common noise, filtering, cropping and JPEG compression, as well as its good security.


2012 ◽  
Vol 433-440 ◽  
pp. 5962-5966 ◽  
Author(s):  
Ding Hui Zhang ◽  
Yu Ping Wang ◽  
Jian Wei Zhang ◽  
Sai Sai Xu ◽  
You Li

In the light of JPEG compression attack, a blind digital watermarking algorithm of integer wavelet transform is proposed in this paper. Before the watermarking image is embedded, the cover image is decomposed by integer wavelet transform, and the binary watermarking image is scrambled to enhance its security. The scrambled digital watermarking is embedded into the cover image by means of modulo operation and modification of the integer wavelet transform coefficients of the cover image. The digital watermarking is extracted only by means of the modulo operation of the integer wavelet transform coefficients of the watermarked image and threshold ruling, and not depending on the original cover image. The experiments have shown that the blind digital watermarking algorithm can strongly resist JPEG compression attack.


2012 ◽  
Vol 200 ◽  
pp. 660-665
Author(s):  
Shi Wei Liu ◽  
Zhen Liu ◽  
Qing Bao Wei

In this paper, a wavelet-based digital watermark algorithm for packaging security is proposed. In the algorithm, digital watermark is embedded in the color image CMYK mode, the method based on the discrete wavelet transform (DWT) can point to point semi-adaptive repeated embed digital watermark. Digital watermark that embedded in a color image can be extracted after printing, scanning and pre-processing the color image. The experimental results show that watermark extraction’s effect is acceptable, so the algorithm can achieve the purpose of the anti-counterfeiting for packaging printing. In addition the algorithm is robust enough against various kinds of attacks such as salt&pepper noise addition, JPEG compression, image crop and so on.


2013 ◽  
Vol 401-403 ◽  
pp. 1462-1465
Author(s):  
Yu Hong Chang

To improve the robustness of watermarking algorithms, this paper proposes a robust digital watermarking algorithm based on combination of fractal and wavelet. By key the algorithm transfers watermark information into self-similar fractal images, discretes Haar wavelet to host image, and embeds two fractal watermark image after fractal into Haar wavelet sub-band. Simulation results show that the algorithm has good robustness to image distortion as noise, JPEG compression, shear, filtering, etc.


2013 ◽  
Vol 4 (1) ◽  
pp. 98-101 ◽  
Author(s):  
Mandeep Kaur ◽  
Navneet Kaur ◽  
Chetan Batra

In most of the digital image watermarking schemes, it becomes a common practice to address security in terms of robustness, which is basically a norm in cryptography. Such consideration in developing and evaluation of a watermarking scheme may severely affect the performance and render the scheme ultimately unusable. Watermarking is the process of embedding watermark into an image such that the embedded watermark can be extracted later. Lossy compression attacks in digital watermarking are one of the major issues in digital watermarking. Cheddad et al. proposed a robust secured self-embedding method which is resistant to a certain amount of JPEG compression. Our experimental results show that the self-embedding method is resistant to JPEG compression attacks and not resistant to other lossy compression attacks such as Block Truncation Coding (BTC) and Singular Value Decomposition (SVD). Therefore we improved Cheddad at all’s. Method to give better protection against BTC and SVD compression attacks


Sign in / Sign up

Export Citation Format

Share Document