scholarly journals A Novel Comprehensive Watermarking Scheme for Color Images

2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Shaohua Duan ◽  
Hanwen Wang ◽  
Yunpeng Liu ◽  
Li Huang ◽  
Xiaoyi Zhou

Watermarking technology is commonly used to solve various problems in digital rights management and multimedia security. If a watermarking scheme with multiple purposes applies single method, it will easily cause the destruction of the hidden messages in particular attacks. For the copyright protection and tamper detection of color images, this research proposed a robust-fragile watermarking scheme. The two different embedding schemes embed the watermark into the R layer and G layer after NSST (nonsubsampled shearlet transform) and DWT (discrete wavelet transform) transformation. The hash sequence generated by the R layer and the G layer is served as fragile watermarks and is embedded into the B layer by the LSB (least significant bit) method. Finally, an improved rotation correction is applied to better extract the watermark under the rotation attack. Experimental results show that the proposed method is more accurate than the existing ones in terms of rotation angle correction and can effectively resist general attacks such as noise, filtering, and JEPG compression. Moreover, the proposed fragile watermark can locate the tamper position when malicious tamper occurs. Except cropping attack, the true-positive rate (TPR) reaches 1 for all attacks.

2017 ◽  
Vol 54 ◽  
pp. 140-151 ◽  
Author(s):  
Xiyao Liu ◽  
Rongchang Zhao ◽  
Fangfang Li ◽  
Shenghui Liao ◽  
Yipeng Ding ◽  
...  

2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Chirag Sharma ◽  
Amandeep Bagga ◽  
Rajeev Sobti ◽  
Mohammad Shabaz ◽  
Rashid Amin

The use of Internet technology has led to the availability of different multimedia data in various formats. The unapproved customers misuse multimedia information by conveying them on various web objections to acquire cash deceptively without the first copyright holder’s intervention. Due to the rise in cases of COVID-19, lots of patient information are leaked without their knowledge, so an intelligent technique is required to protect the integrity of patient data by placing an invisible signal known as a watermark on the medical images. In this paper, a new method of watermarking is proposed on both standard and medical images. The paper addresses the use of digital rights management in medical field applications such as embedding the watermark in medical images related to neurodegenerative disorders, lung disorders, and heart issues. The various quality parameters are used to figure out the evaluation of the developed method. In addition, the testing of the watermarking scheme is done by applying various signal processing attacks.


Author(s):  
S. Thabasu Kannan ◽  
S. Azhagu Senthil

Now-a-days watermarking plays a pivotal role in most of the industries for providing security to their own as well as hired or leased data. This paper its main aim is to study the multiresolution watermarking algorithms and also choosing the effective and efficient one for improving the resistance in data compression. Computational savings from such a multiresolution watermarking framework is obvious. The multiresolutional property makes our watermarking scheme robust to image/video down sampling operation by a power of two in either space or time. There is no common framework for multiresolutional digital watermarking of both images and video. A multiresolution watermarking based on the wavelet transformation is selected in each frequency band of the Discrete Wavelet Transform (DWT) domain and therefore it can resist the destruction of image processing.   The rapid development of Internet introduces a new set of challenging problems regarding security. One of the most significant problems is to prevent unauthorized copying of digital production from distribution. Digital watermarking has provided a powerful way to claim intellectual protection. We proposed an idea for enhancing the robustness of extracted watermarks. Watermark can be treated as a transmitted signal, while the destruction from attackers is regarded as a noisy distortion in channel.  For the implementation, we have used minimum nine coordinate positions. The watermarking algorithms to be taken for this study are Corvi algorithm and Wang algorithm. In all graph, we have plotted X axis as peak signal to noise ratio (PSNR) and y axis as Correlation with original watermark. The threshold value ά is set to 5. The result is smaller than the threshold value then it is feasible, otherwise it is not.


Sign in / Sign up

Export Citation Format

Share Document