Robust Watermarking Scheme for GIS Vector Maps

2018 ◽  
Vol 31 (1) ◽  
pp. 277 ◽  
Author(s):  
Methaq Talib Gaata

  With the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming  the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data. The digital map is separated into the isolated parts.Watermark data are embedded within the nominated magnitudes in each part when satisfied the definite criteria. The efficiency of proposed watermarking scheme is assessed within statistical measures based on two factors which are fidelity and robustness. Experimental results demonstrate the proposed watermarking scheme representing ideal trade off for disagreement issue between distortion amount and robustness. Also, the proposed scheme shows  robust resistance for many kinds of attacks.

2014 ◽  
Vol 3 (2) ◽  
pp. 69-78
Author(s):  
Sedigeh Razavi babakalak ◽  
Mohammad Ali Balafar ◽  
Ali Farzan

In this paper, a new robust digital image watermarking algorithm which was based on singular value decomposition (SVD) and discrete wavelet transform (DWT) was proposed and simulated for protecting real property rights. A gray scale logo image, rather than a randomly generated Gaussian noise type watermark, was used as a watermark. Its embedding algorithm hid a watermark LL sub-band blocks in the low–low (LL) and high-high (HH) sub-bands of a target non-overlapping block of the host image by modifying singular values on SVD version of these blocks. A semi-blind watermark extraction was designed to estimate the original coefficients. Experimental results showed that the proposed scheme made significant improvements in terms of both transparency and robustness and was superior to the existing methods which were considered in this paper.


2014 ◽  
Vol 8 ◽  
pp. 2997-3008 ◽  
Author(s):  
Azz El Arab El Hossaini ◽  
Mohamed El Aroussi ◽  
Khadija Jamali ◽  
Samir Mbarki ◽  
Mohammed Wahbi

2019 ◽  
Vol 8 (S3) ◽  
pp. 85-89
Author(s):  
B. Gopi ◽  
T. Sudha

Singular value decomposition is in use quite recently in many applications. The SVD is being used for many applications along with other techniques. In this paper a robust watermarking scheme was proposed by using SVD along with wavelet transform. In addition to normal hiding scheme a random signature was used to improve its robustness against spurious intruders. The unitary matrices are used to generate a signature which is going to be embedded into the fourth level decomposition of cover image. After extracting the watermark at the other end, it will be checked with the signature embedded. If these signatures are matched the unitary matrices will be used to extract watermark from watermarked image. Different attacks are considered and the simulation results have shown that the extraction of watermark after attacks have shown minor effect only.


2019 ◽  
Vol 8 (3) ◽  
pp. 4040-4046

Internet based digitization has been of rapid increase in the usage of database applications at an enormous rate in recent times. It is very difficult to secure the ownership of digital assets because all the data on the internet are available everywhere almost free of cost and anybody can access such data and claim their ownership. In current digital scenario not only images, videos, and audio are in digital form. Databases are also digitized in different models and used as a service in database applications, including areas such as finance, multimedia, personnel, etc. A huge amount of confidential and sensitive data which are available publically facing a variety of threats like illegal copying, illegal redistribution, tampering, forgery and authentication. Authenticity, integrity, confidentiality and copyright protection are most important security issues to be addressed with most importance. Copyright management is a serious issue in database applications because it is much easier for others to download and manipulate copyrighted databases from the Internet and later re-use without any control. In this paper we proposed a robust watermarking scheme for copyright protection for relational databases, which protects the copy right information of the database even if the attacker tampers the data by changing the attribute values or reordering the tuples of the database. The proposed watermarking technique is robust since the watermark will not be lost even though the attacker tampers the data. The experiments show that the new method is efficient as well as effective for maintaining copy right information there by ensuring right protection to relational databases


2019 ◽  
Vol 25 (4) ◽  
pp. 68-74
Author(s):  
Sarra Belilita ◽  
Nourredine Amardjia ◽  
Tewfik Bekkouche ◽  
Imen Nouioua

In this paper, we propose an efficient image watermarking scheme based on combining Singular Value Decomposition (SVD) and Discrete Cosine Transform (DCT) transforms. The main idea consists of exploiting results obtained by the well-known Perona-Malik diffusion applied in image de-noising in watermarking domain by selecting significant blocks to embed a binary logo watermark. After applying the DCT on the selected blocks, the SVD is performed on each of these transformed blocks to modify a few numbers of its U matrix elements according to some defined conditions. Computer simulation and experimental results prove the efficiency of our proposed method against image processing attacks and outperform several previous schemes in terms of imperceptibility and robustness.


Author(s):  
Chauhan Usha ◽  
Singh Rajeev Kumar

Digital Watermarking is a technology, to facilitate the authentication, copyright protection and Security of digital media. The objective of developing a robust watermarking technique is to incorporate the maximum possible robustness without compromising with the transparency. Singular Value Decomposition (SVD) using Firefly Algorithm provides this objective of an optimal robust watermarking technique. Multiple scaling factors are used to embed the watermark image into the host by multiplying these scaling factors with the Singular Values (SV) of the host image. Firefly Algorithm is used to optimize the modified host image to achieve the highest possible robustness and transparency. This approach can significantly increase the quality of watermarked image and provide more robustness to the embedded watermark against various attacks such as noise, geometric attacks, filtering attacks etc.


Sign in / Sign up

Export Citation Format

Share Document