scholarly journals Multi-Biometric Watermarking Scheme Based on Interactive Segmentation Process

2019 ◽  
Vol 63 (4) ◽  
pp. 263-273 ◽  
Author(s):  
Rasha Thabit

Iris-based security systems are highly recommended because of their security and ease of use. Different watermarking techniques have been presented to provide security while exchanging or storing iris images. The previous iris image watermarking techniques have successfully reached their aims, however, they suffer from some limitations such as the distortions that are presented in the iris region because of the watermark embedding process, the limited embedding capacity, and the lack of robustness against unintentional attacks. On the other hand, nowadays, the biometric-based security systems have directed their interest towards multi-biometric techniques in order to improve the performance of the individual’s recognition process. This paper presents a new multi-biometric watermarking (MBW) scheme in which the features of the fingerprint image and some personal information are embedded in the iris image. To avoid the abovementioned limitations, the proposed scheme presents an interactive segmentation algorithm (ISA) and a Slantlet transform based watermark embedding method. The proposed ISA prevents any distortion in the iris region which is a beneficial feature for the iris image recognition process. The experimental results proved the efficiency of the proposed ISA in comparison with the Hough transform based methods in terms of accuracy, embedding capacity, and execution time. The proposed MBW scheme performs better in comparison with the state-of-the-art methods in terms of the intactness of the iris region, the robustness against unintentional attacks, and the watermark embedding capacity.

Cryptography ◽  
2020 ◽  
pp. 480-497
Author(s):  
Lin Gao ◽  
Tiegang Gao ◽  
Jie Zhao

This paper proposed a reversible medical image watermarking scheme using Redundant Discrete Wavelet Transform (RDWT) and sub-sample. To meet the highly demand of the perceptional quality, the proposed scheme embedding the watermark by modifying the RDWT coefficients. The sub-sample scheme is introduced to the proposed scheme for the enhancement of the embedding capacity. Moreover, to meet the need of security, a PWLCM based image encryption algorithm is introduced for encrypting the image after the watermark embedding. The experimental results suggests that the proposed scheme not only meet the highly demand of the perceptional quality, but also have better embedding capacity than former DWT based scheme. Also the encryption scheme could protect the image contents efficiently.


2015 ◽  
Vol 7 (4) ◽  
pp. 1-18 ◽  
Author(s):  
Lin Gao ◽  
Tiegang Gao ◽  
Jie Zhao

This paper proposed a reversible medical image watermarking scheme using Redundant Discrete Wavelet Transform (RDWT) and sub-sample. To meet the highly demand of the perceptional quality, the proposed scheme embedding the watermark by modifying the RDWT coefficients. The sub-sample scheme is introduced to the proposed scheme for the enhancement of the embedding capacity. Moreover, to meet the need of security, a PWLCM based image encryption algorithm is introduced for encrypting the image after the watermark embedding. The experimental results suggests that the proposed scheme not only meet the highly demand of the perceptional quality, but also have better embedding capacity than former DWT based scheme. Also the encryption scheme could protect the image contents efficiently.


Author(s):  
Rasha Thabit ◽  
Jaffer Ali ◽  
Doaa Subhi

Nowadays, many biometric based security systems depend on the iris images for authentication because of their features and ease of use. However, storing and sharing these sensitive images through open access networks will expose them to tampering. In order to ensure the safety of the iris images, this paper presents a new tampering reveal technique based on watermarking in the transform domain. In the proposed technique, the iris region is selected and isolated using interactive segmentation process (ISA). The authentication bits have been generated from the iris region (IR) and embedded in the Slantlet transform coefficients of the remaining part of the iris image which has been named as non-iris region (NIR). The use of ISA ensures the intactness of IR because it has been excluded from the embedding process. Several experiments have been conducted to test the visual quality, capacity, payload, and the tampering reveal performance. The experiments proved the ability of the proposed technique to reveal and localize any tampering in IR, in addition, the difference between the original iris image and the watermarked iris image is imperceptible


Entropy ◽  
2019 ◽  
Vol 21 (5) ◽  
pp. 460 ◽  
Author(s):  
Chuying Yu ◽  
Xiaowei Li ◽  
Xinan Chen ◽  
Jianzhong Li

A novel adaptive secure holographic image watermarking method in the sharp frequency localized contourlet transform (SFLCT) domain is presented. Based upon the sine logistic modulation map and the logistic map, we develop an encrypted binary computer-generated hologram technique to fabricate a hologram of a watermark first. Owing to the enormous key space of the encrypted hologram, the security of the image watermarking system is increased. Then the hologram watermark is embedded into the SFLCT coefficients with Schur decomposition. To obtain better imperceptibility and robustness, the entropy and the edge entropy are utilized to select the suitable watermark embedding positions adaptively. Compared with other watermarking schemes, the suggested method provides a better performance with respect to both imperceptibility and robustness. Experiments show that our watermarking scheme for images is not only is secure and invisible, but also has a stronger robustness against different kinds of attack.


2018 ◽  
Vol 10 (2) ◽  
pp. 40-55
Author(s):  
Lin Gao ◽  
Tiegang Gao ◽  
Jie Zhao ◽  
Yonglei Liu

This article proposed a reversible digital image watermarking scheme using PVO and Redundant Discrete Wavelet Transform (RDWT). The PVO was introduce to the proposed scheme to enhance the embedding capacity. By embedding the watermark in the RDWT coefficients, the proposed scheme exploited the visual masking property of RDWT to achieve better visual quality. Also, the proposed scheme has better performance on embedding capacity because the RDWT has several sub-band coefficients for embedding. The experimental results on natural and medical images suggests that the proposed scheme could meet the demand of perceptional quality with better embedding capacity than former schemes.


2017 ◽  
Vol 8 (1) ◽  
pp. 38-48 ◽  
Author(s):  
Swanirbhar Majumder

This paper presents a robust and imperceptible methodology of watermark embedding. It uses two vital techniques, firstly the Multi-Resolution Singular Value Decomposition (MR-SVD) and an image adaptive algorithm on the lines of the human visual system (HVS), called Noise Visibility Function (NVF). This is a special type of Singular Value Decomposition (SVD) with cell based operation for multi-resolution behavior like wavelets. So, by embedding the watermark in the Eigen values the robustness of the scheme is enhanced. While for the imperceptibility the NVF has been employed here. The optimal areas for embedding the watermark are characterized by it based on the local smooth or rough textures detected on the MR-SVD image based on the wavelet strength at sub bands. For imperceptibility, the algorithm has been tested on standard test images and different types of attacks for robustness to obtain encouraging results. This incorporates MR-SVD for the first time with HVS based NVF function. Together they produce better results.


2011 ◽  
Vol 3 (4) ◽  
pp. 42-53 ◽  
Author(s):  
Chun-Ning Yang ◽  
Zhe-Ming Lu

This paper presents a novel image watermarking scheme utilizing Block Truncation Coding (BTC). This scheme uses BTC to guide the watermark embedding and extraction processes. During the embedding process, the original cover image is first partitioned into non-overlapping 4×4 blocks. Then, BTC is performed on each block to obtain its BTC bitplane, and the number of ‘1’s in the bitplane is counted. If the watermark bit to be embedded is ‘1’ and the number of ‘1’s is odd, or the watermark bit to be embedded is ‘0’ and the number of ‘1’s is even, then no change is made. Otherwise, by changing at most three pixels in the original image block, the number of ‘1’s (or ‘0’s) in the renewed bitplane are forced to be odd for the watermark bit ‘1’ or to be even for the watermark bit ‘0’. During the extraction process, BTC is first performed on each block to obtain its bitplane. If the number of ‘1’s in the bitplane is odd, then the embedded watermark bit is ‘1’. Otherwise, the embedded watermark bit is ‘0’. The experimental results show that the proposed watermarking method is semi-fragile except for the changes in brightness and contrast; therefore, the proposed method can be used for image authentication.


Author(s):  
Prajwalasimha S. N. ◽  
Chethan Suputhra .S ◽  
Mohan C. S.

In this article, a combined Discrete Cosine Transformation (DCT) and Successive Division based image watermarking scheme is proposed. In many spatial domain approaches, the watermark information is embedded into Least Significant Bits (LSBs) of host image. These LSBs are more vulnerable to noise and other unwanted information contents in the channel, in few cases these are subjected for modifications also. Many frequency domain approaches withstands LSB interference problem but utilizes more execution time. The proposed technique is a frequency domain approach which can withstand LSB attack and utilizes very less execution time than other existing approaches. Performance analysis is done based on robustness, imperceptibility, data embedding capacity and time of execution. The experimental results are better compared to other existing techniques.


Author(s):  
Reena Thomas Et. al.

A hybrid watermarking scheme based on Triangular Vertex Transform (TVT) and Contourlet coefficients for high robustness is implemented. During watermark embedding, the cover image is first decomposed using Contourlet Transform to obtain high frequency and low frequency coefficients. The lower frequency coefficients are applied with TVT. Then, the W coefficients obtained from TVT are again subdivided. The watermark bit is then embedded on the subdivided coefficients to obtain the watermarked image. Reverse operation is followed in the extraction phase. The performance of this algorithm is evaluated using embedding capacity, Normalized cross correlation (Ncc) and Peak Signal to Noise Ratio (PSNR) using standard test images. These evaluation results disclose the domination of proposed scheme over traditional schemes


2020 ◽  
Author(s):  
Yujian Zhuang ◽  
Xiaoyi Zhou ◽  
Sheng Liu

Abstract The existing robust digital watermarking schemes mainly embed information in the fixed positions or with fixed embedding strength, while seldom considering adaptive adjustment based on the characteristics of the cover image, thus it reduces the imperceptibility and the robustness of watermarking. Aiming at these issues, we propose a scheme which can be able to dynamically adjust the watermark embedding position and strength. Therefore, it guarantees the trade-off between robustness and imperceptibility. The appropriate embedding positions are dynamically selected for the watermark by comparing the image entropy, and the embedding strength of the image blocks are adaptively adjusted according to the entropy and the Just Noticeable Difference (JND) model in the Human Visual System (HVS)-based wavelet domain. Singular Value Decomposition (SVD) is performed on the image blocks to ensure the resistant ability of geometric attacks. The experimental results show that the scheme has good imperceptibility as well as strong robustness against various attacks. The robustness in common attacks is improved by at least 1% compared with similar watermarking schemes.


Sign in / Sign up

Export Citation Format

Share Document