scholarly journals A Large Capacity Histogram-Based Watermarking Algorithm for Three Consecutive Bins

2018 ◽  
Vol 8 (12) ◽  
pp. 2617 ◽  
Author(s):  
Zhen Yue ◽  
Zichen Li ◽  
Hua Ren ◽  
Yixian Yang

The histogram watermark, which performs watermark embedding by slightly modifying the histogram of the original image, has been a hot research topic in information hiding technology due to the superiority of its pixel modification during the watermark embedding process, which is independent of the pixel position. This property makes the histogram-based watermark strong resistant to geometric attacks, such as cropping attack, crossed attack, rotation attack, etc. In this paper, we propose a large capacity histogram-based robust watermarking algorithm based on three consecutive bins for the first time. In our scheme, we divide the shape of three consecutive bins into eight cases. According to these cases, we embed Information Number 0, 1, 2, 3, 4, 5, 6, or 7, respectively. The embedded information capacity reaches one bit per bin (bpb), and the amount of embedded information is equal to 200% of the previous existing algorithms. Experimental results show that the new algorithm not only has a large capacity of embedding information, but also has strong robustness to geometric attacks, as well as common image processing operations.

2012 ◽  
Vol 262 ◽  
pp. 138-142
Author(s):  
Wei Guo ◽  
Yu Xin Liu ◽  
Ze Zong ◽  
Wen Fa Qi

With the rapid development of the information technology and digital image copy devices, the information carrier shows off diversified trends. However paper media still play an important role in many areas serving as information carrier, and correspondingly the information security of paper documents faces great challenges. So how to solve the information security problems of paper media has become the hottest research topic. This paper proposes an information hiding method used in printed documents image based on the screen dots modulating shade composed of a large number of randomly arranged screen dots. These dots are classified into coding dots, anchor dots and perturbing dots respectively. Experimental results show that screen dots modulating shade using our method has larger information capacity and also has strong robustness against the attacks of print-scan processes. Moreover, this technology also can be widely used in many other areas, such as anti-counterfeit printing, anti-copy, document content tamper-proofing and document image retrieval etc.


An essential text for accounting and finance students undertaking research for the first time. It demystifies the research process by providing the novice researcher with a must-have guide through all of the stages of the research process, from identifying a research topic to the finished project.


Author(s):  
Chauhan Usha ◽  
Singh Rajeev Kumar

Digital Watermarking is a technology, to facilitate the authentication, copyright protection and Security of digital media. The objective of developing a robust watermarking technique is to incorporate the maximum possible robustness without compromising with the transparency. Singular Value Decomposition (SVD) using Firefly Algorithm provides this objective of an optimal robust watermarking technique. Multiple scaling factors are used to embed the watermark image into the host by multiplying these scaling factors with the Singular Values (SV) of the host image. Firefly Algorithm is used to optimize the modified host image to achieve the highest possible robustness and transparency. This approach can significantly increase the quality of watermarked image and provide more robustness to the embedded watermark against various attacks such as noise, geometric attacks, filtering attacks etc.


Author(s):  
Muhammad Tahir Naseem ◽  
Ijaz Mansoor Qureshi ◽  
Atta-ur-Rahman ◽  
Muhammad Zeeshan Muzaffar

Mathematics ◽  
2020 ◽  
Vol 8 (8) ◽  
pp. 1377
Author(s):  
Qiumei Zheng ◽  
Nan Liu ◽  
Fenghua Wang

The discrete wavelet transform (DWT) is unable to represent the directional features of an image. Similarly, a fixed embedding strength is not able to establish an ideal balance between imperceptibility and robustness of a watermarked image. In this work, we propose an adaptive embedding strength watermarking algorithm based on shearlets’ capture directional features (S-AES). We improve the watermarking algorithm in the domain of DWT using non-subsampled shearlet transform (NSST). The improvement is made in terms of coping with anti-geometric attacks. The embedding strength is optimized by artificial bee colony (ABC) to achieve higher robustness under the premise of satisfying imperceptibility. The principle components (PC) of the watermark are embedded into the host image to overcome the false positive problem. The simulation results show that the proposed algorithm has better imperceptibility and strong robustness against multi-attacks, especially those of high intensity.


2019 ◽  
Vol 9 (4) ◽  
pp. 700 ◽  
Author(s):  
Jing Liu ◽  
Jingbing Li ◽  
Jixin Ma ◽  
Naveed Sadiq ◽  
Uzair Bhatti ◽  
...  

To resolve the contradiction between existing watermarking methods—which are not compatible with the watermark’s ability to resist geometric attacks—and robustness, a robust multi-watermarking algorithm suitable for medical images is proposed. First, the visual feature vector of the medical image was obtained by dual-tree complex wavelet transform and discrete cosine transform (DTCWT-DCT) to perform multi-watermark embedding and extraction. Then, the multi-watermark was preprocessed using the henon map chaotic encryption technology to strengthen the security of watermark information, and combined with the concept of zero watermark to make the watermark able to resist both conventional and geometric attacks. Experimental results show that the proposed algorithm can effectively extract watermark information; it implements zero watermarking and blind extraction. Compared with existing watermark technology, it has good performance in terms of its robustness and resistance to geometric attacks and conventional attacks, especially in geometric attacks.


2014 ◽  
Vol 687-691 ◽  
pp. 2971-2974
Author(s):  
Sheng Bing Che ◽  
Dong Mei Guo ◽  
Ye Mao Wang ◽  
Li Li Pan

Information hiding in a resources section’s redundancies has large amount of watermark embedding, and the software watermarking based on PE file resources section format has high concealment. This paper combined this two algorithms’ advantages, and embedded the watermark information in these two ways. It also introduced the information hiding technology based on ICON file and binder technology to realize the tamper-proof function of the watermark. Experiments shows that this scheme not only improves the embedded information capacity, but also overcomes the problem that the embedded watermark are susceptible to tamper-proof attack. So the new scheme improves the watermark’s comprehensive performance, and create a more secure and robust software watermark.


2013 ◽  
Vol 392 ◽  
pp. 1006-1009
Author(s):  
Qing Chen ◽  
Qi Wen Hu ◽  
Shao Kun Feng ◽  
Ze Fu

In this paper, a text blind watermarking is proposed and implemented for copyright protection. Based on the characteristics of PDF format, this algorithm uses character spacing coding throughout whole PDF document to embed watermark into it. Robustness and security is further increased by using synchronous coding, cycle encryption and majority decision. Watermark embedding and extracting are implemented under the software environment of VC++ 6.0, and performances are tested and analyzed. Experiments show that the algorithm has good transparency, large capacity and good robustness. It can apply to both of Chinese and English PDF documents.


Sign in / Sign up

Export Citation Format

Share Document