scholarly journals A Fragile Watermark Scheme for Image Recovery Based on Singular Value Decomposition, Edge Detection and Median Filter

2019 ◽  
Vol 9 (15) ◽  
pp. 3020 ◽  
Author(s):  
Xie ◽  
Wang ◽  
Li

Many fragile watermark methods have been proposed for image recovery and their performance has been greatly improved. However, jagged edges and confusion still exist in the restored areas and these problems need to be solved to achieve a better visual effect. In this paper, a method for improving recovery quality is proposed that adopts singular value decomposition (SVD) and edge detection for tamper detection and then uses a median filter for image recovery. Variable watermark information can be generated that corresponds to block classifications. With mapping and neighborhood adjustment, the area that has been tampered can be correctly detected. Subsequently, we adopt a filtering operation for the restored image obtained after the inverse watermark embedding process. During the filtering operation, a median filter is used to smooth and remove noise, followed by minimum, maximum and threshold operations to balance the image intensity. Finally, the corresponding pixels of the restored image are replaced with the filtered results. The experimental results of six different tampering attacks conducted on eight test images show that tamper detection method with the edge detection can identify the tampered region correctly but has a higher false alarm rate than other methods. In addition, compared with the other three similar methods previously, using a median filter during image recovery not only improves the visual effect of the restored image but also enhances its quality objectively under most tampering attack conditions.

2020 ◽  
Vol 13 (6) ◽  
pp. 432-441
Author(s):  
Andik Setyono ◽  
◽  
De Setiadi ◽  

Watermarking is a copyright authentication technique. This research proposes a robust watermarking method with a combination of Tchebichef transformation and singular value decomposition (SVD). To maintain imperceptibility, embedding is done on one of the selected frames. Frames are randomly selected to increase watermark security. Frame selection is based on two integer keys processed by a linear congruential generator (LCG). The selected frame is then converted to its color space from RGB to YCbCr. Y channel (luminance) was selected to be processed by Tchebichef transformation based on block 8 × 8, the coefficient 0.0 for each block of the transformed results was selected and collected on a matrix. This matrix is then transformed with SVD and a singular matrix is selected for watermark embedding, this method is done to increase robustness. Based on the test results, the imperceptibility value is very good with an average value of 50.952dB, based on the PSNR as a measuring tool. Whereas in the robustness aspect, a value of 0.927 is generated based on the results of the measurement of the correlation between the watermark and the original watermark, where these results are the average extraction results without and with various attacks.


2017 ◽  
Vol 8 (1) ◽  
pp. 38-48 ◽  
Author(s):  
Swanirbhar Majumder

This paper presents a robust and imperceptible methodology of watermark embedding. It uses two vital techniques, firstly the Multi-Resolution Singular Value Decomposition (MR-SVD) and an image adaptive algorithm on the lines of the human visual system (HVS), called Noise Visibility Function (NVF). This is a special type of Singular Value Decomposition (SVD) with cell based operation for multi-resolution behavior like wavelets. So, by embedding the watermark in the Eigen values the robustness of the scheme is enhanced. While for the imperceptibility the NVF has been employed here. The optimal areas for embedding the watermark are characterized by it based on the local smooth or rough textures detected on the MR-SVD image based on the wavelet strength at sub bands. For imperceptibility, the algorithm has been tested on standard test images and different types of attacks for robustness to obtain encouraging results. This incorporates MR-SVD for the first time with HVS based NVF function. Together they produce better results.


2011 ◽  
Vol 225-226 ◽  
pp. 614-618
Author(s):  
Yu Ping Hu ◽  
Jun Zhang ◽  
Hua Yin ◽  
Yi Chun Liu ◽  
Ying Hong Liang

This paper studied the image tamper detection and recovery watermarking scheme based on the discrete wavelet transformation(DWT) and the singular value decomposition (SVD).By the property of DWT and SVD , we design two watermarks which are embedded into the high-frequency bands of the DWT domain.One watermark is from the U component of the SVD domain and used for detecting the intentional content modification and indicating the modified location, and another watermark is from the low-frequency of DWT and used for recovering the image. The watermark generation and watermark embedding are disposed in the image itself. The experimental results show that the proposed scheme can resist the mild modifications of digital image and be able to detect and recovery the malicious modifications precisely.


Author(s):  
Gaurav Bhatnagar ◽  
Jonathan Wu ◽  
Balasubramanian Raman

In this chapter, a robust watermarking technique based on distributive multiresolution transforms (DMT) and singular value decomposition is presented to improve the protection of the images. First, the watermark image is mapped to another form to get reference watermark which is secret and only known to the owner/creator. In order to map watermark image into reference form, chaotic maps are used. The core idea of the proposed technique is to decompose host image via DMT followed by reference watermark embedding in DMT coefficients by modifying the singular values. After embedding, inverse transform is performed to get watermarked image. Two new different distributive multiresolution transforms, namely distributive multiresolution Fourier and distributive multiresolution cosine transform, are explored and used. The feasibility of the proposed method and its robustness against different kind of attacks are verified by computer simulations, and superiority is carried out by the comparisons with the existing methods.


2013 ◽  
Vol 321-324 ◽  
pp. 2688-2692
Author(s):  
Ji Chao Hu ◽  
Hong Yan Huang ◽  
Ai Hua Liang

This paper presents an original video based on DCT (Discrete Cosine Transform) and SVD (singular value decomposition) algorithm combined adaptive watermark embedding algorithm. Algorithm will first split the video stream into different scenes, each frame of the discrete cosine transform, and its singular value decomposition of the DC coefficient; the original watermark image and after scrambling algorithm using singular value decomposition singular value sequence, and finally watermarked image. Experiments show that the algorithm meet the invisibility requirements also meet the robustness requirements, efficiently against attacks as frame dropping, Gaussian Noise and Compression attack.


Symmetry ◽  
2019 ◽  
Vol 11 (10) ◽  
pp. 1227 ◽  
Author(s):  
Xiaoyan Yu ◽  
Chengyou Wang ◽  
Xiao Zhou

With the wide application of color images, watermarking for the copyright protection of color images has become a research hotspot. In this paper, a robust color image watermarking algorithm based on all phase discrete cosine biorthogonal transform (APDCBT) and shuffled singular value decomposition (SSVD) is proposed. The host image is transformed by the 8 × 8 APDCBT to obtain the direct current (DC) coefficient matrix, and then, the singular value decomposition (SVD) is performed on the DC matrix to embed the watermark. The SSVD and Fibonacci transform are mainly used at the watermark preprocessing stage to improve the security and robustness of the algorithm. The watermarks are color images, and a color quick response (QR) code with error correction mechanism is introduced to be a watermark to further improve the robustness. The watermark embedding and extraction processes are symmetrical. The experimental results show that the algorithm can effectively resist common image processing attacks, such as JPEG compression, Gaussian noise, salt and pepper noise, average filter, median filter, Gaussian filter, sharpening, scaling attacks, and a certain degree of rotation attacks. Compared with the color image watermarking algorithms considered in this paper, the proposed algorithm has better performance in robustness and imperceptibility.


Sign in / Sign up

Export Citation Format

Share Document