scholarly journals AN EFFICIENT AND SECURED NON BLIND WATERMARKING SCHEME FOR COLOR IMAGES USING DWT AND ARNOLD TRANSFORM

2010 ◽  
pp. 183-191
Author(s):  
Nagaraj V. Dharwadkar ◽  
B. B. Amberker

In the early days, encryption and access control techniques are used to protect the ownership of image. Recently, the watermarking schemes are utilized to define the copyright of image. Digital watermarking is a concept of embedding a special security pattern into cover image. It has recently become important in various application areas of image processing. In this paper we present a new invisible, robust, non blind frequency domain watermarking scheme. This scheme embeds the monochrome (logo) watermark into the high and middle {HL, LH, HH} frequency bands of Arnold transformed luminance channel of the color image. The security of scheme is improved by scrambling the luminance channel of the color image using Arnold transform. In order to increase the detection speed and efficiency of algorithm, the location of modified high and middle frequency components are stored into key array. Use of this key array improves the speed of the extraction algorithm. The experimental results show that the watermark is robust against different types of attacks like image cropping, image filtering, image Compression, image blurring, and Image transformations. Further, the results of the proposed scheme are analyzed on the set of images.

2015 ◽  
Vol 2015 ◽  
pp. 1-10
Author(s):  
Hai Nan ◽  
Bin Fang ◽  
Weibin Yang ◽  
Jiye Qian ◽  
Ming Li ◽  
...  

With more color images being widely used on the Internet, the research on embedding color watermark image into color host image has been receiving more attention. Recently, Su et al. have proposed a robust and blind watermarking scheme for dual color image, in which the main innovation is the using of two-level DCT. However, it has been demonstrated in this paper that the original scheme in Su’s study is not secure and can be attacked by our proposed method. In addition, some errors in the original scheme have been pointed out. Also, an improvement measure is presented to enhance the security of the original watermarking scheme. The proposed method has been confirmed by both theoretical analysis and experimental results.


2014 ◽  
Vol 94 ◽  
pp. 219-235 ◽  
Author(s):  
Qingtang Su ◽  
Yugang Niu ◽  
Gang Wang ◽  
Shaoli Jia ◽  
Jun Yue

2010 ◽  
Vol 171-172 ◽  
pp. 622-627
Author(s):  
Wang Sheng Fang ◽  
Yu Nan Li ◽  
Lu Lu Wu ◽  
Rong Zhang

A new color image watermarking scheme is presented. The visual characteristics of HVS, multi-resolution of discrete wavelet transform, and color image content information are adopted to classify the wavelet coefficients and find a new JND model. The embedded watermark is processed by Arnold transform and chaotic modulation, which can improve the security of scheme. The combined JND model-guided watermarking scheme provides the maximum strength transparent watermark to compromise the robustness and invisibility. Both better invisibility and robustness work than other algorithms based on HVS are shown in the experimental results.


Author(s):  
Aarushi Shrivastava ◽  
Janki Ballabh Sharma ◽  
Sunil Dutt Purohit

Objective: In the recent multimedia technology images play an integral role in communication. Here in this paper, we propose a new color image encryption method using FWT (Fractional Wavelet transform), double random phases and Arnold transform in HSV color domain. Methods: Firstly the image is changed into the HSV domain and the encoding is done using the FWT which is the combination of the fractional Fourier transform with wavelet transform and the two random phase masks are used in the double random phase encoding. In this one inverse DWT is taken at the end in order to obtain the encrypted image. To scramble the matrices the Arnold transform is used with different iterative values. The fractional order of FRFT, the wavelet family and the iterative numbers of Arnold transform are used as various secret keys in order to enhance the level of security of the proposed method. Results: The performance of the scheme is analyzed through its PSNR and SSIM values, key space, entropy, statistical analysis which demonstrates its effectiveness and feasibility of the proposed technique. Stimulation result verifies its robustness in comparison to nearby schemes. Conclusion: This method develops the better security, enlarged and sensitive key space with improved PSNR and SSIM. FWT reflecting time frequency information adds on to its flexibility with additional variables and making it more suitable for secure transmission.


Sign in / Sign up

Export Citation Format

Share Document