scholarly journals Block-based Adaptive Image Watermarking Scheme using Visual Perception Model in DCT Domain

2012 ◽  
Vol 41 (4) ◽  
pp. 41-45 ◽  
Author(s):  
F. Namazi ◽  
M. R. Karami ◽  
S. B. Ramazannia
Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1428
Author(s):  
Musrrat Ali ◽  
Chang Wook Ahn ◽  
Millie Pant ◽  
Sanoj Kumar ◽  
Manoj Singh ◽  
...  

Digital watermarking has become an essential and important tool for copyright protection, authentication, and security of multimedia contents. It is the process of embedding a watermark in the multimedia content and its extraction. Block-based discrete cosine transform (DCT) is a widely used method in digital watermarking. This paper proposes a novel blind image watermarking scheme developed in the spatial domain by quantization of invariant direct current (DC) coefficients. The cover image is redistributed and divided into non-overlapped square blocks and then the DC coefficients invariant to rotation, row and column flip operations, without utilization of the DCT transform, are directly calculated in the spatial domain. Utilizing the quantization parameter and watermark information, the modified DC coefficients and the difference between DC and modified DC coefficients are calculated to directly modify the pixel values to embed watermark bits in the spatial domain instead of the DCT domain. Optimal values of the quantization parameter, which plays a significant role in controlling the tradeoff between robustness and invisibility, are calculated through differential evolution (DE), the optimization algorithm. Experimental results, compared with the latest similar schemes, demonstrate the advantages of the proposed scheme.


2018 ◽  
Vol 78 (7) ◽  
pp. 8075-8089 ◽  
Author(s):  
Han Fang ◽  
Hang Zhou ◽  
Zehua Ma ◽  
Weiming Zhang ◽  
Nenghai Yu

2011 ◽  
Vol 20 (05) ◽  
pp. 801-819
Author(s):  
ALIMOHAMMAD LATIF ◽  
AHMAD REZA NAGHSH-NILCHI

In this paper, an adaptive digital image watermarking technique using fuzzy gradient on DCT domain is presented. In our approach, the image is divided into separate blocks and the DCT is applied on each block individually. Then, the watermark is inserted in the transform domain and the inverse transform is carried out. We increase the robustness of the watermark by increasing the watermark strength. However, this reduces the fidelity of the watermarking scheme. This is because the fidelity and robustness of watermarking are generally in conflict with each other. To improve the fidelity, a new fuzzy-based method is introduced. In this method, a fuzzy gradient-based mask is generated from the host image. Then, as a post-processing stage, the generated mask is combined with the watermarked image. Experimental results show that the proposed technique has high fidelity as well as high robustness against a variety of attacks.


Digital image watermarking has been proposed to protect the digital multimedia content. The main objectives of watermarking scheme are robustness, reliability, security against numerous attacks. To improve the imperceptibility, robustness and capacity of the watermarked image, this paper presents a transform domain watermarking method using spatial frequency and block SVD. The spatial frequency is used to select the appropriate blocks for embedding the watermark image by transforming the SVD coefficients of these blocks of the cover image. In this paper first we scramble the cover image by ZIG-ZAG sequencing and then rearranged. After that Shift Invariant Discrete Wavelet Transformed (SIDWT) cover image is partioned in to non-overlapping blocks. Then find out the spatial frequency of these blocks, those blocks which spatial frequency value greater than threshold value are selected for embedding process. Now the watermark image directly embedded by modifying the SVD coefficient of these blocks and get watermarked image. Then inverse process is applied for extracting for watermark image form noisy image. Experimental outcomes show that the proposed scheme is higher imperceptible, robust against various image processing attacks and produce improved results as compared to previous presented schemes


Sign in / Sign up

Export Citation Format

Share Document