PDF Performance of a Practical Blind Watermarking Scheme

Free download. Book file PDF easily for everyone and every device. You can download and read online Performance of a Practical Blind Watermarking Scheme file PDF Book only if you are registered here. And also you can download or read online all Book PDF file that related with Performance of a Practical Blind Watermarking Scheme book. Happy reading Performance of a Practical Blind Watermarking Scheme Bookeveryone. Download file Free Book PDF Performance of a Practical Blind Watermarking Scheme at Complete PDF Library. This Book have some digital formats such us :paperbook, ebook, kindle, epub, fb2 and another formats. Here is The CompletePDF Book Library. It's free to register here to get Book file PDF Performance of a Practical Blind Watermarking Scheme Pocket Guide.
  1. Performance of a Practical Blind Watermarking Scheme
  2. Performance of a practical blind watermarking scheme - Semantic Scholar
  3. Technical Reports

Makbol NM, Khoo BE, Rassem TH Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Process 10 1 — Int J Eng Res Dev 8 11 — Sridhar B, Arun C An enhanced approach to video watermarking with multiple watermarks using wavelet.

Authors: Muthumanickam Shanmugam Arun Chokkalingam. Publication date Publisher Springer Berlin Heidelberg. Technical Paper Stability and bifurcation characteristics of viscoelastic microcantilevers.

Performance of a Practical Blind Watermarking Scheme

Technical Paper LiFi cross-connection node model using whispering gallery mode of light in a microring resonator. Technical Paper Effect of vacuum packaging on bandwidth of push—pull type capacitive accelerometer structure. Tsakalides, A.

All Rights Reserved. Log In.

Performance of a practical blind watermarking scheme - Semantic Scholar

Paper Titles. Article Preview. Abstract: As an improvement of Cheng etal. Add to Cart. Applied Mechanics and Materials Volume Main Theme:.

Technical Reports

Advanced Printing and Packaging Materials and Technologies. Edited by:. Online since:. January Wei Guo , Wen Fa Qi. Cited by. Related Articles. Paper Title Pages. Abstract: A blind fragile watermarking algorithm based on LSB is proposed in this paper. By embedding the watermark into LSB of these specific pixels determined by m-sequence, some key problems such as information hiding, blind watermark extraction and tamper detection are solved efficiently.

Journal of Applied Research and Technology. JART

Abstract: This paper proposes a lossless data embedding method for Block Truncation Coding BTC compressed images based on prediction and histogram shifting techniques. Because BTC is easy to implement, and requires significantly less CPU cost, it has arouse widely attention in applications where real-time processing is demanded. For the existing lossless data embedding method in BTC codes, the decoder has to be specifically designed so that the spatial domain image can perfectly reconstructed from the compressed codes. Therefore, the application of these methods is limited.

Based on attack resistance, digital watermarking is categorized into three classes: robust watermarking, semi-fragile watermarking and fragile watermarking. In these days, the robust digital watermarking has received a great attention. In this type of watermarking, watermark is designed to resist intentional or unintentional manipulations in the host signal [9, 58].

In the fragile watermarking, watermark is intended to be destroyed even after the minor unintentional or intentional manipulation in the host signal [29, 52— 54]. In the semi-fragile watermarking, watermarks have the ability to resist unintentional manipulations caused by common image processing operations like JPEG compression and are fragile against intentional manipulations [43, 46].

The main purpose of the robust watermarking is to protect copyright and ownership of the digital data, whereas the fragile watermarking and semi-fragile watermarking are employed to ensure the integrity and content authentication of the digital data [55, 57]. Digital watermarking is categorized into blind, semi-blind and non-blind watermarking, based on the requirements for watermark detection or extraction. The non-blind or private watermarking techniques require both the original host image and the secret key s to identify the watermark.

Semi-blind watermarking techniques require the presence of the secret key s and the watermark for watermark extraction. On the other hand, the blind or public watermarking schemes require only the secret key s for extraction [15]. The watermark techniques can also be broadly classified into two major classes based on the embedding domain: spatial domain techniques and transform domain techniques [20, 57]. Spatial domain techniques are the simplest and in these techniques, the watermark directly applies on pixel intensities of the host signal [20, 31, 51, 52].

An SVD based Watermarking Scheme

On the other hand, transform domain techniques perform the watermarking by changing the transformed domain coefficients of the host signal [20]. Typically, the transform domain techniques are more robust in various attacks than the spatial domain techniques [12, 37, 48]. The performance of transform domain techniques can be further improved by joining two or more transform coefficients. Most of the current literature focus on the performance measures like imperceptibility, robustness and capacity. Inclusion of security along with performance measures is an essential issue in many critical watermarking applications, such as medical image watermarking, authentication of legal documents, fingerprinting and data monitoring.

In [31], Lin et al. This scheme is blind and based on spatial domain. In [33], Lin et al. In this scheme, wavelet trees were classified into two clusters using the distance vector to denote binary watermark bits so that they exhibit a sufficiently large statistical difference based on the distance vector. This difference is utilized for subsequent watermark extraction. In [32, 34], Lin et al. In the first scheme, the significant difference between the maximum wavelet coefficient and the second maximum wavelet coefficient was utilized for embedding.

In the second scheme, watermark was embedded in the local maximum coefficient using different sub-bands. Many of the existing SVD-based digital watermarking schemes suffer from the false positive detection problem which is referred as the ability to extract an un-embedded watermark from the digital host image.

  • The World of Rembrandt 1606-1669.
  • The New Testament Cliffs Notes;
  • Tides;
  • Content-independent embedding scheme for multi-modal medical image watermarking.

Several authors have conducted experiments on SVD-based watermarking to find the robust watermarking scheme. In literature listed in Table 1, only the singular values of watermark or singular values of host image and watermark are embedded into the host image. These approaches cause the false positive detection problem because the SVD subspaces left and right singular vectors represent the detailed information about the image whereas singular values only determine the luminance of the image layers produced by left and right singular vectors [3, 23, 62].

These schemes mainly deal with robustness and imperceptibility issues. Jain et al. In this scheme the principal component of watermark is embedded into the host image rather than singular values of the watermark. This scheme handles such problem by incorporating signature-based authentication mechanism. Further Bhatnagar et al. The core idea of this scheme is using reversible random extension transform, to randomly upscale the size of cover image followed by the embedding of logo watermark in the Wavelet Frame domain. After embedding logo watermark, a verification phase is performed with the help of a binary watermark and Toral Automorphism.

Second critical problem of digital watermarking scheme is the problem of multiple claims of ownership. If an attacker embeds another illegal watermark to the already watermarked image, proofing the ownership becomes a serious problem. Mohammad et al. However, this solution is not applicable in that watermarking scheme where it requires multiple number of watermarks to be embedded.

LH, HL No [35] Gray SVD Run et al. Third common security challenge that watermarking techniques face is keeping the secret message unreadable for unauthorized persons. Cryptography techniques like Arnold transformation [4], chaotic encryption [24] can be used to deals with this problem. An important issue related to the efficiency and feasibility of watermarking schemes is blind watermarking. The blind watermarking scheme has a great significance and practical value in many applications where keeping the original image without security is not practical. In this DWT-SVD based blind watermarking scheme, an effective solution for these challenging problems is proposed and evaluated using gray image watermark.

The false positive detection problem is tackled by embedding complete watermark into host image.