An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet a...An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet are selected according to the human visual system (HVS) characteristics. Watermark bits are added to them. And then effectively cooperates neural networks to learn the characteristics of the embedded watermark related to them. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results and comparisons with other techniques prove the effectiveness of the new algorithm.展开更多
A digital watermarking technique is a multi-scientific discipline which is developed rapidly in last several years for digital content protection, such as copyright protection, authentication protection, source tracin...A digital watermarking technique is a multi-scientific discipline which is developed rapidly in last several years for digital content protection, such as copyright protection, authentication protection, source tracing, etc. However, in realistic scenarios, the digital watermarking system faces significant secure issues, for example, the attackers want to remove, detect, or embed illegal watermark signals. Therefore, the aim of this contribution is to illustrate recent results of robust and secure watermarking to the signal processing community, and highlight both benefits and still open issues. Specifically, this paper is intended to introduce the concept of secure and robust digital watermarking system, and provide with problems and their countermeasures. First of all, the classic watermark model and cryptosystem will be reviewed and then, the concept of secure and robust digital watermarking system will be described. Next, the watermark attack will be classified and described. Finally, some countermeasures that can help to improve secure and robustness are considered.展开更多
A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC o...A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC of the significant vid eo content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast.展开更多
A geometrical transformations resistant digital image watermarking based on quantization is described. Taking advantage of the rotation, scale and translation invariants of discrete Fourier transform (DFT), each water...A geometrical transformations resistant digital image watermarking based on quantization is described. Taking advantage of the rotation, scale and translation invariants of discrete Fourier transform (DFT), each watermark bit is embedded into each homocentric circles around the zero frequency term in DFT domain by quantizing the magnitude vector of Fourier spectrum. The embedded sequence can be extracted by “majority principles” without restoring to the original unmarked image. The experimental results show that the watermark is invisible and robust to any combination of geometrical transformations or common image processing techniques.展开更多
Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protectin...Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protecting data from intruders.This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness.Protection of digital content is a major issue in maintaining the privacy and secrecy of data.Toward this end,digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark in an efficient manner.Recent methodologies in the research on digital watermarking result in data distortion after embedding the watermark.This scenario can reduce the efficiency of detecting watermarks as well as violate data confidentiality.This study adapts a robust reversible histogram shifting(HS)technique for textual data in relational databases.Furthermore,the study presents a digital watermarking scheme intended for document copyright protection and proof of ownership.The major advantage of the proposed watermarking scheme is that it can protect digital data and preserve data quality.To the best of our knowledge,this research methodology is promising for use in the HS expansion model for watermarking data on nonnumeric databases.In addition,the results showed that despite exposing the database to an insertion attacks at 50%and 75%of the watermark,the proposed algorithm can recovermore than half of the embedded watermark in all addition and alteration attacks cases.As a result,the watermark information can be retained and restored completely.展开更多
<div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information tr...<div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information transmission and other fields. Driven by strong demand, digital image watermarking technology has aroused widespread research interest and has gradually developed into one of the most active research directions in information science. In this paper, we present a novel robust digital watermarking algorithm based on discrete radon transform tight frame in finite-set (FDRT). FDRT of the zero mean image is a tight frame, the frame boundary <em><strong>A</strong></em> = <em><strong>B</strong></em> = 1, the dual of the frame is itself. The decomposition and reconstruction of the FDRT tight frame will not cause the phenomenon of image distortion. The embedding of hidden watermark is to add a weak signal to the strong background of the original image. Watermark extraction is to effectively identify the embedded weak signal. The feasibility of the watermarking algorithm is analyzed from two aspects of information hiding and robustness. We select the independent Gaussian random vector as the watermark series, and the peak signal-to-noise ratio (PSNR) as the visual degradation criterion of the watermark image. Basing the FDRT compact stand dual operator, we derived the relationship among the strength parameter, square sum of watermark series, the PSNR. Using Checkmark system, the simulation results show that the algorithm is robust enough to some very important image processing attacks such as lossy compression, MAP, filtering, segmentation, edge enhancement, jitter, quadratic modulation and general geometric attack (scaling, rotation, shearing), etc. </div>展开更多
In this paper, an object-oriented digital watermarking technique is proposed in the wavelet domain for still images. According to the difference of recognition degree of the human eye to the different region of the im...In this paper, an object-oriented digital watermarking technique is proposed in the wavelet domain for still images. According to the difference of recognition degree of the human eye to the different region of the image, the image is divided into the interested region and uninterested region of human eye vision in this scheme. Using the relativity of position and the difference to ocular sensitivity of the multiresolution wavelet among each subband, the image is processed with layered watermarking append technique. Experimental results show that the proposed technique successfully survives image processing operations, additive noise and JPEG compression.展开更多
A watermarking scheme for digital images is introduced. This method is based on discrete wavelet transform and spread spectrum technique. A discrete wavelet transformed binary signature image is expanded by an m ...A watermarking scheme for digital images is introduced. This method is based on discrete wavelet transform and spread spectrum technique. A discrete wavelet transformed binary signature image is expanded by an m sequence and added to the large wavelet coefficients of a host image with a scale factor. Good balance between transparency and robustness is achieved by the selection of the scale factor. In addition, the spread spectrum technique is adopted to increase the robustness of this watermarking scheme. The experimental results show that the proposed method is of good performance and robustness for common image operations such as JPEG lossy compression, etc.展开更多
The watermarking technique has been proposed as a method by hiding secret information into the image to protect the copyright of multimedia data. But most previous work focuses on the algorithms of embedding one dimen...The watermarking technique has been proposed as a method by hiding secret information into the image to protect the copyright of multimedia data. But most previous work focuses on the algorithms of embedding one dimensional watermarks or two dimensional binary digital watermarks. In this paper, a wavelet based method for embedding a gray level digital watermark into an image is proposed. By still image decomposition technique, a gray level digital watermark is decompounded into a series of bitplanes. By discrete wavelet transform ( DWT ), the host image is decomposed into multiresolution representations with hierarchical structure. The different bitplanes of the gray level watermark is embedded into the corresponding resolution of the decomposed host image. The experimental results show that the proposed techniques can successfully survive image processing operations and the lossy compression techniques such as Joint Photographic Experts Group (JPEG).展开更多
Since the Internet of Things(IoT) secret information is easy to leak in data transfer,a data secure transmission model based on compressed sensing(CS) and digital watermarking technology is proposed here. Firstly,...Since the Internet of Things(IoT) secret information is easy to leak in data transfer,a data secure transmission model based on compressed sensing(CS) and digital watermarking technology is proposed here. Firstly, for node coding end, the digital watermarking technology is used to embed secret information in the conventional data carrier. Secondly, these data are reused to build the target transfer data by the CS algorithm which are called observed signals. Thirdly, these signals are transmitted to the base station through the wireless channel. After obtaining these observed signals, the decoder reconstructs the data carrier containing privacy information. Finally, the privacy information is obtained by digital watermark extraction algorithm to achieve the secret transmission of signals. By adopting the watermarking and compression sensing to hide secret information in the end of node code, the algorithm complexity and energy consumption are reduced. Meanwhile, the security of secret information is increased.The simulation results show that the method is able to accurately reconstruct the original signal and the energy consumption of the sensor node is also reduced significantly in consideration of the packet loss.展开更多
Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presen...Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes.展开更多
We present a novel quantization-based digital audio walermarking scheme inwavelet domain. By quantizing a host audio's wavelet coefficients (Integer Lifting WaveletTransform) and utilizing the characteristics of h...We present a novel quantization-based digital audio walermarking scheme inwavelet domain. By quantizing a host audio's wavelet coefficients (Integer Lifting WaveletTransform) and utilizing the characteristics of human auditory system (HAS), the grayimage isembedded using our watermarking method. Experimental results show that the proposed watermarkingscheme is inaudible and robust against various signal processing such as noising adding, lossycompression, low pass filtering, re-sampling, and re-quantifying.展开更多
Digital watermarking has been presented as a new method for copyright protection by embedding a secret signal in a digital image or video sequence. Common digital image watermarking techniques are based on the concept...Digital watermarking has been presented as a new method for copyright protection by embedding a secret signal in a digital image or video sequence. Common digital image watermarking techniques are based on the concept of spread spectrum communications, which can be classified in two catalogues: spatial domain and transform domain based. Most of transform domain watermarking methods are based on discrete cosine transforms (DCT) and robust to JPEG lossy compression. Recently, digital image watermarking based on another important lossy compression technique, vector quantization (VQ), has been presented, which carries watermark information by codeword indices. It is secret and efficient, and is robust to VQ compression with the same codebook. However, the embedded information is less and the extraction process requires the original image. This paper presents a more efficient VQ based image watermarking method, which can embed a large gray level watermark into the original image with less extra distortion and perform the watermark extraction without the original image. In addition, the proposed watermarking algorithm is very secret because two keys are required for watermark extraction. Experimental results demonstrate the effectiveness of the proposed technique.展开更多
The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video ind...The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video industry,and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media.However,there are stillmany unresolved challenges.This paper aims to address those challenges by proposing a new technique for detectingmoving objects in digital videos,which can help prove the credibility of video content by detecting any fake objects inserted by hackers.The proposed technique involves using two methods,the H.264 and the extraction color features methods,to embed and extract watermarks in video frames.The study tested the performance of the system against various attacks and found it to be robust.The evaluation was done using different metrics such as Peak-Signal-to-Noise Ratio(PSNR),Mean Squared Error(MSE),Structural Similarity Index Measure(SSIM),Bit Correction Ratio(BCR),and Normalized Correlation.The accuracy of identifying moving objects was high,ranging from 96.3%to 98.7%.The system was also able to embed a fragile watermark with a success rate of over 93.65%and had an average capacity of hiding of 78.67.The reconstructed video frames had high quality with a PSNR of at least 65.45 dB and SSIMof over 0.97,making them imperceptible to the human eye.The system also had an acceptable average time difference(T=1.227/s)compared with other state-of-the-art methods.展开更多
In the current dire situation of the corona virus COVID-19,remote consultations were proposed to avoid cross-infection and regional differences in medical resources.However,the safety of digital medical imaging in rem...In the current dire situation of the corona virus COVID-19,remote consultations were proposed to avoid cross-infection and regional differences in medical resources.However,the safety of digital medical imaging in remote consultations has also attracted more and more attention from the medical industry.To ensure the integrity and security of medical images,this paper proposes a robust watermarking algorithm to authenticate and recover from the distorted medical images based on regions of interest(ROI)and integer wavelet transform(IWT).First,the medical image is divided into two different parts,regions of interest and non-interest regions.Then the integrity of ROI is verified using the hash algorithm,and the recovery data of the ROI region is calculated at the same time.Also,binary images with the basic information of patients are processed by logistic chaotic map encryption,and then the synthetic watermark is embedded in the medical carrier image using IWT transform.The performance of the proposed algorithm is tested by the simulation experiments based on the MATLAB program in CT images of the lungs.Experimental results show that the algorithm can precisely locate the distorted areas of an image and recover the original ROI on the basis of verifying image reliability.The maximum peak signal to noise ratio(PSNR)value of 51.24 has been achieved,which proves that the watermark is invisible and has strong robustness against noise,compression,and filtering attacks.展开更多
A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component anal...A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component analysis (ICA). The system includes the key for watermark extraction and the host image. The algorithm splits the original image into blocks and classifies these blocks based on visual masking, that is, noise visibility function (NVF). Watermark components with different strength are inserted into chosen direct current components of DCT coefficients according to the classifier. The watermark extraction is based on the characteristic of the statistic independence of the host image, watermark and key. Principle component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind watermark extraction without requiring the original image. Experirnental results show the proposed technique is robust under attacks such as image filtering and adding noise, cropping and resizing. In addition, the proposed private watermarking system can be improved to the application of the DTV content protection system.展开更多
To solve the problem of low capacity of audio watermarking information and poor robustness of impact resistance,a digital audio watermark algorithm based on wavelet transform is presented in this paper. In this algori...To solve the problem of low capacity of audio watermarking information and poor robustness of impact resistance,a digital audio watermark algorithm based on wavelet transform is presented in this paper. In this algorithm,the fine and approximate components are obtained when the Haar wavelet base is used to convert each frame of the audio signal to its discrete transform. Then the HAS algorithm is applied to the fine component embedded with watermark to realize encryption process. The original audio carrier signal is not needed in extraction,as long as the signal is embedded after the frame is divided. The first two sections of each frame are implemented in Haar transform respectively to get the fine and approximate component. The watermark images are obtained from the former two fine components of the energy watermark sequence after calculating,comparing and extracting. The simulation results show that there is a certain transparency for the algorithm,a good robustness against the resampling and low pass filtering attack.展开更多
The last decade shows an explosion of using social media,which raises several challenges related to the security of personal files including images.These challenges include modifying,illegal copying,identity fraud,cop...The last decade shows an explosion of using social media,which raises several challenges related to the security of personal files including images.These challenges include modifying,illegal copying,identity fraud,copyright protection and ownership of images.Traditional digital watermarking techniques embed digital information inside another digital information without affecting the visual quality for security purposes.In this paper,we propose a hybrid digital watermarking and image processing approach to improve the image security level.Specifically,variants of the widely used Least-Significant Bit(LSB)watermarking technique are merged with a blob detection algorithm to embed information into the boundary pixels of the largest blob of a digital image.The proposed algorithms are tested using several experiments and techniques,which are followed by uploading the watermarked images into a social media site to evaluate the probability of extracting the embedding watermarks.The results show that the proposed approaches outperform the traditional LSB algorithm in terms of time,evaluation criteria and the percentage of pixels that have changed.展开更多
Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can be constructed by using a series of watermarked...Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can be constructed by using a series of watermarked data. To defeat this type of counterfeit attack, a novel fragile watermarking technique is proposed in which different pseudo-random data are selected for different host products, and the generated fragile watermark is dependent upon the selected information. While inserting the fragile watermark, the pseudo-random information is also robustly embedded into the host data. Because of the difference between the selected information, different watermarked data cannot be used to forge illegal contents containing a valid fragile watermark.展开更多
A novel robust watermarking scheme based on image connectivity is proposed. In the scheme, the connected objects are obtained according to selected connectivity pattern, and the gravity centers are calculated in sever...A novel robust watermarking scheme based on image connectivity is proposed. In the scheme, the connected objects are obtained according to selected connectivity pattern, and the gravity centers are calculated in several bigger objects as the reference points for watermark embedding. Based on these reference points and the center of the whole image, several sectors are formed, and the same version of watermarks is embedded into these sectors and their opposites. Thanks to the very stable gravity center of the connected objects, watermark detection is synchronized successfully. Simulation results show that the watermark can survive under both local and global geometrical distortions.展开更多
基金Supported by the National Natural Science Foun-dation of China ( 60473015)
文摘An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet are selected according to the human visual system (HVS) characteristics. Watermark bits are added to them. And then effectively cooperates neural networks to learn the characteristics of the embedded watermark related to them. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results and comparisons with other techniques prove the effectiveness of the new algorithm.
基金supported by the Jiangnan University of Science&Technology Young Scholar under Grant No.JUSRP11462
文摘A digital watermarking technique is a multi-scientific discipline which is developed rapidly in last several years for digital content protection, such as copyright protection, authentication protection, source tracing, etc. However, in realistic scenarios, the digital watermarking system faces significant secure issues, for example, the attackers want to remove, detect, or embed illegal watermark signals. Therefore, the aim of this contribution is to illustrate recent results of robust and secure watermarking to the signal processing community, and highlight both benefits and still open issues. Specifically, this paper is intended to introduce the concept of secure and robust digital watermarking system, and provide with problems and their countermeasures. First of all, the classic watermark model and cryptosystem will be reviewed and then, the concept of secure and robust digital watermarking system will be described. Next, the watermark attack will be classified and described. Finally, some countermeasures that can help to improve secure and robustness are considered.
基金Supported bythe National Natural Science Foundationof China (60175001)
文摘A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC of the significant vid eo content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast.
文摘A geometrical transformations resistant digital image watermarking based on quantization is described. Taking advantage of the rotation, scale and translation invariants of discrete Fourier transform (DFT), each watermark bit is embedded into each homocentric circles around the zero frequency term in DFT domain by quantizing the magnitude vector of Fourier spectrum. The embedded sequence can be extracted by “majority principles” without restoring to the original unmarked image. The experimental results show that the watermark is invisible and robust to any combination of geometrical transformations or common image processing techniques.
文摘Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protecting data from intruders.This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness.Protection of digital content is a major issue in maintaining the privacy and secrecy of data.Toward this end,digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark in an efficient manner.Recent methodologies in the research on digital watermarking result in data distortion after embedding the watermark.This scenario can reduce the efficiency of detecting watermarks as well as violate data confidentiality.This study adapts a robust reversible histogram shifting(HS)technique for textual data in relational databases.Furthermore,the study presents a digital watermarking scheme intended for document copyright protection and proof of ownership.The major advantage of the proposed watermarking scheme is that it can protect digital data and preserve data quality.To the best of our knowledge,this research methodology is promising for use in the HS expansion model for watermarking data on nonnumeric databases.In addition,the results showed that despite exposing the database to an insertion attacks at 50%and 75%of the watermark,the proposed algorithm can recovermore than half of the embedded watermark in all addition and alteration attacks cases.As a result,the watermark information can be retained and restored completely.
文摘<div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information transmission and other fields. Driven by strong demand, digital image watermarking technology has aroused widespread research interest and has gradually developed into one of the most active research directions in information science. In this paper, we present a novel robust digital watermarking algorithm based on discrete radon transform tight frame in finite-set (FDRT). FDRT of the zero mean image is a tight frame, the frame boundary <em><strong>A</strong></em> = <em><strong>B</strong></em> = 1, the dual of the frame is itself. The decomposition and reconstruction of the FDRT tight frame will not cause the phenomenon of image distortion. The embedding of hidden watermark is to add a weak signal to the strong background of the original image. Watermark extraction is to effectively identify the embedded weak signal. The feasibility of the watermarking algorithm is analyzed from two aspects of information hiding and robustness. We select the independent Gaussian random vector as the watermark series, and the peak signal-to-noise ratio (PSNR) as the visual degradation criterion of the watermark image. Basing the FDRT compact stand dual operator, we derived the relationship among the strength parameter, square sum of watermark series, the PSNR. Using Checkmark system, the simulation results show that the algorithm is robust enough to some very important image processing attacks such as lossy compression, MAP, filtering, segmentation, edge enhancement, jitter, quadratic modulation and general geometric attack (scaling, rotation, shearing), etc. </div>
文摘In this paper, an object-oriented digital watermarking technique is proposed in the wavelet domain for still images. According to the difference of recognition degree of the human eye to the different region of the image, the image is divided into the interested region and uninterested region of human eye vision in this scheme. Using the relativity of position and the difference to ocular sensitivity of the multiresolution wavelet among each subband, the image is processed with layered watermarking append technique. Experimental results show that the proposed technique successfully survives image processing operations, additive noise and JPEG compression.
文摘A watermarking scheme for digital images is introduced. This method is based on discrete wavelet transform and spread spectrum technique. A discrete wavelet transformed binary signature image is expanded by an m sequence and added to the large wavelet coefficients of a host image with a scale factor. Good balance between transparency and robustness is achieved by the selection of the scale factor. In addition, the spread spectrum technique is adopted to increase the robustness of this watermarking scheme. The experimental results show that the proposed method is of good performance and robustness for common image operations such as JPEG lossy compression, etc.
文摘The watermarking technique has been proposed as a method by hiding secret information into the image to protect the copyright of multimedia data. But most previous work focuses on the algorithms of embedding one dimensional watermarks or two dimensional binary digital watermarks. In this paper, a wavelet based method for embedding a gray level digital watermark into an image is proposed. By still image decomposition technique, a gray level digital watermark is decompounded into a series of bitplanes. By discrete wavelet transform ( DWT ), the host image is decomposed into multiresolution representations with hierarchical structure. The different bitplanes of the gray level watermark is embedded into the corresponding resolution of the decomposed host image. The experimental results show that the proposed techniques can successfully survive image processing operations and the lossy compression techniques such as Joint Photographic Experts Group (JPEG).
基金Supported by the Foundation of Tianjin for Science and Technology Innovation(10FDZDGX00400,11ZCKFGX00900)Key Project of Educational Reform Foundation of Tianjin Municipal Education Commission(C03-0809)
文摘Since the Internet of Things(IoT) secret information is easy to leak in data transfer,a data secure transmission model based on compressed sensing(CS) and digital watermarking technology is proposed here. Firstly, for node coding end, the digital watermarking technology is used to embed secret information in the conventional data carrier. Secondly, these data are reused to build the target transfer data by the CS algorithm which are called observed signals. Thirdly, these signals are transmitted to the base station through the wireless channel. After obtaining these observed signals, the decoder reconstructs the data carrier containing privacy information. Finally, the privacy information is obtained by digital watermark extraction algorithm to achieve the secret transmission of signals. By adopting the watermarking and compression sensing to hide secret information in the end of node code, the algorithm complexity and energy consumption are reduced. Meanwhile, the security of secret information is increased.The simulation results show that the method is able to accurately reconstruct the original signal and the energy consumption of the sensor node is also reduced significantly in consideration of the packet loss.
文摘Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes.
文摘We present a novel quantization-based digital audio walermarking scheme inwavelet domain. By quantizing a host audio's wavelet coefficients (Integer Lifting WaveletTransform) and utilizing the characteristics of human auditory system (HAS), the grayimage isembedded using our watermarking method. Experimental results show that the proposed watermarkingscheme is inaudible and robust against various signal processing such as noising adding, lossycompression, low pass filtering, re-sampling, and re-quantifying.
文摘Digital watermarking has been presented as a new method for copyright protection by embedding a secret signal in a digital image or video sequence. Common digital image watermarking techniques are based on the concept of spread spectrum communications, which can be classified in two catalogues: spatial domain and transform domain based. Most of transform domain watermarking methods are based on discrete cosine transforms (DCT) and robust to JPEG lossy compression. Recently, digital image watermarking based on another important lossy compression technique, vector quantization (VQ), has been presented, which carries watermark information by codeword indices. It is secret and efficient, and is robust to VQ compression with the same codebook. However, the embedded information is less and the extraction process requires the original image. This paper presents a more efficient VQ based image watermarking method, which can embed a large gray level watermark into the original image with less extra distortion and perform the watermark extraction without the original image. In addition, the proposed watermarking algorithm is very secret because two keys are required for watermark extraction. Experimental results demonstrate the effectiveness of the proposed technique.
文摘The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video industry,and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media.However,there are stillmany unresolved challenges.This paper aims to address those challenges by proposing a new technique for detectingmoving objects in digital videos,which can help prove the credibility of video content by detecting any fake objects inserted by hackers.The proposed technique involves using two methods,the H.264 and the extraction color features methods,to embed and extract watermarks in video frames.The study tested the performance of the system against various attacks and found it to be robust.The evaluation was done using different metrics such as Peak-Signal-to-Noise Ratio(PSNR),Mean Squared Error(MSE),Structural Similarity Index Measure(SSIM),Bit Correction Ratio(BCR),and Normalized Correlation.The accuracy of identifying moving objects was high,ranging from 96.3%to 98.7%.The system was also able to embed a fragile watermark with a success rate of over 93.65%and had an average capacity of hiding of 78.67.The reconstructed video frames had high quality with a PSNR of at least 65.45 dB and SSIMof over 0.97,making them imperceptible to the human eye.The system also had an acceptable average time difference(T=1.227/s)compared with other state-of-the-art methods.
基金This work was supported,in part,by the National Nature Science Foundation of China under grant numbers 61502240,61502096,61304205,61773219in part,by the Natural Science Foundation of Jiangsu Province under grant numbers BK20191401in part,by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fund.
文摘In the current dire situation of the corona virus COVID-19,remote consultations were proposed to avoid cross-infection and regional differences in medical resources.However,the safety of digital medical imaging in remote consultations has also attracted more and more attention from the medical industry.To ensure the integrity and security of medical images,this paper proposes a robust watermarking algorithm to authenticate and recover from the distorted medical images based on regions of interest(ROI)and integer wavelet transform(IWT).First,the medical image is divided into two different parts,regions of interest and non-interest regions.Then the integrity of ROI is verified using the hash algorithm,and the recovery data of the ROI region is calculated at the same time.Also,binary images with the basic information of patients are processed by logistic chaotic map encryption,and then the synthetic watermark is embedded in the medical carrier image using IWT transform.The performance of the proposed algorithm is tested by the simulation experiments based on the MATLAB program in CT images of the lungs.Experimental results show that the algorithm can precisely locate the distorted areas of an image and recover the original ROI on the basis of verifying image reliability.The maximum peak signal to noise ratio(PSNR)value of 51.24 has been achieved,which proves that the watermark is invisible and has strong robustness against noise,compression,and filtering attacks.
基金This project was supported by the Digital TV Special Foundation of National Development and Reform Commission ofChina (040313) Home Coming Scholars Science Activity Foundation of Ministry of Personnel (20041231) the Graduate In-novation Foundation of Xidian University (innovaion 0509)
文摘A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component analysis (ICA). The system includes the key for watermark extraction and the host image. The algorithm splits the original image into blocks and classifies these blocks based on visual masking, that is, noise visibility function (NVF). Watermark components with different strength are inserted into chosen direct current components of DCT coefficients according to the classifier. The watermark extraction is based on the characteristic of the statistic independence of the host image, watermark and key. Principle component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind watermark extraction without requiring the original image. Experirnental results show the proposed technique is robust under attacks such as image filtering and adding noise, cropping and resizing. In addition, the proposed private watermarking system can be improved to the application of the DTV content protection system.
基金Sponsored by the Education Department of Heilongjiang Province (Grant No. 12531113)
文摘To solve the problem of low capacity of audio watermarking information and poor robustness of impact resistance,a digital audio watermark algorithm based on wavelet transform is presented in this paper. In this algorithm,the fine and approximate components are obtained when the Haar wavelet base is used to convert each frame of the audio signal to its discrete transform. Then the HAS algorithm is applied to the fine component embedded with watermark to realize encryption process. The original audio carrier signal is not needed in extraction,as long as the signal is embedded after the frame is divided. The first two sections of each frame are implemented in Haar transform respectively to get the fine and approximate component. The watermark images are obtained from the former two fine components of the energy watermark sequence after calculating,comparing and extracting. The simulation results show that there is a certain transparency for the algorithm,a good robustness against the resampling and low pass filtering attack.
文摘The last decade shows an explosion of using social media,which raises several challenges related to the security of personal files including images.These challenges include modifying,illegal copying,identity fraud,copyright protection and ownership of images.Traditional digital watermarking techniques embed digital information inside another digital information without affecting the visual quality for security purposes.In this paper,we propose a hybrid digital watermarking and image processing approach to improve the image security level.Specifically,variants of the widely used Least-Significant Bit(LSB)watermarking technique are merged with a blob detection algorithm to embed information into the boundary pixels of the largest blob of a digital image.The proposed algorithms are tested using several experiments and techniques,which are followed by uploading the watermarked images into a social media site to evaluate the probability of extracting the embedding watermarks.The results show that the proposed approaches outperform the traditional LSB algorithm in terms of time,evaluation criteria and the percentage of pixels that have changed.
基金National Natual Science Foundation of China (Grant No.600722030)Key Disciplinary Development Program of Shanghai (Grant No. 2001 - 44)
文摘Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can be constructed by using a series of watermarked data. To defeat this type of counterfeit attack, a novel fragile watermarking technique is proposed in which different pseudo-random data are selected for different host products, and the generated fragile watermark is dependent upon the selected information. While inserting the fragile watermark, the pseudo-random information is also robustly embedded into the host data. Because of the difference between the selected information, different watermarked data cannot be used to forge illegal contents containing a valid fragile watermark.
文摘A novel robust watermarking scheme based on image connectivity is proposed. In the scheme, the connected objects are obtained according to selected connectivity pattern, and the gravity centers are calculated in several bigger objects as the reference points for watermark embedding. Based on these reference points and the center of the whole image, several sectors are formed, and the same version of watermarks is embedded into these sectors and their opposites. Thanks to the very stable gravity center of the connected objects, watermark detection is synchronized successfully. Simulation results show that the watermark can survive under both local and global geometrical distortions.