In order to improve the robustness of the differential number watermarking (DNW) algorithm proposed by us before, we proposed turbo-based DNW (T-DNW) in which the turbo code was employed in the DNW algorithm. The turb...In order to improve the robustness of the differential number watermarking (DNW) algorithm proposed by us before, we proposed turbo-based DNW (T-DNW) in which the turbo code was employed in the DNW algorithm. The turbo code was used to encode the message prior to watermark embedding and decode the watermark posterior to watermark detection. From the analysis and experiments, the following conclusion could be drawn. The T-DNW algorithm has little higher computational complexity than DNW. And both algorithms have the same performance in terms of watermark visual quality impact. Furthermore, the T-DNW algorithm is much more robust against some common attack than DNW. Although the T-DNW algorithm sacrifices a half payload, we think the achievements are encouraging.展开更多
In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same si...In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same size,then QR factorization was performed on each block.Pseudorandom circular chain(PCC) generated by logistic mapping(LM) was applied to select the embedding blocks for enhancing the security of the scheme.The first column coefficients in Q matrix of chosen blocks were modified to embed watermarks without causing noticeable artifacts.Watermark extraction procedure was performed without the original cover image.The experimental results demonstrate that the watermarked images have good visual quality and this scheme is better than the existing techniques,especially when the image is attacked by cropping,noise pollution and so on.Analysis and discussion on robustness and security issues were also presented.展开更多
A novel semi-fragile audio watermarking algorithm in DWT domain is proposed in this paper.This method transforms the original audio into 3-layer wavelet domain and divides approximation wavelet coefficients into many ...A novel semi-fragile audio watermarking algorithm in DWT domain is proposed in this paper.This method transforms the original audio into 3-layer wavelet domain and divides approximation wavelet coefficients into many groups.Through computing mean quantization of per group,this algorithm embeds the watermark signal into the average value of the wavelet coefficients.Experimental results show that our semi-fragile audio watermarking algorithm is not only inaudible and robust against various common images processing,but also fragile to malicious modification.Especially,it can detect the tampered regions effectively.展开更多
An adaptive digital image watermark algorithm with strong robustness based on gray-scale morphology is proposed in this paper.The embedded strategies include:The algorithm seeks and extracts adaptively the image stron...An adaptive digital image watermark algorithm with strong robustness based on gray-scale morphology is proposed in this paper.The embedded strategies include:The algorithm seeks and extracts adaptively the image strong texture regions.The algorithm maps the image strong texture region to the wavelet tree structures, and embeds adaptively watermark into the wavelet coefficients corresponding to the image's strong texture regions.According to the visual masking features, the algorithm adjusts adaptively the watermark-embedding intensity.Experimental results show the algorithm is robust to compression, filtering, noise as well as strong shear attacks.The algorithm is blind watermark scheme.The image strong texture region extraction method based on morphology in this algorithm is simple and effective and adaptive to various images.展开更多
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ...To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression.展开更多
With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its u...With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its utilities in a number of academic and real environments.There are a wide range of solutions to provide image watermarking frameworks,while each one of them is attempted to address an efficient and applicable idea.In reality,the traditional techniques do not have sufficient merit to realize an accurate application.Due to the fact that the main idea behind the approach is organized based on contourlet representation,the only state-of-the-art materials that are investigated along with an integration of the aforementioned contourlet representation in line with watermarking framework are concentrated to be able to propose the novel and skilled technique.In a word,the main process of the proposed robust watermarking framework is organized to deal with both new embedding and de-embedding processes in the area of contourlet transform to generate watermarked image and the corresponding extracted logo image with high accuracy.In fact,the motivation of the approach is that the suggested complexity can be of novelty,which consists of the contourlet representation,the embedding and the corresponding de-embedding modules and the performance monitoring including an analysis of the watermarked image as well as the extracted logo image.There is also a scrambling module that is working in association with levels-directions decomposition in contourlet embedding mechanism,while a decision maker system is designed to deal with the appropriate number of sub-bands to be embedded in the presence of a series of simulated attacks.The required performance is tangibly considered through an integration of the peak signal-to-noise ratio and the structural similarity indices that are related to watermarked image.And the bit error rate and the normal correlation are considered that are related to the extracted logo analysis,as well.Subsequently,the outcomes are fully analyzed to be competitive with respect to the potential techniques in the image colour models including hue or tint in terms of their shade,saturation or amount of gray and their brightness via value or luminance and also hue,saturation and intensity representations,as long as the performance of the whole of channels are concentrated to be presented.The performance monitoring outcomes indicate that the proposed framework is of significance to be verified.展开更多
文摘In order to improve the robustness of the differential number watermarking (DNW) algorithm proposed by us before, we proposed turbo-based DNW (T-DNW) in which the turbo code was employed in the DNW algorithm. The turbo code was used to encode the message prior to watermark embedding and decode the watermark posterior to watermark detection. From the analysis and experiments, the following conclusion could be drawn. The T-DNW algorithm has little higher computational complexity than DNW. And both algorithms have the same performance in terms of watermark visual quality impact. Furthermore, the T-DNW algorithm is much more robust against some common attack than DNW. Although the T-DNW algorithm sacrifices a half payload, we think the achievements are encouraging.
基金Project(2007AA01Z241-2) supported by the National High-tech Research and Development Program of ChinaProject(2006XM002) supported by Beijing Jiaotong University Science Foundation,ChinaProject(0910KYZY55) supported by the Fundamental Research Funds for the Central University in China
文摘In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same size,then QR factorization was performed on each block.Pseudorandom circular chain(PCC) generated by logistic mapping(LM) was applied to select the embedding blocks for enhancing the security of the scheme.The first column coefficients in Q matrix of chosen blocks were modified to embed watermarks without causing noticeable artifacts.Watermark extraction procedure was performed without the original cover image.The experimental results demonstrate that the watermarked images have good visual quality and this scheme is better than the existing techniques,especially when the image is attacked by cropping,noise pollution and so on.Analysis and discussion on robustness and security issues were also presented.
基金We wish to thank the National Basic Research Program of China (973 Program) for Grant 2007CB311203, the National Natural Science Foundation of China for Grant 60821001, the Specialized Research Fund for the Doctoral Program of Higher Education for Grant 20070013007 under which the present work was possible.
文摘A novel semi-fragile audio watermarking algorithm in DWT domain is proposed in this paper.This method transforms the original audio into 3-layer wavelet domain and divides approximation wavelet coefficients into many groups.Through computing mean quantization of per group,this algorithm embeds the watermark signal into the average value of the wavelet coefficients.Experimental results show that our semi-fragile audio watermarking algorithm is not only inaudible and robust against various common images processing,but also fragile to malicious modification.Especially,it can detect the tampered regions effectively.
基金Supported by the Technology Key Project of Shanxi Province (2007K04-13)the Application Development and Research Project of Xi’an (YF07017)
文摘An adaptive digital image watermark algorithm with strong robustness based on gray-scale morphology is proposed in this paper.The embedded strategies include:The algorithm seeks and extracts adaptively the image strong texture regions.The algorithm maps the image strong texture region to the wavelet tree structures, and embeds adaptively watermark into the wavelet coefficients corresponding to the image's strong texture regions.According to the visual masking features, the algorithm adjusts adaptively the watermark-embedding intensity.Experimental results show the algorithm is robust to compression, filtering, noise as well as strong shear attacks.The algorithm is blind watermark scheme.The image strong texture region extraction method based on morphology in this algorithm is simple and effective and adaptive to various images.
文摘To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression.
文摘With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its utilities in a number of academic and real environments.There are a wide range of solutions to provide image watermarking frameworks,while each one of them is attempted to address an efficient and applicable idea.In reality,the traditional techniques do not have sufficient merit to realize an accurate application.Due to the fact that the main idea behind the approach is organized based on contourlet representation,the only state-of-the-art materials that are investigated along with an integration of the aforementioned contourlet representation in line with watermarking framework are concentrated to be able to propose the novel and skilled technique.In a word,the main process of the proposed robust watermarking framework is organized to deal with both new embedding and de-embedding processes in the area of contourlet transform to generate watermarked image and the corresponding extracted logo image with high accuracy.In fact,the motivation of the approach is that the suggested complexity can be of novelty,which consists of the contourlet representation,the embedding and the corresponding de-embedding modules and the performance monitoring including an analysis of the watermarked image as well as the extracted logo image.There is also a scrambling module that is working in association with levels-directions decomposition in contourlet embedding mechanism,while a decision maker system is designed to deal with the appropriate number of sub-bands to be embedded in the presence of a series of simulated attacks.The required performance is tangibly considered through an integration of the peak signal-to-noise ratio and the structural similarity indices that are related to watermarked image.And the bit error rate and the normal correlation are considered that are related to the extracted logo analysis,as well.Subsequently,the outcomes are fully analyzed to be competitive with respect to the potential techniques in the image colour models including hue or tint in terms of their shade,saturation or amount of gray and their brightness via value or luminance and also hue,saturation and intensity representations,as long as the performance of the whole of channels are concentrated to be presented.The performance monitoring outcomes indicate that the proposed framework is of significance to be verified.