A VQ-DCT Scheme for Grayscale Image Watermarking

نویسندگان

  • A. K. Pal
  • S. Das
  • G. P. Biswas
  • S. Mukhopadhyay
  • Chun-Shien Lu
  • N. Nikolaidis
  • I. Pitas
  • M. U. Celik
  • G. Sharma
  • A. M. Tekalp
  • E. Saber
  • Mauro Barni
  • Franco Bartolini
  • Vito Cappellini
  • Wai C. Chu
  • Jiang-Lung Liu
  • Der-Chyuan Lou
  • Ming-Chang Chang
  • Ali Al-Haj
  • Rafael C. Gonzalez
  • Richard E. Woods
  • Chin-Chen Chang
  • Cheng-Hsing Yang
  • Chi-Yao Weng
  • Hung-Min Sun
چکیده

In this paper, a hybrid watermarking scheme, that employs both DCT and VQ, has been presented. The authors have proposed a modification of the conventional LBG algorithm in this paper for designing the codebook to be used subsequently for compressing the image employing VQ. The watermark/logo is embedded in the constructed codebook after suitable DCT operations. The compression and reconstruction of the cover image employs the modified embedded codebook. The indirect mechanism of embedding the watermark and the hybrid combination of VQ and DCT make the entire watermarking scheme reasonably robust with respect to various types of common attacks which include intensity modification in real domain, modification in transformed domain namely JPEG compression etc. The method has been implemented and tested on a number of example images. We have also tested the robustness of authenticating capability of the scheme both qualitatively and quantitatively for various types of attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Watermarking Scheme Based on Multiple Chaotic Maps

a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...

متن کامل

Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling

This paper investigates the multiplicative spread spectrum watermarking method for the image. The information bit is spreaded into middle-frequency Discrete Cosine Transform (DCT) coefficients of each block of an image using a generated pseudo-random sequence. Unlike the conventional signal modeling, we suppose that both signal and noise are distributed with Laplacian distribution, because the ...

متن کامل

A Grayscale Image Steganography Based upon Discrete Cosine Transformation

In this paper, a simple image steganography for secure communication is proposed. Our scheme is based on the discrete cosine transformation (DCT) technique. By using DCT, the most signifi cant information of each DCT secret block can be embedded into the non-signifi cant parts of each DCT cover block. To improve the image quality of the cover image, a quantization factor is used. According to o...

متن کامل

Novel Grayscale Image Watermarking Using Extreme Learning Machine

A newly developed single Layer Feed Forward Network based Extreme Learning Machine (ELM) is well known for its fast learning. It has been used for different application including those in the domain of image processing. However very few researchers are using it for image watermarking based application. In this paper, a novel and robust image watermarking scheme is proposed using Extreme Learnin...

متن کامل

A Robust Watermarking Approach using DCT-DWT

This paper presents a robust watermarking technique for color and grayscale image. The proposed method involves many techniques to conform a secure and robust watermarking. In the proposed technique the watermark is embedded in 3 level of DWT (Discrete Wavelet Transform) and before embedding the watermark image is passed through chaotic encryption process for its security, other important thing...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010