Robust and Semi-fragile Watermarking Techniques for Image Content Protection

نویسندگان

  • Xi Zhao
  • Steve Schneider
چکیده

......................................................................................................................... 2 Acknowledgements ........................................................................................................ 3 1.0 Introduction .............................................................................................................. 4 1.1 Aims and Objectives ............................................................................................ 6 1.2 Contributions ........................................................................................................ 6 1.3 Structure of the Report ......................................................................................... 7 2.0 Literature Review ..................................................................................................... 8 2.1 Robust Watermarking .......................................................................................... 8 2.1.1 Block Based Robust Watermarking .............................................................. 9 2.1.2 Non-block Based Robust Watermarking .................................................... 10 2.2 Semi-fragile Watermarking................................................................................ 12 2.2.1 Block Based Semi-fragile Watermarking ................................................... 13 2.2.2 Non-block Based Semi-fragile Watermarking ............................................ 13 2.3 Limitation of Semi-fragile Watermarking ......................................................... 14 2.4 Summary ............................................................................................................ 16 3.0 Proposed Robust Watermarking Algorithm ........................................................... 17 3.1 Wavelet-based Contourlet Transform (WBCT) ................................................. 17 3.2 Coefficient Relations with JPEG Compression of Original Images .................. 18 3.3 Watermark Embedding Process ......................................................................... 19 3.4 Watermark Detection Process ............................................................................ 20 3.5 Experimental Results ......................................................................................... 20 3.6 Summary ............................................................................................................ 25 4.0 Proposed Semi-fragile Watermarking Algorithms ................................................ 26 4.1 Proposed SLT Block Based Semi-fragile Watermarking Algorithm................. 26 4.1.1 Slant Transform .......................................................................................... 26 4.1.2 Watermark Embedding Process .................................................................. 27 4.1.3 Watermark Detection Process ..................................................................... 27 4.1.4 Watermarked Image Authentication ........................................................... 28 4.1.5 Experimental Results .................................................................................. 29 4.2 Proposed WBCT Non-block Based Semi-fragile Watermarking Algorithm..... 33 4.2.1 Coefficient Differences Analysis ................................................................ 33 4.2.2 Watermark Embedding Process .................................................................. 34 4.2.3 Watermark Detection Process ..................................................................... 35 4.2.4 Watermarked Image Authentication Process .............................................. 36 4.2.5 Experimental Results .................................................................................. 37 4.3 Summary ............................................................................................................ 42 5.0 Benford’s Law for Semi-fragile Watermarking ..................................................... 43 5.1 Background of Benford’s Law ........................................................................... 43 5.2 Benford’s Law, Generalised Benford’s Law vs. Watermarked Images ............ 44 5.3 The Improved Authentication Method ............................................................... 48 5.4 Experimental Results ......................................................................................... 50 5.5 Summary ............................................................................................................ 52 6.0 Conclusion and Future work .................................................................................. 53 7.0 Future Plan ............................................................................................................. 55 References .................................................................................................................... 56

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images

With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people’s attention. The fragile watermark for integrity authentication of image data and protection of copyright has become a hotspot. In the storage and transmission process, image data must be compressed to ...

متن کامل

Digital Image Authentication: A Review

Digital image authentication refers to all the techniques performing anti-falsification, digital image copyright protection, or access control. A large number of DIA techniques have been developed to authenticate digital images, including cryptography-based digital image authentication (CBDIA) techniques and data-hiding-based digital image authentication (DHBDIA) techniques. This paper not only...

متن کامل

FRAGILE and SEMI - FRAGILE WATERMARKING TECHNIQUES for IMAGE AUTHENTICATION

Techniques to establish the authenticity and integrity of digital images are becoming increasly essential over the Intermet. The authentication algorithm should distinguish malicious manipulations from the original watermarked image[1]. Fragile watermarking is recomended for a very sensible image authentication scheme, able to localize the slightest changes occured to the marked image. The frag...

متن کامل

Semi Fragile Watermark with Self Authentication and Self Recovery

Robust watermarks are suitable for copyright protection in a DRM scenario. On the other hand, fragile watermarks are good for tamper detection applications. Semi fragile watermarks possess some properties of both robust and fragile watermarks at a moderate level. The need for semi fragile watermarks arises from the requirements of content authentication where the watermark must highlight malici...

متن کامل

A Survey on Digital Watermarking Techniques

A digital watermark is a kind of marker covertly embedded in a noise tolerant signal such as audio or image data. It is typically used to identify ownership of the copyright of such signal. "Watermarking" is the process of hiding digital information in a carrier signal. Embedding a digital signal (audio, video or image) with information which cannot be removed easily is called digital watermark...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009