Robust and Semi-fragile Watermarking Techniques for Image Content Protection
نویسندگان
چکیده
......................................................................................................................... 2 Acknowledgements ........................................................................................................ 3 1.0 Introduction .............................................................................................................. 4 1.1 Aims and Objectives ............................................................................................ 6 1.2 Contributions ........................................................................................................ 6 1.3 Structure of the Report ......................................................................................... 7 2.0 Literature Review ..................................................................................................... 8 2.1 Robust Watermarking .......................................................................................... 8 2.1.1 Block Based Robust Watermarking .............................................................. 9 2.1.2 Non-block Based Robust Watermarking .................................................... 10 2.2 Semi-fragile Watermarking................................................................................ 12 2.2.1 Block Based Semi-fragile Watermarking ................................................... 13 2.2.2 Non-block Based Semi-fragile Watermarking ............................................ 13 2.3 Limitation of Semi-fragile Watermarking ......................................................... 14 2.4 Summary ............................................................................................................ 16 3.0 Proposed Robust Watermarking Algorithm ........................................................... 17 3.1 Wavelet-based Contourlet Transform (WBCT) ................................................. 17 3.2 Coefficient Relations with JPEG Compression of Original Images .................. 18 3.3 Watermark Embedding Process ......................................................................... 19 3.4 Watermark Detection Process ............................................................................ 20 3.5 Experimental Results ......................................................................................... 20 3.6 Summary ............................................................................................................ 25 4.0 Proposed Semi-fragile Watermarking Algorithms ................................................ 26 4.1 Proposed SLT Block Based Semi-fragile Watermarking Algorithm................. 26 4.1.1 Slant Transform .......................................................................................... 26 4.1.2 Watermark Embedding Process .................................................................. 27 4.1.3 Watermark Detection Process ..................................................................... 27 4.1.4 Watermarked Image Authentication ........................................................... 28 4.1.5 Experimental Results .................................................................................. 29 4.2 Proposed WBCT Non-block Based Semi-fragile Watermarking Algorithm..... 33 4.2.1 Coefficient Differences Analysis ................................................................ 33 4.2.2 Watermark Embedding Process .................................................................. 34 4.2.3 Watermark Detection Process ..................................................................... 35 4.2.4 Watermarked Image Authentication Process .............................................. 36 4.2.5 Experimental Results .................................................................................. 37 4.3 Summary ............................................................................................................ 42 5.0 Benford’s Law for Semi-fragile Watermarking ..................................................... 43 5.1 Background of Benford’s Law ........................................................................... 43 5.2 Benford’s Law, Generalised Benford’s Law vs. Watermarked Images ............ 44 5.3 The Improved Authentication Method ............................................................... 48 5.4 Experimental Results ......................................................................................... 50 5.5 Summary ............................................................................................................ 52 6.0 Conclusion and Future work .................................................................................. 53 7.0 Future Plan ............................................................................................................. 55 References .................................................................................................................... 56
منابع مشابه
Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images
With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people’s attention. The fragile watermark for integrity authentication of image data and protection of copyright has become a hotspot. In the storage and transmission process, image data must be compressed to ...
متن کاملDigital Image Authentication: A Review
Digital image authentication refers to all the techniques performing anti-falsification, digital image copyright protection, or access control. A large number of DIA techniques have been developed to authenticate digital images, including cryptography-based digital image authentication (CBDIA) techniques and data-hiding-based digital image authentication (DHBDIA) techniques. This paper not only...
متن کاملFRAGILE and SEMI - FRAGILE WATERMARKING TECHNIQUES for IMAGE AUTHENTICATION
Techniques to establish the authenticity and integrity of digital images are becoming increasly essential over the Intermet. The authentication algorithm should distinguish malicious manipulations from the original watermarked image[1]. Fragile watermarking is recomended for a very sensible image authentication scheme, able to localize the slightest changes occured to the marked image. The frag...
متن کاملSemi Fragile Watermark with Self Authentication and Self Recovery
Robust watermarks are suitable for copyright protection in a DRM scenario. On the other hand, fragile watermarks are good for tamper detection applications. Semi fragile watermarks possess some properties of both robust and fragile watermarks at a moderate level. The need for semi fragile watermarks arises from the requirements of content authentication where the watermark must highlight malici...
متن کاملA Survey on Digital Watermarking Techniques
A digital watermark is a kind of marker covertly embedded in a noise tolerant signal such as audio or image data. It is typically used to identify ownership of the copyright of such signal. "Watermarking" is the process of hiding digital information in a carrier signal. Embedding a digital signal (audio, video or image) with information which cannot be removed easily is called digital watermark...
متن کامل