Blind Watermarking Scheme for Digital Images

نویسندگان

  • K. Yogalakshmi
  • R. Kanchana
چکیده

In modern times, the rapid growth of the Internet has made copyright protection of digital contents a critical issue. A Digital Rights Management (DRM) system is aimed at protecting the high-value digital assets and controlling the distribution and utilization of those digital assets. Watermarking technologies are being regarded as a vital mean to proffer copyright protection of digital images. Digital watermarking hides, in digital images, the information necessary for ownership identity to offer copyright protection. This paper proposes an innovative invisible and blind watermarking scheme for copyright protection of digital images with the purpose of defending against digital piracy. In the proposed watermarking scheme, a binary watermark image is invisibly embedded into the host image for achieving copyright protection. In watermark embedding, every pixel of the watermark image is embedded into the individual blocks of the host image sized 2x2. (ii) n-level RIVC scheme, the content of an image S is designated to multiple regions associated with n secret levels, and encoded to n+1 shares with the following features: (a) each share cannot obtain any of the secrets in S, (b) any t(2 ≤t≤n+1)shares can be used to reveal t-1 levels of secrets, (c) the number and locations of not-yetrevealed secrets are unknown to users, (d) all secrets in S can be disclosed when all of the n+1 shares are available, and (e) the secrets are recognized by visually inspecting correctly stacked shares without computation. The efficiency of the proposed watermarking scheme has been demonstrated via the experimental results

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Watermarking Scheme Based on Multiple Chaotic Maps

a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...

متن کامل

A Novel Invisible and Blind Watermarking Scheme For Copyright Protection of Digital Images

Nowadays, the issue of protecting copyrights of digital contents has become very much critical owing to the swift growth of the Internet. Protecting the high-value digital assets and controlling the distribution and usage of those digital assets are the tasks of the Digital Rights Management (DRM) system. Watermarking technologies are being looked upon as promising means to safe guard the copyr...

متن کامل

A Modified Digital Image Watermarking Scheme Based on Nonnegative Matrix Factorization

This paper presents a modified digital image watermarking method based on nonnegative matrix factorization. Firstly, host image is factorized to the product of three nonnegative matrices. Then, the centric matrix is transferred to discrete cosine transform domain. Watermark is embedded in low frequency band of this matrix and next, the reverse of the transform is computed. Finally, watermarked ...

متن کامل

A Modified Digital Image Watermarking Scheme Based on Nonnegative Matrix Factorization

This paper presents a modified digital image watermarking method based on nonnegative matrix factorization. Firstly, host image is factorized to the product of three nonnegative matrices. Then, the centric matrix is transferred to discrete cosine transform domain. Watermark is embedded in low frequency band of this matrix and next, the reverse of the transform is computed. Finally, watermarked ...

متن کامل

A Blind Watermarking Scheme for Tamper Detection in Digital Images

The paper proposes a method for tamper proofing digital images using the technique of digital watermarking. Many a times the published images are subject to tampering to an extent that the facts conveyed in the original image are distorted. The mechanism presented here describes a method for detecting the regions in image that were subject to illegal modifications. The method also can detect th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011