A blind image watermarking using multiresolution visibility map

نویسندگان

  • Marie Luong
  • Quoc Bao Do
  • Azeddine Beghdadi
چکیده

A perceptual pyramid watermarking method is proposed. The key idea is to use the contrast sensitivity of the human visual system (HVS) to determine “invisible” regions where watermark energy can be adjusted providing an invisible and robust watermark. These invisibles regions are obtained by computing a “visibility map” at each level of the Gaussian pyramid (GP). The watermark is weighted by the local contrast and a global scaling factor. The embedding process is performed bymodifying the values in some levels of the Laplacian Pyramid (LP) using the spread spectrum technique. Afterwards, the watermarked image can be constructed from the levels of the LP. For watermark detection, a blind detection scheme using the threshold-correlation based technique is proposed. Finally, the performances of the watermarking method are evaluated in terms of invisibility and robustness using some quality metrics and different attacks of Stirmark such as Gaussian noise, low-pass filtering, Jpeg compression and cropping. This evaluation is performed for the choice of some parameters of the watermarking system depending on performances such as invisibility and robustness. The design of our watermarking technique can finally be formulated as an optimisation problem where the objective is to guarantee a trade-off between invisibility and robustness.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Watermarking Scheme Based on Multiple Chaotic Maps

a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...

متن کامل

Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...

متن کامل

Wavelet Based Watermarking Detection Using Multiresolution Image Registration

Due to the lack of invariant property of discrete wavelet transform (DWT), the DWT based watermarking schemes are relatively vulnerable to the watermarking attacks such as geometric variations (i.e., rotation and translation etc.). To improve the reliability of the DWT based watermark detection, this paper introduces the new multiresolution based image registration method that is used to recove...

متن کامل

Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking

Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...

متن کامل

A Novel Blind Watermarking of ECG Signals on Medical Images Using EZW Algorithm

Introduction:In this study, ECG signals have been embedded into medical images to create a novel blind watermarking method. The embedding is done when the original image is compressed using the EZW algorithm. The extraction process is performed at the decompression time of the watermarked image. Materials and Methods: The multi-resolution watermarking with a secret key algorithm developed in th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Global Optimization

دوره 49  شماره 

صفحات  -

تاریخ انتشار 2011