Error correcting codes for robust color wavelet watermarking
نویسندگان
چکیده
This article details the conception, design, development and analysis of invisible, blind and robust color image watermarking algorithms based on the wavelet transform. Using error correcting codes, the watermarking algorithms are designed to be robust against intentional or unintentional attacks such as JPEG compression, additive white Gaussian noise, low pass filter and color attacks (hue, saturation and brightness modifications). Considering the watermarking channel characterized by these attacks, repetition, Hamming, Bose Chaudhuri Hocquenghem and Reed-Solomon codes are used in order to improve the robustness using different modes and appropriate decoding algorithms. The article compares the efficiency of different type of codes against different type of attacks. To the best of our knowledge this is the first time that the effect of error-correcting codes against different attacks are detailed in a watermarking context in such a precise way: describing and comparing the effect of different classes of codes against different type of attacks. This article clearly shows that list decoding of Reed-Solomon codes using the algorithm of Sudan exhibits good performance against hue and saturation attacks. The use of error correcting codes in a concatenation mode allows the non-binary block codes to show good performance against JPEG compression, noise and brightness attacks.
منابع مشابه
WaveMark: Digital Image Watermarking Using Daubechies' Wavelets and Error Correcting Coding
As more and more digital images are distributed on-line via the Internet and World-Wide Web, many copyright owners are concerned about protecting the copyright of digital images. This paper describes WaveMark, a novel wavelet-based multiresolution digital watermarking system for color images. The algorithm in WaveMark uses discrete wavelet transforms and error-correcting coding schemes to provi...
متن کاملDigital Video Watermarking Techniques for Secure Multimedia Creation and Delivery
We have seen an explosion of data exchange in the Internet and the extensive use of digital media. Consequently, digital data owners can quickly and massively transfer multimedia documents across the Internet. This leads to wide interest in multimedia security and multimedia copyright protection. We propose a digital video watermarking algorithm, in which a novel DWTbased blind digital video wa...
متن کاملSecurity Evaluation of DWT Based Watermarking Schemes and its Improvement Using RS Coding
In this study, information theory is used to provide both theoretical and practical analysis of security offered by watermarking and data hiding techniques based on wavelet transform. In this context, security level is defined as the equivocation of the secret parameters. On the theoretical side, the measure of security is estimated by means of information theory tools for all possible attacks....
متن کاملMultidimensional Enhanced Hadamard Error Correcting Code In Comparison with Reed-Solomon Code in Video-Watermarking Applications
Watermarking technology.play a central role in the digital right management for multimedia data. Especially a video watermarking is a real challenge, because of very high compression ratio (about 1:200). Normally the watermarks can barely survive such massive attacks, despite very sophisticated embedding strategies. It can only work with a sufficient error correcting code method. In this paper,...
متن کاملA DWT-Based Digital Video Watermarking Scheme with Error Correcting Code
In this paper, a digital video watermarking algorithm is proposed. We present a novel DWT-based blind digital video watermarking scheme with scrambled watermark and error correcting code. Our scheme embeds different parts of a single watermark into different scenes of a video under the wavelet domain. To increase robustness of the scheme, the watermark is refined by the error correcting code, w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- EURASIP J. Information Security
دوره 2013 شماره
صفحات -
تاریخ انتشار 2013