Loading...
Search for: image-watermarking
0.011 seconds
Total 41 records

    Extracting Appropriate Features for Zero Watermarking of Similar Images for Ownership Protection

    , M.Sc. Thesis Sharif University of Technology Ehsaee, Shahryar (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    Digital watermarking is an efficacious technique to protect the copyright and ownership of digital information. Traditional image watermarking algorithms embed a logo in the image that could reduce its visual quality. A new approach in watermarking called zero watermarking doesn’t need to embed a logo in the image. In this algorithm we find a feature from the main image and combine it with a logo to obtain a key. This key is securely kept by a trusted authority. In this thesis we show that we can increase the robustness of digital zero watermarking by a new counter detection method in comparison to Canny Edge detection and morphological dilatation that is mostly used by related works.... 

    New Generation of On-purpose Attacks for Evaluating Digital Image Watermarking Methods by Preserving the Image Quality

    , Ph.D. Dissertation Sharif University of Technology Taherinia, Amir Hossein (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    Up to now, compared with the comprehensive research for developing robust watermarking algorithms, no equal attention has been devoted to the proposition of benchmarks tailored to assess the watermark robustness. In addition, almost all the state of the art benchmarks only integrate a number of common image processing operations like geometrical transformations to remove watermarks. However, the quality of the processed image is often too degraded to permit further commercial exploitation. Moreover, to the best of our knowledge, the design of these tools does not take into account the statistical properties of the images and watermarks in the design of attacks. In spite of the significant... 

    Improving the Robustness of Image Watermarking for Publicly Copyright-Proving

    , M.Sc. Thesis Sharif University of Technology Shakeri, Mahsa (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    The advent of Internet and advancement of computer technologies have enabled convenient and fast exchange of multimedia so the illegal reproduction and modification of digital media has become increasingly serious. Hence, how to protect the intellectual property rights of digital multimedia is an imperative issue. Digital watermarking is one of the solutions to prevent unauthorized use of images. Traditional digital watermarking techniques embed a watermark such as logo, trademark, or copyright information into a host image so that it is not perceptible. These techniques, depending on the amount of embedded data, will distort the content of host image which results in quality degradation of... 

    Improving Watermarking Robustness Against Print and Scan Attack

    , M.Sc. Thesis Sharif University of Technology Amiri, Hamid (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    The advent of digital age with the Internet revolution has made it extremely convenient for users to access, create, process, copy, or exchange multimedia data. This has created an urgent need for protecting intellectual property in both the digital and the print media. Digital watermarking is a suitable way to do this. In this technology, some hidden information called watermark are embedded into host signal and extracted to confirm copyright protection. However, the watermark should be embedded in the host in such a way that the attacks could not destroy it. Print and scan is a popular attack that is applied on digital images. This attack has complex nature and can be implemented easily.... 

    Image Steganalysis of Low Rate Embedding in Spatial Domain

    , Ph.D. Dissertation Sharif University of Technology Farhat, Farshid (Author) ; Ghaemmaghami, Shahrokh (Supervisor) ; Aref, Mohammad Reza (Co-Advisor)
    Abstract
    LSB embedding in spatial domain with very low rate can be easily performed and its detection in spite of many researches is very hard, while BOSS competition has been held to break an adaptive embedding algorithm with low rate. Thus, proposing powerful steganalyzer of very low rate in spatial domain is highly requested. In this thesis it has been tried to present some algorithms to detect secret message with very low rate in spatial domain using eigenvalues analysis and relative auto-correlation of image.First approach is based on the analysis of the eigenvalues of the cover correlation matrix that we used for the first time. Image partitioning, correlation function computation,... 

    Image Steganalysis Based on Feature Optimization Using Evolutionary Algorithms

    , M.Sc. Thesis Sharif University of Technology Karandish, Mohammad Ali (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    Image steganalysis is the technique and art of detecting covert communication via images.Reduction of features dimentionality is an important issue according to accuracy and time complexity. In this thesis, GA (genetic algorithm) and PSO (Particle Swarm Optimization) are used to reduce the dimentionality of JRM, a recently proposed feature set containing 11255 features which looks high dimentional compared to other feature sets which has been reduced by evolutionary algorithms so far. So, inspite of other works done using evolutionary algorithms in this field, we use the class sepearability criterion as fitness function instead of the accuracy of the classifier. Investigating these features,... 

    Steganalysis of Incomplete Image Using Random Fields

    , M.Sc. Thesis Sharif University of Technology Ahmadi, Aria (Author) ; Ghaemmaghami, Shahrokh (Supervisor) ; Gholampour, Iman (Co-Advisor)
    Abstract
    Widespread transfer of digital files over networks provides a hidden channel to transfer secret messages. Current steganalysis schemes need to work on a complete image for doing the detection job that starts when the image is entirely transferred, so are often restricted to an offline process. This restriction is serious when existence of the hidden message carriers on the network is shorter than the time required for the detection process. In this thesis, we propose a structurally fast detection method to detect the data hidden in an image passing through network. We use two of most powerful steganalysis algorithms for steganalysis of images that proposed by 1) Fridrich and Pevny and 2) Liu... 

    Image Steganography Resistant Against Higher Order statistical Attacks

    , M.Sc. Thesis Sharif University of Technology Mohsenzadeh, Yalda (Author) ; Ghaemmaghami, Shahrokh (Supervisor) ; Mohajeri, Javad (Supervisor)
    Abstract
    A major goal in image steganography is to preserve the statistical properties of the host image to thwart statistical based steganalysis. However, most steganography methods introduce some distortions into the host signal’s statistical properties that have been used, as a certain indication of manipulation of the signal, by steganalysis algorithms. In order to overcome such a methodical vulnerability, a new generation of data hiding algorithms has been proposed in the literature to preserve histogram of the host signal. In this thesis we present a novel image steganographic technique to preserve one-dimensional and two-dimensional histograms of the host image. Experimental results show that... 

    Some Applications of Singular Values Decomposition in Image Processing

    , M.Sc. Thesis Sharif University of Technology Ghobadi Ghadikalaei, Vahideh (Author) ; Mahdavi Amiri, Nezamoddin (Supervisor)
    Abstract
    The field of digital image processing refers to processing digital images by means of a digital computer. One of the principal applications used in digital image processing is image compression. Image compression is the problem of reducing the amount of data required to represent a digital image. The basis of the reduction process is the removal of redundant data. One of the other principal applications of image processing is noise reduction (filtering) of images corrupted with additive noise. Filtering techniques are oriented toward modeling the degradation and applying the inverse process in order to recover the original image. Image watermarking is another application of image processing.... 

    Robust watermarking against print and scan attack through efficient modeling algorithm

    , Article Signal Processing: Image Communication ; Vol. 29, issue. 10 , November , 2014 , p. 1181-1196 ; ISSN: 09235965 Amiri, S. H ; Jamzad, M ; Sharif University of Technology
    Abstract
    This article proposes a blind discrete wavelet transform-discrete cosine transform (DWT-DCT) composite watermarking scheme that is robust against print and scan distortions. First, two-dimensional DWT is applied to the original image to obtain the mid-frequency subbands. Then, a one-dimensional DCT is applied to the selected mid-frequency subbands to extract the final coefficients for embedding the watermark. To specify watermarking parameters, we utilize a Genetic Algorithm to achieve a predefined image quality after watermark insertion. Suitable locations for watermarking are determined by analyzing the effect of a modeling algorithm. This model simulates noise and nonlinear attacks in... 

    Improving the performance of spatial domain image watermarking with high boost filter

    , Article Indian Journal of Science and Technology ; Vol. 7, issue. 12 , Dec , 2014 , p. 2133-2139 Alirezanejad, M ; Amirgholipour, S ; Safari, V ; Aslani, S ; Arab, M ; Sharif University of Technology
    Abstract
    Authenticating in transaction of digital media becomes an active research field now a day. That is emerging due to the illegal use of digital media and hacking by unauthorized users. Spatial domain based watermarking methods are one of the authentication methods. These methods are not generally robust against intentional or unintentional changes in the images. In this paper, a new method is proposed to recover watermark more precisely in the spatial domain watermarking method. A high-boost filtering is utilized before executing watermark extraction procedure. The watermark information is magnified by preforming this filter. Effectiveness of this filter is proved by several experiment.... 

    Minimisation of image watermarking side effects through subjective optimisation

    , Article IET Image Processing ; Volume 7, Issue 8 , 2013 , Pages 733-741 ; ISSN: 17519659 Golestani, H. B ; Ghanbari, M ; Sharif University of Technology
    2013
    Abstract
    This study investigates the use of structural similarity index (SSIM) on the minimised side effect to image watermarking. For the fast implementation and more compatibility with the standard discrete cosine transform (DCT)-based codecs, watermark insertion is carried out on the DCT coefficients and hence an SSIM model for DCT-based watermarking is developed. For faster implementation, the SSIM index is maximised over independent 4 × 4 non-overlapped blocks, but the disparity between the adjacent blocks reduces the overall image quality. This problem is resolved through optimisation of overlapped blocks, but, the higher image quality is achieved at a cost of high computational complexity. To... 

    A robust zero-watermarking scheme using Canny edge detector

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 5, Issue 1 , 2013 , Pages 25-44 ; 1751911X (ISSN) Shakeri, M ; Jamzad, M ; Sharif University of Technology
    2013
    Abstract
    By expansion of digital multimedia and networking technology, the problem of ownership protection has become increasingly important. Digital watermarking is an efficient way for copyright protection of digital images. Traditional watermarking techniques degrade the quality of host image by embedding a watermark logo. Facing this problem, a new watermarking approach called zero-watermarking has been proposed. In zero-watermarking methods, the watermark does not require to be embedded into the protected image but it uses both the watermark and the protected image to generate a verification map which is registered to a trusted authority for further protection. In this paper we propose a robust... 

    A two-step watermarking attack using long-range correlation image restoration

    , Article Security and Communication Networks ; Volume 5, Issue 6 , AUG , 2012 , Pages 625-635 ; 19390122 (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2012
    Abstract
    This paper presents an efficient scheme for blind watermark attacking using the concept of matching of the long-range data. The main idea of the proposed attack is to add plenty of noise to the watermarked image and then try to restore an unwatermarked copy of the noisy image. The aim is to destroy the watermark information without accessing the parameters used during the watermark embedding process. So, it allows our approach to be completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. Experimental results show the proposed algorithm's superiority over several other traditional watermarking... 

    A content-based digital image watermarking algorithm robust against JPEG compression

    , Article IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2011, 14 December 2011 through 17 December 2011 ; Dec , 2011 , Pages 432-437 ; 9781467307529 (ISBN) Najafi, A ; Siahkoohi, A ; Shamsollahi, M. B ; Sharif University of Technology
    Abstract
    Watermarking (imperceptible insertion of data into the host image or soundtracks) has attracted many research interests in the recent decade. The aim of this correspondence is to introduce a none-blind, content-based method for image watermarking. It employs properties of Human Visual System (HVS) and is capable of embedding a high-energy watermark (consequently robust against lossy compressions and other kinds of attacks) while prevents perceptible degradation in the host image. To modulate the binary coded watermark on a spread-spectrum noise, the introduced algorithm is followed by spread-spectrum watermarking. The algorithm was simulated and experimental results represent magnificent... 

    EWA: An exemplar-based watermarking attack

    , Article 2011 International Conference on Information Technology and Multimedia: "Ubiquitous ICT for Sustainable and Green Living", ICIM 2011, 14 November 2011 through 16 November 2011 ; Nov , 2011 , Page(s): 1 - 5 ; 9781457709890 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    In this paper, we used image inpainting as a means for reconstruction of small damaged portions of a watermarked image so that the hidden watermark is not detectable afterwards. Our new watermarking attack algorithm extends the exemplar-based inpainting method, and then we apply it to intended noisy watermarked images to alter the watermark detection process. Our approach is completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. The average PSNR/SSIM of the watermarked image after applying the proposed attack is more than 35/0.98 and the average NC for extracted watermark is lowers than 0.5, so... 

    Watermarking based on independent component analysis in spatial domain

    , Article Proceedings - 2011 UKSim 13th International Conference on Modelling and Simulation, UKSim 2011, 30 March 2011 through 1 April 2011, Cambridge ; 2011 , Pages 299-303 ; 9780769543765 (ISBN) Hajisami, A ; Rahmati, A ; Babaie Zadeh, M ; Sharif University of Technology
    2011
    Abstract
    This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, embedding is carried out in cumulative form in spatial domain and ICA is used for watermark extraction. For extraction there is no need to access the original image or the watermark, and extraction is carried out only with two watermarked images. Experimental results show that the new method has better quality than famous methods [1], [2], [3] in spatial or frequency domain and is robust against various attacks. Noise addition, resizing, low pass filtering, multiple marks, gray-scale reduction, rotation, JPEG compression, and cropping are some... 

    Blind dewatermarking method based on wavelet transform

    , Article Optical Engineering ; Volume 50, Issue 5 , 2011 ; 00913286 (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    Along with the improvement of image watermarking techniques, the necessity for effectively and comprehensively evaluating various algorithms becomes imperative. In this paper, we first propose a new categorization that fits for most of the existing watermarking algorithms that work in the wavelet domain. Then an adaptive watermarking attack for evaluating the robustness of watermarking schemes that are based on the proposed categorization is presented. This attack determines the flat regions, edges, and textures of the watermarked image and based on known features of each region the proposed attack tries to destroy the watermark information. This is done by separately manipulating the... 

    Robust image watermarking using independent component analysis

    , Article Proceedings - 3rd International Symposium on Information Processing, ISIP 2010, 12 November 2010 through 14 November 2010, Qingdao ; 2010 , Pages 363-367 ; 9780769542614 (ISBN) Hajisami, A ; Ghaemmaghami, S ; Sharif University of Technology
    2010
    Abstract
    This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, we divide the original image into blocks and use the ICA to project the image into a basis with its components as statistically independent as possible. The data embedding is carried out in cumulative form in the ICA basis and also the ICA is used for watermark extraction. The extraction process could be either non-blind, through a straightforward procedure, or blind, via a tricky method we propose. Experimental results show that the new method outperforms some well-known image watermarking methods [1], [2], [3] in spatial or frequency domain and... 

    A contourlet-based image watermarking scheme with high resistance to removal and geometrical attacks

    , Article Eurasip Journal on Advances in Signal Processing ; Volume 2010 , June , 2010 ; 16876172 (ISSN) Khalighi, S ; Tirdad, P ; Rabiee, H. R ; Sharif University of Technology
    2010
    Abstract
    We propose a new nonblind multiresolution watermarking method for still images based on the contourlet transform (CT). In our approach, the watermark is a grayscale image which is embedded into the highest frequency subband of the host image in its contourlet domain. We demonstrate that in comparison to other methods, this method enables us to embed more amounts of data into the directional subbands of the host image without degrading its perceptibility. The experimental results show robustness against several common watermarking attacks such as compression, adding noise, filtering, and geometrical transformations. Since the proposed approach can embed considerable payload, while providing...