Loading...
Search for: image-watermarking
0.012 seconds
Total 41 records

    Framework for robust blind image watermarking based on classification of attacks

    , Article Multimedia Tools and Applications ; 2016 , Pages 1-21 ; 13807501 (ISSN) Heidari, M ; Samavi, S ; Soroushmehr, S. M. R ; Shirani, S ; Karimi, N ; Najarian, K ; Sharif University of Technology
    Springer New York LLC  2016
    Abstract
    With the widespread internet usage, digital contents are easily distributed throughout the world. To eliminate concerns of producers and owners of digital contents, watermarking techniques are extensively being used. Robustness against intentional and unintentional attacks is a major quality of watermarking systems. Since different attacks tend to target different parts of the frequency spectrum, in this paper we propose a framework for blind watermarking which determines the type of attack that the image has gone through before extracting the watermark. Within this framework, we propose an attack classification method to identify the region of the frequency spectrum that is less damaged.... 

    A hybrid DCT-SVD based image watermarking algorithm

    , Article 24th Iranian Conference on Electrical Engineering, ICEE 2016, 10 May 2016 through 12 May 2016 ; 2016 , Pages 838-843 ; 9781467387897 (ISBN) Heidari, M ; Karimi, N ; Samavi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Everyday, people share their digital media on the virtual networks; therefore, protecting them against piracy is worthy of consideration. Digital watermarking is a method to achieve this goal. In this paper, we propose a watermarking method in Discrete Cosine Transform (DCT) domain. For this purpose, DCT coefficients of the whole image are calculated. It helps to present a system without blockiness effects. Then, singular values of the watermark image are added to the low frequency DCT coefficients of cover image that are located on the main diagonal. We use scaling factors for watermark embedding to improve imperceptibility of the watermark. A vector of fixed elements, which is calculated... 

    Minimisation of image watermarking side effects through subjective optimisation

    , Article IET Image Processing ; Volume 7, Issue 8 , 2013 , Pages 733-741 ; ISSN: 17519659 Golestani, H. B ; Ghanbari, M ; Sharif University of Technology
    2013
    Abstract
    This study investigates the use of structural similarity index (SSIM) on the minimised side effect to image watermarking. For the fast implementation and more compatibility with the standard discrete cosine transform (DCT)-based codecs, watermark insertion is carried out on the DCT coefficients and hence an SSIM model for DCT-based watermarking is developed. For faster implementation, the SSIM index is maximised over independent 4 × 4 non-overlapped blocks, but the disparity between the adjacent blocks reduces the overall image quality. This problem is resolved through optimisation of overlapped blocks, but, the higher image quality is achieved at a cost of high computational complexity. To... 

    A robust zero-watermarking scheme using Canny edge detector

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 5, Issue 1 , 2013 , Pages 25-44 ; 1751911X (ISSN) Shakeri, M ; Jamzad, M ; Sharif University of Technology
    2013
    Abstract
    By expansion of digital multimedia and networking technology, the problem of ownership protection has become increasingly important. Digital watermarking is an efficient way for copyright protection of digital images. Traditional watermarking techniques degrade the quality of host image by embedding a watermark logo. Facing this problem, a new watermarking approach called zero-watermarking has been proposed. In zero-watermarking methods, the watermark does not require to be embedded into the protected image but it uses both the watermark and the protected image to generate a verification map which is registered to a trusted authority for further protection. In this paper we propose a robust... 

    A two-step watermarking attack using long-range correlation image restoration

    , Article Security and Communication Networks ; Volume 5, Issue 6 , AUG , 2012 , Pages 625-635 ; 19390122 (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2012
    Abstract
    This paper presents an efficient scheme for blind watermark attacking using the concept of matching of the long-range data. The main idea of the proposed attack is to add plenty of noise to the watermarked image and then try to restore an unwatermarked copy of the noisy image. The aim is to destroy the watermark information without accessing the parameters used during the watermark embedding process. So, it allows our approach to be completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. Experimental results show the proposed algorithm's superiority over several other traditional watermarking... 

    EWA: An exemplar-based watermarking attack

    , Article 2011 International Conference on Information Technology and Multimedia: "Ubiquitous ICT for Sustainable and Green Living", ICIM 2011, 14 November 2011 through 16 November 2011 ; Nov , 2011 , Page(s): 1 - 5 ; 9781457709890 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    In this paper, we used image inpainting as a means for reconstruction of small damaged portions of a watermarked image so that the hidden watermark is not detectable afterwards. Our new watermarking attack algorithm extends the exemplar-based inpainting method, and then we apply it to intended noisy watermarked images to alter the watermark detection process. Our approach is completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. The average PSNR/SSIM of the watermarked image after applying the proposed attack is more than 35/0.98 and the average NC for extracted watermark is lowers than 0.5, so... 

    Watermarking based on independent component analysis in spatial domain

    , Article Proceedings - 2011 UKSim 13th International Conference on Modelling and Simulation, UKSim 2011, 30 March 2011 through 1 April 2011, Cambridge ; 2011 , Pages 299-303 ; 9780769543765 (ISBN) Hajisami, A ; Rahmati, A ; Babaie Zadeh, M ; Sharif University of Technology
    2011
    Abstract
    This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, embedding is carried out in cumulative form in spatial domain and ICA is used for watermark extraction. For extraction there is no need to access the original image or the watermark, and extraction is carried out only with two watermarked images. Experimental results show that the new method has better quality than famous methods [1], [2], [3] in spatial or frequency domain and is robust against various attacks. Noise addition, resizing, low pass filtering, multiple marks, gray-scale reduction, rotation, JPEG compression, and cropping are some... 

    Blind dewatermarking method based on wavelet transform

    , Article Optical Engineering ; Volume 50, Issue 5 , 2011 ; 00913286 (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    Along with the improvement of image watermarking techniques, the necessity for effectively and comprehensively evaluating various algorithms becomes imperative. In this paper, we first propose a new categorization that fits for most of the existing watermarking algorithms that work in the wavelet domain. Then an adaptive watermarking attack for evaluating the robustness of watermarking schemes that are based on the proposed categorization is presented. This attack determines the flat regions, edges, and textures of the watermarked image and based on known features of each region the proposed attack tries to destroy the watermark information. This is done by separately manipulating the... 

    Robust image watermarking using independent component analysis

    , Article Proceedings - 3rd International Symposium on Information Processing, ISIP 2010, 12 November 2010 through 14 November 2010, Qingdao ; 2010 , Pages 363-367 ; 9780769542614 (ISBN) Hajisami, A ; Ghaemmaghami, S ; Sharif University of Technology
    2010
    Abstract
    This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, we divide the original image into blocks and use the ICA to project the image into a basis with its components as statistically independent as possible. The data embedding is carried out in cumulative form in the ICA basis and also the ICA is used for watermark extraction. The extraction process could be either non-blind, through a straightforward procedure, or blind, via a tricky method we propose. Experimental results show that the new method outperforms some well-known image watermarking methods [1], [2], [3] in spatial or frequency domain and... 

    A contourlet-based image watermarking scheme with high resistance to removal and geometrical attacks

    , Article Eurasip Journal on Advances in Signal Processing ; Volume 2010 , June , 2010 ; 16876172 (ISSN) Khalighi, S ; Tirdad, P ; Rabiee, H. R ; Sharif University of Technology
    2010
    Abstract
    We propose a new nonblind multiresolution watermarking method for still images based on the contourlet transform (CT). In our approach, the watermark is a grayscale image which is embedded into the highest frequency subband of the host image in its contourlet domain. We demonstrate that in comparison to other methods, this method enables us to embed more amounts of data into the directional subbands of the host image without degrading its perceptibility. The experimental results show robustness against several common watermarking attacks such as compression, adding noise, filtering, and geometrical transformations. Since the proposed approach can embed considerable payload, while providing... 

    Estimating watermarking capacity in gray scale images based on image complexity

    , Article Eurasip Journal on Advances in Signal Processing ; Volume 2010 , December , 2010 ; 16876172 (ISSN) Yaghmaee, F ; Jamzad, M ; Sharif University of Technology
    2010
    Abstract
    Capacity is one of the most important parameters in image watermarking. Different works have been done on this subject with different assumptions on image and communication channel. However, there is not a global agreement to estimate watermarking capacity. In this paper, we suggest a method to find the capacity of images based on their complexities. We propose a new method to estimate image complexity based on the concept of Region Of Interest (ROI). Our experiments on 2000 images showed that the proposed measure has the best adoption with watermarking capacity in comparison with other complexity measures. In addition, we propose a new method to calculate capacity using proposed image... 

    A new adaptive watermarking attack in wavelet domain

    , Article 2009 International Multimedia, Signal Processing and Communication Technologies, IMPACT 2009, Aligarh, 14 March 2009 through 16 March 2009 ; 2009 , Pages 320-323 ; 9781424436040 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper, we proposed a categorization for most of the existing watermarking algorithms that work in wavelet domain. Then an adaptive watermarking attack for digital images that is based on the proposed categorization is presented. This attack determines the flat regions, edges and textures of the watermarked image and based on known features of each region the proposed attack tries to destroy the watermark information by manipulating the wavelet coefficients of each region separately such that the least visual distortion will be imposed on the attacked image. We have tested the proposed method to attack two recent and robust watermarking methods and the results sound impressive. The... 

    A new watermarking attack based on content-aware image resizing

    , Article 2009 International Multimedia, Signal Processing and Communication Technologies, IMPACT 2009, Aligarh, 14 March 2009 through 16 March 2009 ; 2009 , Pages 177-180 ; 9781424436040 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper, we propose a new method for damaging and destroying robust invisible watermarks using an image resizing technique which is named seam carving. By using this method we are able to resize watermarked images in a content-aware manner so that the synchronization of the embedder and extractor of watermarking system is broken and the watermark detection becomes impossible. In contrast to the available benchmarks like Stirmark, proposed attack does not severely reduce the quality of the watermarked image. Therefore it maintains the commercial value of the watermarked image. We have tested the proposed method to attack 3 recent and robust watermarking methods and the results sound... 

    A robust image watermarking using two level DCT and wavelet packets denoising

    , Article International Conference on Availability, Reliability and Security, ARES 2009, Fukuoka, Fukuoka Prefecture, 16 March 2009 through 19 March 2009 ; 2009 , Pages 150-157 ; 9780769535647 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper we present a blind low frequency watermarking scheme on gray level images, which is based on DCT transform and spread spectrum communications technique. We compute the DCT of non overlapping 8x8 blocks of the host image, then using the DC coefficients of each block we construct a low-resolution approximation image. We apply block based DCT on this approximation image, then a pseudo random noise sequence is added into its high frequencies. For detection, we extract the approximation image from the watermarked image, then the same pseudo random noise sequence is generated, and its correlation is computed with high frequencies of the watermarked approximation image. In our method,... 

    Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor

    , Article IEEE Transactions on Multimedia ; Volume 11, Issue 5 , 2009 , Pages 822-833 ; 15209210 (ISSN) Akhaee, M. A ; Sahraeian, S. M. E ; Sankur, B ; Marvasti, F ; Sharif University of Technology
    2009
    Abstract
    In this paper, a new scaling-based image-adaptive watermarking system has been presented, which exploits human visual model for adapting the watermark data to local properties of the host image. Its improved robustness is due to embedding in the low-frequency wavelet coefficients and optimal control of its strength factor from HVS point of view. Maximum-likelihood (ML) decoder is used aided by the channel side information. The performance of the proposed scheme is analytically calculated and verified by simulation. Experimental results confirm the imperceptibility of the proposed method and its higher robustness against attacks compared to alternative watermarking methods in the literature.... 

    Improvement to a semi-fragile watermarking scheme against a proposed counterfeiting attack

    , Article 11th International Conference on Advanced Communication Technology, ICACT 2009, Phoenix Park, 15 February 2009 through 18 February 2009 ; Volume 3 , 2009 , Pages 1928-1932 ; 17389445 (ISSN); 9788955191387 (ISBN) Kourkchi, H ; Ghaemmaghami, S ; Sharif University of Technology
    2009
    Abstract
    One of the main properties of digital watermarking methods is their security against attacks. In this paper, a novel attack against an adaptive semi-fragile image watermarking is proposed. In this attack, watermarking key and watermark are estimated by using several watermarked images. In order to improve the watermarking scheme against the proposed attack, the entropy of image blocks is utilized. Using entropy is compatible with Human Visual System (HVS); therefore it is suitable to determine the weight of watermark in image blocks. Since entropy is a sensitive feature, it is used to improve the watermarking method performance against the proposed attack. It is shown that this modification... 

    Contourlet based image watermarking using optimum detector in the noisy environment

    , Article 2008 IEEE International Conference on Image Processing, ICIP 2008, San Diego, CA, 12 October 2008 through 15 October 2008 ; December , 2008 , Pages 429-432 ; 15224880 (ISSN); 1424417643 (ISBN); 9781424417643 (ISBN) Sahraeian, S. M. E ; Akhaee, M. A ; Hejazi, S. A ; Marvasti, F ; Institute of Electrical and Electronics Engineers; Signal Processing Society ; Sharif University of Technology
    2008
    Abstract
    In this paper, a new multiplicative image watermarking system is presented. As human visual system is less sensitive to the image edges, watermarking is applied in the contourlet domain, which represents image edges sparsely. In the presented scheme, watermark data is embedded in the most energetic directional subband. By modeling General Gaussian Distribution (GGD) for the contourlet coefficients, the distribution of watermarked noisy coefficients is analytically calculated. At the receiver, based on the Maximum Likelihood (ML) decision rule, the optimal detector is proposed. Experimental results show the imperceptibility and high robustness of the proposed method against Additive White... 

    Image adaptive semi-fragile watermarking scheme based on RDWT-SVD

    , Article 2008 International Conference on Innovations in Information Technology, IIT 2008, Al Ain, 16 December 2008 through 18 December 2008 ; February , 2008 , Pages 130-134 ; 9781424433971 (ISBN) Kourkchi, H ; Ghaemmaghami, S ; Sharif University of Technology
    2008
    Abstract
    One of the main properties of semi-fragile image watermarking methods is robustness against lossy compressions, e.g. JPEG conversion. In this paper, robustness of a semi-fragile watermarking scheme based on DWT (Discrete Wavelet Transform), coupled with SVD (Singular Value Decomposition), is improved. To achieve this goal a traditional, critically sampled wavelet transform is replaced by a redundant wavelet transform. The proposed approach is compared to the DWT-SVD based watermarking, introduced earlier, and significantly greater robustness under the JPEG compression is presented. ©2008 IEEE  

    Introducing a new method for estimation image complexity according to calculate watermark capacity

    , Article 2008 4th International Conference on Intelligent Information Hiding and Multiedia Signal Processing, IIH-MSP 2008, Harbin, 15 August 2008 through 17 August 2008 ; 2008 , Pages 981-984 ; 9780769532783 (ISBN) Yaghmaee, F ; Jamzad, M ; Sharif University of Technology
    2008
    Abstract
    One of the most important parameters in evaluating a watermarking algorithm is its capacity. In fact, capacity has a paradoxical relation with other two important parameters: image quality and robustness. Some works have been done on watermarking capacity and a few on image complexities. Most works on watermarking capacity is based on information theory and the capacity values which are calculated based on these methods are very tolerate. In this paper we propose a new method for calculating image complexity based on Region Of Interest (ROI) concept. After that we analyze three complexity measures named: Image compositional complexity (ICC), Quad tree and ROI method, with three different... 

    Achieving higher perceptual quality and robustness in watermarking using Julian set patterns

    , Article IEE Proceedings: Information Security ; Volume 153, Issue 4 , 2006 , Pages 167-172 ; 17470722 (ISSN) Yaghmaee, F ; Jamzad, M ; Sharif University of Technology
    2006
    Abstract
    Some of the most important classes of watermark detection methods in image watermarking are correlation-based algorithms. In these methods usually a pseudorandom noise pattern is embedded in the host image. The receiver can regenerate this pattern by having a key that is the seed of a random number generator. After that if the correlation between this pattern and the image that is assumed to have the watermark is higher than a predefined threshold, it means that the watermark exists and vice versa. Here, we show the advantage of using the Julian set patterns as a watermark, instead of the commonly used pseudorandom noise pattern. Julian set patterns can be regenerated in receiver with few...