Loading...
Search for: image-watermarking
0.007 seconds
Total 41 records

    Robust watermarking against print and scan attack through efficient modeling algorithm

    , Article Signal Processing: Image Communication ; Vol. 29, issue. 10 , November , 2014 , p. 1181-1196 ; ISSN: 09235965 Amiri, S. H ; Jamzad, M ; Sharif University of Technology
    Abstract
    This article proposes a blind discrete wavelet transform-discrete cosine transform (DWT-DCT) composite watermarking scheme that is robust against print and scan distortions. First, two-dimensional DWT is applied to the original image to obtain the mid-frequency subbands. Then, a one-dimensional DCT is applied to the selected mid-frequency subbands to extract the final coefficients for embedding the watermark. To specify watermarking parameters, we utilize a Genetic Algorithm to achieve a predefined image quality after watermark insertion. Suitable locations for watermarking are determined by analyzing the effect of a modeling algorithm. This model simulates noise and nonlinear attacks in... 

    Improving the performance of spatial domain image watermarking with high boost filter

    , Article Indian Journal of Science and Technology ; Vol. 7, issue. 12 , Dec , 2014 , p. 2133-2139 Alirezanejad, M ; Amirgholipour, S ; Safari, V ; Aslani, S ; Arab, M ; Sharif University of Technology
    Abstract
    Authenticating in transaction of digital media becomes an active research field now a day. That is emerging due to the illegal use of digital media and hacking by unauthorized users. Spatial domain based watermarking methods are one of the authentication methods. These methods are not generally robust against intentional or unintentional changes in the images. In this paper, a new method is proposed to recover watermark more precisely in the spatial domain watermarking method. A high-boost filtering is utilized before executing watermark extraction procedure. The watermark information is magnified by preforming this filter. Effectiveness of this filter is proved by several experiment.... 

    Minimisation of image watermarking side effects through subjective optimisation

    , Article IET Image Processing ; Volume 7, Issue 8 , 2013 , Pages 733-741 ; ISSN: 17519659 Golestani, H. B ; Ghanbari, M ; Sharif University of Technology
    2013
    Abstract
    This study investigates the use of structural similarity index (SSIM) on the minimised side effect to image watermarking. For the fast implementation and more compatibility with the standard discrete cosine transform (DCT)-based codecs, watermark insertion is carried out on the DCT coefficients and hence an SSIM model for DCT-based watermarking is developed. For faster implementation, the SSIM index is maximised over independent 4 × 4 non-overlapped blocks, but the disparity between the adjacent blocks reduces the overall image quality. This problem is resolved through optimisation of overlapped blocks, but, the higher image quality is achieved at a cost of high computational complexity. To... 

    A robust zero-watermarking scheme using Canny edge detector

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 5, Issue 1 , 2013 , Pages 25-44 ; 1751911X (ISSN) Shakeri, M ; Jamzad, M ; Sharif University of Technology
    2013
    Abstract
    By expansion of digital multimedia and networking technology, the problem of ownership protection has become increasingly important. Digital watermarking is an efficient way for copyright protection of digital images. Traditional watermarking techniques degrade the quality of host image by embedding a watermark logo. Facing this problem, a new watermarking approach called zero-watermarking has been proposed. In zero-watermarking methods, the watermark does not require to be embedded into the protected image but it uses both the watermark and the protected image to generate a verification map which is registered to a trusted authority for further protection. In this paper we propose a robust... 

    A two-step watermarking attack using long-range correlation image restoration

    , Article Security and Communication Networks ; Volume 5, Issue 6 , AUG , 2012 , Pages 625-635 ; 19390122 (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2012
    Abstract
    This paper presents an efficient scheme for blind watermark attacking using the concept of matching of the long-range data. The main idea of the proposed attack is to add plenty of noise to the watermarked image and then try to restore an unwatermarked copy of the noisy image. The aim is to destroy the watermark information without accessing the parameters used during the watermark embedding process. So, it allows our approach to be completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. Experimental results show the proposed algorithm's superiority over several other traditional watermarking... 

    A content-based digital image watermarking algorithm robust against JPEG compression

    , Article IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2011, 14 December 2011 through 17 December 2011 ; Dec , 2011 , Pages 432-437 ; 9781467307529 (ISBN) Najafi, A ; Siahkoohi, A ; Shamsollahi, M. B ; Sharif University of Technology
    Abstract
    Watermarking (imperceptible insertion of data into the host image or soundtracks) has attracted many research interests in the recent decade. The aim of this correspondence is to introduce a none-blind, content-based method for image watermarking. It employs properties of Human Visual System (HVS) and is capable of embedding a high-energy watermark (consequently robust against lossy compressions and other kinds of attacks) while prevents perceptible degradation in the host image. To modulate the binary coded watermark on a spread-spectrum noise, the introduced algorithm is followed by spread-spectrum watermarking. The algorithm was simulated and experimental results represent magnificent... 

    EWA: An exemplar-based watermarking attack

    , Article 2011 International Conference on Information Technology and Multimedia: "Ubiquitous ICT for Sustainable and Green Living", ICIM 2011, 14 November 2011 through 16 November 2011 ; Nov , 2011 , Page(s): 1 - 5 ; 9781457709890 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    In this paper, we used image inpainting as a means for reconstruction of small damaged portions of a watermarked image so that the hidden watermark is not detectable afterwards. Our new watermarking attack algorithm extends the exemplar-based inpainting method, and then we apply it to intended noisy watermarked images to alter the watermark detection process. Our approach is completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. The average PSNR/SSIM of the watermarked image after applying the proposed attack is more than 35/0.98 and the average NC for extracted watermark is lowers than 0.5, so... 

    Watermarking based on independent component analysis in spatial domain

    , Article Proceedings - 2011 UKSim 13th International Conference on Modelling and Simulation, UKSim 2011, 30 March 2011 through 1 April 2011, Cambridge ; 2011 , Pages 299-303 ; 9780769543765 (ISBN) Hajisami, A ; Rahmati, A ; Babaie Zadeh, M ; Sharif University of Technology
    2011
    Abstract
    This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, embedding is carried out in cumulative form in spatial domain and ICA is used for watermark extraction. For extraction there is no need to access the original image or the watermark, and extraction is carried out only with two watermarked images. Experimental results show that the new method has better quality than famous methods [1], [2], [3] in spatial or frequency domain and is robust against various attacks. Noise addition, resizing, low pass filtering, multiple marks, gray-scale reduction, rotation, JPEG compression, and cropping are some... 

    Blind dewatermarking method based on wavelet transform

    , Article Optical Engineering ; Volume 50, Issue 5 , 2011 ; 00913286 (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    Along with the improvement of image watermarking techniques, the necessity for effectively and comprehensively evaluating various algorithms becomes imperative. In this paper, we first propose a new categorization that fits for most of the existing watermarking algorithms that work in the wavelet domain. Then an adaptive watermarking attack for evaluating the robustness of watermarking schemes that are based on the proposed categorization is presented. This attack determines the flat regions, edges, and textures of the watermarked image and based on known features of each region the proposed attack tries to destroy the watermark information. This is done by separately manipulating the... 

    Robust image watermarking using independent component analysis

    , Article Proceedings - 3rd International Symposium on Information Processing, ISIP 2010, 12 November 2010 through 14 November 2010, Qingdao ; 2010 , Pages 363-367 ; 9780769542614 (ISBN) Hajisami, A ; Ghaemmaghami, S ; Sharif University of Technology
    2010
    Abstract
    This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, we divide the original image into blocks and use the ICA to project the image into a basis with its components as statistically independent as possible. The data embedding is carried out in cumulative form in the ICA basis and also the ICA is used for watermark extraction. The extraction process could be either non-blind, through a straightforward procedure, or blind, via a tricky method we propose. Experimental results show that the new method outperforms some well-known image watermarking methods [1], [2], [3] in spatial or frequency domain and... 

    A contourlet-based image watermarking scheme with high resistance to removal and geometrical attacks

    , Article Eurasip Journal on Advances in Signal Processing ; Volume 2010 , June , 2010 ; 16876172 (ISSN) Khalighi, S ; Tirdad, P ; Rabiee, H. R ; Sharif University of Technology
    2010
    Abstract
    We propose a new nonblind multiresolution watermarking method for still images based on the contourlet transform (CT). In our approach, the watermark is a grayscale image which is embedded into the highest frequency subband of the host image in its contourlet domain. We demonstrate that in comparison to other methods, this method enables us to embed more amounts of data into the directional subbands of the host image without degrading its perceptibility. The experimental results show robustness against several common watermarking attacks such as compression, adding noise, filtering, and geometrical transformations. Since the proposed approach can embed considerable payload, while providing... 

    Estimating watermarking capacity in gray scale images based on image complexity

    , Article Eurasip Journal on Advances in Signal Processing ; Volume 2010 , December , 2010 ; 16876172 (ISSN) Yaghmaee, F ; Jamzad, M ; Sharif University of Technology
    2010
    Abstract
    Capacity is one of the most important parameters in image watermarking. Different works have been done on this subject with different assumptions on image and communication channel. However, there is not a global agreement to estimate watermarking capacity. In this paper, we suggest a method to find the capacity of images based on their complexities. We propose a new method to estimate image complexity based on the concept of Region Of Interest (ROI). Our experiments on 2000 images showed that the proposed measure has the best adoption with watermarking capacity in comparison with other complexity measures. In addition, we propose a new method to calculate capacity using proposed image... 

    Contourlet-based image watermarking using optimum detector in a noisy environment

    , Article IEEE Transactions on Image Processing ; Volume 19, Issue 4 , 2010 , Pages 967-980 ; 10577149 (ISSN) Akhaee, M. A ; Sahraeian, S. M. E ; Marvasti, F ; Sharif University of Technology
    Abstract
    In this paper, an improved multiplicative image watermarking system is presented. Since human visual system is less sensitive to the image edges, watermarking is applied in the contourlet domain, which represents image edges sparsely. In the presented scheme, watermark data is embedded in directional subband with the highest energy. By modeling the contourlet coefficients with General Gaussian Distribution (GGD), the distribution of watermarked noisy coefficients is analytically calculated. The tradeoff between the transparency and robustness of the watermark data is solved in a novel fashion. At the receiver, based on the Maximum Likelihood (ML) decision rule, an optimal detector by the aid... 

    Framework for robust blind image watermarking based on classification of attacks

    , Article Multimedia Tools and Applications ; 2016 , Pages 1-21 ; 13807501 (ISSN) Heidari, M ; Samavi, S ; Soroushmehr, S. M. R ; Shirani, S ; Karimi, N ; Najarian, K ; Sharif University of Technology
    Springer New York LLC  2016
    Abstract
    With the widespread internet usage, digital contents are easily distributed throughout the world. To eliminate concerns of producers and owners of digital contents, watermarking techniques are extensively being used. Robustness against intentional and unintentional attacks is a major quality of watermarking systems. Since different attacks tend to target different parts of the frequency spectrum, in this paper we propose a framework for blind watermarking which determines the type of attack that the image has gone through before extracting the watermark. Within this framework, we propose an attack classification method to identify the region of the frequency spectrum that is less damaged.... 

    A hybrid DCT-SVD based image watermarking algorithm

    , Article 24th Iranian Conference on Electrical Engineering, ICEE 2016, 10 May 2016 through 12 May 2016 ; 2016 , Pages 838-843 ; 9781467387897 (ISBN) Heidari, M ; Karimi, N ; Samavi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Everyday, people share their digital media on the virtual networks; therefore, protecting them against piracy is worthy of consideration. Digital watermarking is a method to achieve this goal. In this paper, we propose a watermarking method in Discrete Cosine Transform (DCT) domain. For this purpose, DCT coefficients of the whole image are calculated. It helps to present a system without blockiness effects. Then, singular values of the watermark image are added to the low frequency DCT coefficients of cover image that are located on the main diagonal. We use scaling factors for watermark embedding to improve imperceptibility of the watermark. A vector of fixed elements, which is calculated... 

    Robust image data hiding using geometric mean quantization

    , Article GLOBECOM - IEEE Global Telecommunications Conference, 30 November 2009 through 4 December 2009, Honolulu, HI ; 2009 ; 9781424441488 (ISBN) Akhaee, M. A ; Ghaemmaghami, S ; Nikooienejad, A ; Marvasti, F ; Sharif University of Technology
    Abstract
    In this paper, a novel quantization based watermarking method is proposed. For blind detection, a set of nonlinear convex functions based on geometric mean are investigated. In order to achieve minimum distortion, the optimum function set is found. The algorithm is implemented on the approximation coefficients of wavelet transform for natural images. In order to make the algorithm more robust and imperceptible, a new transform domain called Point to Point Graph (PPG), which converts a 1-D signal to a 2-D one, has been used. The error probability of the proposed scheme is analytically investigated. Simulation results show that this algorithm has great robustness against common attacks such as... 

    A new robust non-blind digital watermarking scheme in contourlet domain

    , Article IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2009, 14 December 2009 through 16 December 2009, Ajman ; 2009 , Pages 20-25 ; 9781424459506 (ISBN) Khalighi, S ; Tirdad, P ; Rabiee, H. R ; Sharif University of Technology
    Abstract
    In this paper, we propose a new multiresolution watermarking method for still images based on the Contourlet Transform (CT). In our algorithm, the watermark is a grayscale image which is embedded into the host image in its contourlet domain. We demonstrate that in comparison with other methods, the proposed method enables us to embed more amount of data into the host image without degrading its perceptual quality. The experimental results show robustness against several common watermarking attacks such as compression, adding noise, and filtering. ©2009 IEEE  

    Blind image watermarking based onsample rotation with optimal detector

    , Article European Signal Processing Conference, 24 August 2009 through 28 August 2009, Glasgow ; 2009 , Pages 278-282 ; 22195491 (ISSN) Sahraeian, S. M. E ; Akhaee, M. A ; Marvasti, F ; Sharif University of Technology
    Abstract
    This paper present a simple watermarking approach based on the rotation of low frequency components of image blocks. The rotation process is performed with less distortion by projection of the samples on specific lines according to message bit. To have optimal detection Maximum Likelihood criteria has been used. Thus, by computing the distribution of rotated noisy samples the optimum decoder is presented and its performance is analytically investigated. The privilege of this proposed algorithm is its inherent robustness against gain attack as well as its simplicity. Experimental results confirm the validity of the analytical derivations and also high robustness against common attacks. ©... 

    Framework for robust blind image watermarking based on classification of attacks

    , Article Multimedia Tools and Applications ; Volume 76, Issue 22 , 2017 , Pages 23459-23479 ; 13807501 (ISSN) Heidari, M ; Samavi, S ; Soroushmehr, S. M. R ; Shirani, S ; Karimi, N ; Najarian, K ; Sharif University of Technology
    Abstract
    With the widespread internet usage, digital contents are easily distributed throughout the world. To eliminate concerns of producers and owners of digital contents, watermarking techniques are extensively being used. Robustness against intentional and unintentional attacks is a major quality of watermarking systems. Since different attacks tend to target different parts of the frequency spectrum, in this paper we propose a framework for blind watermarking which determines the type of attack that the image has gone through before extracting the watermark. Within this framework, we propose an attack classification method to identify the region of the frequency spectrum that is less damaged.... 

    A new adaptive watermarking attack in wavelet domain

    , Article 2009 International Multimedia, Signal Processing and Communication Technologies, IMPACT 2009, Aligarh, 14 March 2009 through 16 March 2009 ; 2009 , Pages 320-323 ; 9781424436040 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper, we proposed a categorization for most of the existing watermarking algorithms that work in wavelet domain. Then an adaptive watermarking attack for digital images that is based on the proposed categorization is presented. This attack determines the flat regions, edges and textures of the watermarked image and based on known features of each region the proposed attack tries to destroy the watermark information by manipulating the wavelet coefficients of each region separately such that the least visual distortion will be imposed on the attacked image. We have tested the proposed method to attack two recent and robust watermarking methods and the results sound impressive. The...