Loading...
Search for: image-watermarking
0.008 seconds
Total 41 records

    Estimating watermarking capacity in gray scale images based on image complexity

    , Article Eurasip Journal on Advances in Signal Processing ; Volume 2010 , December , 2010 ; 16876172 (ISSN) Yaghmaee, F ; Jamzad, M ; Sharif University of Technology
    2010
    Abstract
    Capacity is one of the most important parameters in image watermarking. Different works have been done on this subject with different assumptions on image and communication channel. However, there is not a global agreement to estimate watermarking capacity. In this paper, we suggest a method to find the capacity of images based on their complexities. We propose a new method to estimate image complexity based on the concept of Region Of Interest (ROI). Our experiments on 2000 images showed that the proposed measure has the best adoption with watermarking capacity in comparison with other complexity measures. In addition, we propose a new method to calculate capacity using proposed image... 

    Contourlet-based image watermarking using optimum detector in a noisy environment

    , Article IEEE Transactions on Image Processing ; Volume 19, Issue 4 , 2010 , Pages 967-980 ; 10577149 (ISSN) Akhaee, M. A ; Sahraeian, S. M. E ; Marvasti, F ; Sharif University of Technology
    Abstract
    In this paper, an improved multiplicative image watermarking system is presented. Since human visual system is less sensitive to the image edges, watermarking is applied in the contourlet domain, which represents image edges sparsely. In the presented scheme, watermark data is embedded in directional subband with the highest energy. By modeling the contourlet coefficients with General Gaussian Distribution (GGD), the distribution of watermarked noisy coefficients is analytically calculated. The tradeoff between the transparency and robustness of the watermark data is solved in a novel fashion. At the receiver, based on the Maximum Likelihood (ML) decision rule, an optimal detector by the aid... 

    Framework for robust blind image watermarking based on classification of attacks

    , Article Multimedia Tools and Applications ; 2016 , Pages 1-21 ; 13807501 (ISSN) Heidari, M ; Samavi, S ; Soroushmehr, S. M. R ; Shirani, S ; Karimi, N ; Najarian, K ; Sharif University of Technology
    Springer New York LLC  2016
    Abstract
    With the widespread internet usage, digital contents are easily distributed throughout the world. To eliminate concerns of producers and owners of digital contents, watermarking techniques are extensively being used. Robustness against intentional and unintentional attacks is a major quality of watermarking systems. Since different attacks tend to target different parts of the frequency spectrum, in this paper we propose a framework for blind watermarking which determines the type of attack that the image has gone through before extracting the watermark. Within this framework, we propose an attack classification method to identify the region of the frequency spectrum that is less damaged.... 

    A hybrid DCT-SVD based image watermarking algorithm

    , Article 24th Iranian Conference on Electrical Engineering, ICEE 2016, 10 May 2016 through 12 May 2016 ; 2016 , Pages 838-843 ; 9781467387897 (ISBN) Heidari, M ; Karimi, N ; Samavi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Everyday, people share their digital media on the virtual networks; therefore, protecting them against piracy is worthy of consideration. Digital watermarking is a method to achieve this goal. In this paper, we propose a watermarking method in Discrete Cosine Transform (DCT) domain. For this purpose, DCT coefficients of the whole image are calculated. It helps to present a system without blockiness effects. Then, singular values of the watermark image are added to the low frequency DCT coefficients of cover image that are located on the main diagonal. We use scaling factors for watermark embedding to improve imperceptibility of the watermark. A vector of fixed elements, which is calculated... 

    Robust image data hiding using geometric mean quantization

    , Article GLOBECOM - IEEE Global Telecommunications Conference, 30 November 2009 through 4 December 2009, Honolulu, HI ; 2009 ; 9781424441488 (ISBN) Akhaee, M. A ; Ghaemmaghami, S ; Nikooienejad, A ; Marvasti, F ; Sharif University of Technology
    Abstract
    In this paper, a novel quantization based watermarking method is proposed. For blind detection, a set of nonlinear convex functions based on geometric mean are investigated. In order to achieve minimum distortion, the optimum function set is found. The algorithm is implemented on the approximation coefficients of wavelet transform for natural images. In order to make the algorithm more robust and imperceptible, a new transform domain called Point to Point Graph (PPG), which converts a 1-D signal to a 2-D one, has been used. The error probability of the proposed scheme is analytically investigated. Simulation results show that this algorithm has great robustness against common attacks such as... 

    A new robust non-blind digital watermarking scheme in contourlet domain

    , Article IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2009, 14 December 2009 through 16 December 2009, Ajman ; 2009 , Pages 20-25 ; 9781424459506 (ISBN) Khalighi, S ; Tirdad, P ; Rabiee, H. R ; Sharif University of Technology
    Abstract
    In this paper, we propose a new multiresolution watermarking method for still images based on the Contourlet Transform (CT). In our algorithm, the watermark is a grayscale image which is embedded into the host image in its contourlet domain. We demonstrate that in comparison with other methods, the proposed method enables us to embed more amount of data into the host image without degrading its perceptual quality. The experimental results show robustness against several common watermarking attacks such as compression, adding noise, and filtering. ©2009 IEEE  

    Blind image watermarking based onsample rotation with optimal detector

    , Article European Signal Processing Conference, 24 August 2009 through 28 August 2009, Glasgow ; 2009 , Pages 278-282 ; 22195491 (ISSN) Sahraeian, S. M. E ; Akhaee, M. A ; Marvasti, F ; Sharif University of Technology
    Abstract
    This paper present a simple watermarking approach based on the rotation of low frequency components of image blocks. The rotation process is performed with less distortion by projection of the samples on specific lines according to message bit. To have optimal detection Maximum Likelihood criteria has been used. Thus, by computing the distribution of rotated noisy samples the optimum decoder is presented and its performance is analytically investigated. The privilege of this proposed algorithm is its inherent robustness against gain attack as well as its simplicity. Experimental results confirm the validity of the analytical derivations and also high robustness against common attacks. ©... 

    Framework for robust blind image watermarking based on classification of attacks

    , Article Multimedia Tools and Applications ; Volume 76, Issue 22 , 2017 , Pages 23459-23479 ; 13807501 (ISSN) Heidari, M ; Samavi, S ; Soroushmehr, S. M. R ; Shirani, S ; Karimi, N ; Najarian, K ; Sharif University of Technology
    Abstract
    With the widespread internet usage, digital contents are easily distributed throughout the world. To eliminate concerns of producers and owners of digital contents, watermarking techniques are extensively being used. Robustness against intentional and unintentional attacks is a major quality of watermarking systems. Since different attacks tend to target different parts of the frequency spectrum, in this paper we propose a framework for blind watermarking which determines the type of attack that the image has gone through before extracting the watermark. Within this framework, we propose an attack classification method to identify the region of the frequency spectrum that is less damaged.... 

    A new adaptive watermarking attack in wavelet domain

    , Article 2009 International Multimedia, Signal Processing and Communication Technologies, IMPACT 2009, Aligarh, 14 March 2009 through 16 March 2009 ; 2009 , Pages 320-323 ; 9781424436040 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper, we proposed a categorization for most of the existing watermarking algorithms that work in wavelet domain. Then an adaptive watermarking attack for digital images that is based on the proposed categorization is presented. This attack determines the flat regions, edges and textures of the watermarked image and based on known features of each region the proposed attack tries to destroy the watermark information by manipulating the wavelet coefficients of each region separately such that the least visual distortion will be imposed on the attacked image. We have tested the proposed method to attack two recent and robust watermarking methods and the results sound impressive. The... 

    A new watermarking attack based on content-aware image resizing

    , Article 2009 International Multimedia, Signal Processing and Communication Technologies, IMPACT 2009, Aligarh, 14 March 2009 through 16 March 2009 ; 2009 , Pages 177-180 ; 9781424436040 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper, we propose a new method for damaging and destroying robust invisible watermarks using an image resizing technique which is named seam carving. By using this method we are able to resize watermarked images in a content-aware manner so that the synchronization of the embedder and extractor of watermarking system is broken and the watermark detection becomes impossible. In contrast to the available benchmarks like Stirmark, proposed attack does not severely reduce the quality of the watermarked image. Therefore it maintains the commercial value of the watermarked image. We have tested the proposed method to attack 3 recent and robust watermarking methods and the results sound... 

    A robust image watermarking using two level DCT and wavelet packets denoising

    , Article International Conference on Availability, Reliability and Security, ARES 2009, Fukuoka, Fukuoka Prefecture, 16 March 2009 through 19 March 2009 ; 2009 , Pages 150-157 ; 9780769535647 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper we present a blind low frequency watermarking scheme on gray level images, which is based on DCT transform and spread spectrum communications technique. We compute the DCT of non overlapping 8x8 blocks of the host image, then using the DC coefficients of each block we construct a low-resolution approximation image. We apply block based DCT on this approximation image, then a pseudo random noise sequence is added into its high frequencies. For detection, we extract the approximation image from the watermarked image, then the same pseudo random noise sequence is generated, and its correlation is computed with high frequencies of the watermarked approximation image. In our method,... 

    Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor

    , Article IEEE Transactions on Multimedia ; Volume 11, Issue 5 , 2009 , Pages 822-833 ; 15209210 (ISSN) Akhaee, M. A ; Sahraeian, S. M. E ; Sankur, B ; Marvasti, F ; Sharif University of Technology
    2009
    Abstract
    In this paper, a new scaling-based image-adaptive watermarking system has been presented, which exploits human visual model for adapting the watermark data to local properties of the host image. Its improved robustness is due to embedding in the low-frequency wavelet coefficients and optimal control of its strength factor from HVS point of view. Maximum-likelihood (ML) decoder is used aided by the channel side information. The performance of the proposed scheme is analytically calculated and verified by simulation. Experimental results confirm the imperceptibility of the proposed method and its higher robustness against attacks compared to alternative watermarking methods in the literature.... 

    Improvement to a semi-fragile watermarking scheme against a proposed counterfeiting attack

    , Article 11th International Conference on Advanced Communication Technology, ICACT 2009, Phoenix Park, 15 February 2009 through 18 February 2009 ; Volume 3 , 2009 , Pages 1928-1932 ; 17389445 (ISSN); 9788955191387 (ISBN) Kourkchi, H ; Ghaemmaghami, S ; Sharif University of Technology
    2009
    Abstract
    One of the main properties of digital watermarking methods is their security against attacks. In this paper, a novel attack against an adaptive semi-fragile image watermarking is proposed. In this attack, watermarking key and watermark are estimated by using several watermarked images. In order to improve the watermarking scheme against the proposed attack, the entropy of image blocks is utilized. Using entropy is compatible with Human Visual System (HVS); therefore it is suitable to determine the weight of watermark in image blocks. Since entropy is a sensitive feature, it is used to improve the watermarking method performance against the proposed attack. It is shown that this modification... 

    Contourlet based image watermarking using optimum detector in the noisy environment

    , Article 2008 IEEE International Conference on Image Processing, ICIP 2008, San Diego, CA, 12 October 2008 through 15 October 2008 ; December , 2008 , Pages 429-432 ; 15224880 (ISSN); 1424417643 (ISBN); 9781424417643 (ISBN) Sahraeian, S. M. E ; Akhaee, M. A ; Hejazi, S. A ; Marvasti, F ; Institute of Electrical and Electronics Engineers; Signal Processing Society ; Sharif University of Technology
    2008
    Abstract
    In this paper, a new multiplicative image watermarking system is presented. As human visual system is less sensitive to the image edges, watermarking is applied in the contourlet domain, which represents image edges sparsely. In the presented scheme, watermark data is embedded in the most energetic directional subband. By modeling General Gaussian Distribution (GGD) for the contourlet coefficients, the distribution of watermarked noisy coefficients is analytically calculated. At the receiver, based on the Maximum Likelihood (ML) decision rule, the optimal detector is proposed. Experimental results show the imperceptibility and high robustness of the proposed method against Additive White... 

    Image adaptive semi-fragile watermarking scheme based on RDWT-SVD

    , Article 2008 International Conference on Innovations in Information Technology, IIT 2008, Al Ain, 16 December 2008 through 18 December 2008 ; February , 2008 , Pages 130-134 ; 9781424433971 (ISBN) Kourkchi, H ; Ghaemmaghami, S ; Sharif University of Technology
    2008
    Abstract
    One of the main properties of semi-fragile image watermarking methods is robustness against lossy compressions, e.g. JPEG conversion. In this paper, robustness of a semi-fragile watermarking scheme based on DWT (Discrete Wavelet Transform), coupled with SVD (Singular Value Decomposition), is improved. To achieve this goal a traditional, critically sampled wavelet transform is replaced by a redundant wavelet transform. The proposed approach is compared to the DWT-SVD based watermarking, introduced earlier, and significantly greater robustness under the JPEG compression is presented. ©2008 IEEE  

    Introducing a new method for estimation image complexity according to calculate watermark capacity

    , Article 2008 4th International Conference on Intelligent Information Hiding and Multiedia Signal Processing, IIH-MSP 2008, Harbin, 15 August 2008 through 17 August 2008 ; 2008 , Pages 981-984 ; 9780769532783 (ISBN) Yaghmaee, F ; Jamzad, M ; Sharif University of Technology
    2008
    Abstract
    One of the most important parameters in evaluating a watermarking algorithm is its capacity. In fact, capacity has a paradoxical relation with other two important parameters: image quality and robustness. Some works have been done on watermarking capacity and a few on image complexities. Most works on watermarking capacity is based on information theory and the capacity values which are calculated based on these methods are very tolerate. In this paper we propose a new method for calculating image complexity based on Region Of Interest (ROI) concept. After that we analyze three complexity measures named: Image compositional complexity (ICC), Quad tree and ROI method, with three different... 

    Achieving higher perceptual quality and robustness in watermarking using Julian set patterns

    , Article IEE Proceedings: Information Security ; Volume 153, Issue 4 , 2006 , Pages 167-172 ; 17470722 (ISSN) Yaghmaee, F ; Jamzad, M ; Sharif University of Technology
    2006
    Abstract
    Some of the most important classes of watermark detection methods in image watermarking are correlation-based algorithms. In these methods usually a pseudorandom noise pattern is embedded in the host image. The receiver can regenerate this pattern by having a key that is the seed of a random number generator. After that if the correlation between this pattern and the image that is assumed to have the watermark is higher than a predefined threshold, it means that the watermark exists and vice versa. Here, we show the advantage of using the Julian set patterns as a watermark, instead of the commonly used pseudorandom noise pattern. Julian set patterns can be regenerated in receiver with few... 

    Using julian set patterns for higher robustness in correlation based watermarking methods

    , Article 5th IEEE International Symposium on Signal Processing and Information Technology, Athens, 18 December 2005 through 21 December 2005 ; Volume 2005 , 2005 , Pages 358-362 Yaghmaee, F ; Jamzad, M ; Sharif University of Technology
    2005
    Abstract
    Some of the most important classes of watermark detection methods in image watermarking are correlation based algorithms. In these methods usually a pseudorandom pattern is embedded in host image. Receiver can regenerate this pattern by having a key that is the seed of a random number generator. After that if the correlation between this pattern and the image that is assumed to have the watermark is higher than a predefined threshold, this means that the watermark exists and vise versa. In this paper we showed the advantage of using the Julian set patterns as a watermark, instead of commonly used pseudorandom noisy pattern. Julian set patterns can be regenerate in receiver with few... 

    Robustness enhancement of content-based watermarks using entropy masking effect

    , Article 4th International Workshop on Digital Watermarking, IWDW 2005, Siena, 15 September 2005 through 17 September 2005 ; Volume 3710 LNCS , 2005 , Pages 444-458 ; 03029743 (ISSN); 354028768X (ISBN); 9783540287681 (ISBN) Sadr, A. H ; Ghaemmaghami, S ; Sharif University of Technology
    2005
    Abstract
    Image-Adaptive watermarking systems exploit visual models to adapt the watermark to local properties of the host image. This leads to a watermark power enhancement, hence an improved resilience against different attacks, while keeping the mark imperceptible. Visual models consider different properties of the human visual system, such as frequency sensitivity, luminance sensitivity and contrast masking. Entropy masking is another human visual system's characteristic, which rarely has been addressed in visual models. In this paper we have utilized this masking effect to improve the robustness of Image-Adaptive watermarks while keeping their transparency. Experimental results show a significant... 

    An optimal SVD-based watermarking framework through linear programming

    , Article IASTED International Conference on Internet and Multimedia Systems and Applications, EuroIMSA 2005, Grindelwald, 21 February 2005 through 23 February 2005 ; 2005 , Pages 271-274 ; 0889864861 (ISBN) Haghighi, M. S ; Ghaemmaghami, S ; Hamza M. H ; Sharif University of Technology
    2005
    Abstract
    Transparent, robust watermarking schemes tend to insert invisible watermarks with the highest possible energy. Singular values, in singular value decomposition (SVD), are shown to be robust to intentional and unintentional attacks. However, none of the algorithms proposed in the literature considered the visual imperceptibility constraint imposed by the human visual models. In this paper, we introduce an optimal SVD-based embedding framework, based on the well-known linear programming concept. Given a binary sequence of the mark, we show how to insert the message with the highest possible magnitude, without outlawing the just noticeable thresholds driven by the human visual system models in...