Robust hybrid watermarking techniques for different color imaging systems

Published on Mar 27, 2018in Multimedia Tools and Applications2.757
路 DOI :10.1007/S11042-018-5814-Y
Khalid A. Al-Afandy5
Estimated H-index: 5
(Menoufia University),
Walid El-Shafai11
Estimated H-index: 11
(Menoufia University)
+ 6 AuthorsM. M. El-Halawany6
Estimated H-index: 6
(Menoufia University)
Sources
Abstract
Digital watermarking is an efficient and promising mechanism for protecting the copyright of the transmitted multimedia information. Thus, this paper presents two robust hybrid color image watermarking techniques. The objective of the proposed watermarking techniques is to increase the immunity of the watermarked color images against attacks and to achieve adequate perceptual quality. The first proposed hybrid technique is the homomorphic transform based Singular Value Decomposition (SVD) in Discrete Wavelet Transform (DWT) domain. Firstly, the DWT is employed to divide an image into non-overlapping bands. Then, the reflectance components of the LL sub-bands are extracted using the homomorphic transform of each of the RGB (Red, Green, and Blue) color image components. After that, the watermark is embedded by applying the SVD on these reflectance components. The second proposed hybrid technique is the three-level Discrete Stationary Wavelet Transform (DSWT) in Discrete Cosine Transform (DCT) domain. In this technique, the RGB components of the host color image are separated, and then the DCT is applied on each separated color component. The three-level DSWT is employed to divide the DCT components into four sub-bands. These sub-bands are the A, H, V, and D matrices, which have the same host image size. The watermark image is then embedded into the determined matrix A. The two proposed hybrid watermarking techniques are compared with the current state-of-the-art techniques. This paper also presents a comparative study of the proposed techniques for different color imaging systems to determine their robustness and stability. The comparisons are based on the subjective visual results to detect any degradation in the watermarked image in addition to the objective results of the Peak Signal-to-Noise Ratio (PSNR) of the watermarked image, and the Normalized Correlation (NC) of the extracted watermark to test and evaluate the performance efficiency of the proposed watermarking techniques. Extensive experimental results show that the proposed hybrid watermarking techniques are both robust and have adequate immunity against different types of attacks compared to the traditional watermarking techniques. They achieve not only very good perceptual quality with appreciated PSNR values, but also high correlation coefficient values in the presence of different multimedia attacks.
馃摉 Papers frequently viewed together
2016
2014
2014
References41
Newest
#1V. Thirunavukkarasu (Bharathiar University)H-Index: 2
#2J. Satheesh Kumar (Bharathiar University)H-Index: 10
Last. J. Kishorkumar (Government Arts College, Coimbatore)H-Index: 1
view all 4 authors...
The key intention of non-intrusive image forensic detection is to resolve whether an image is original or tampered. In contrast to intrusive methods, there is no supporting pattern that has been embedded into an image to ensure image authenticity. The only accessible cue is the original characteristics of an image. Various non-intrusive techniques have been proposed to ensure image authenticity but no adequate solution exists so far. This article introduced a robust technique by means of Discret...
Source
#1Aditi Zear (JUIT: Jaypee University of Information Technology)H-Index: 4
#2Amit Singh (JUIT: Jaypee University of Information Technology)H-Index: 62
Last. Pardeep Kumar (JUIT: Jaypee University of Information Technology)H-Index: 10
view all 3 authors...
In this paper, an algorithm for multiple watermarking based on discrete wavelet transforms (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) has been proposed for healthcare applications. For identity authentication purpose, the proposed method uses three watermarks in the form of medical Lump image watermark, the doctor signature/identification code and diagnostic information of the patient as the text watermarks. In order to improve the robustness performance of the...
Source
#1Aditi ZearH-Index: 4
#2Amit SinghH-Index: 62
Last. Pardeep KumarH-Index: 10
view all 3 authors...
Source
#1Qingtang Su (Ludong University)H-Index: 15
#2Beijing Chen (NUIST: Nanjing University of Information Science and Technology)H-Index: 23
This paper proposes a new blind watermarking algorithm, which embedding the binary watermark into the blue component of a RGB image in the spatial domain, to resolve the problem of protecting copyright. For embedding watermark, the generation principle and distribution features of direct current (DC) coefficient are used to directly modify the pixel values in the spatial domain, and then four different sub-watermarks are embedded into the different areas of the host image for four times, respect...
Source
Digital multimedia is easily duplicated and distributed using many free softwares. It is important to have copyright protection to save owners copyrights. There are many protection techniques; one of them is watermarking. In watermarking techniques, the objective is to embed a watermark label or image into the original images, audios, or videos. This book presents two robust image watermarking techniques; homomorphic Singular Value Decomposition (SVD) watermarking in Discrete Wavelet Transform (...
#1Durgesh Singh (IIT: Indian Institute of Technology (BHU) Varanasi)H-Index: 7
#2Sanjay Kumar Singh (IIT: Indian Institute of Technology (BHU) Varanasi)H-Index: 80
In this article, a new DWT-SVD and DCT with Arnold Cat Map encryption based robust and blind watermarking scheme is proposed for copyright protection. The proposed scheme solves the most frequently occurring watermarking security problems in Singular Value Decomposition (SVD) based schemes which are unauthorized reading and false-positive detection. This scheme also optimizes fidelity and robustness characteristics. The grey image watermark splits into two parts using four bits MSBs and four bit...
Source
#1Aditi Zear (JUIT: Jaypee University of Information Technology)H-Index: 4
#2Amit Singh (JUIT: Jaypee University of Information Technology)H-Index: 62
Last. Pardeep Kumar (JUIT: Jaypee University of Information Technology)H-Index: 10
view all 3 authors...
In this paper, an algorithm for digital watermarking based on discrete wavelet transforms (DWTs) and singular value decomposition (SVD) has been proposed. In the embedding process, the host colour image is decomposed into third-level DWT. Low frequency band (LL3) is transformed by SVD. The watermark image is also transformed by SVD. The S vector of watermark information is embedded in the S component of the host image. Watermarked image is generated by inverse SVD on modified S vector and origin...
Source
#1Deepak Ranjan Nayak (NITR: National Institute of Technology, Rourkela)H-Index: 16
#2Ratnakar DashH-Index: 17
Last. Banshidhar MajhiH-Index: 23
view all 3 authors...
This paper presents an automatic classification system for segregating pathological brain from normal brains in magnetic resonance imaging scanning. The proposed system employs contrast limited adaptive histogram equalization scheme to enhance the diseased region in brain MR images. Two-dimensional stationary wavelet transform is harnessed to extract features from the preprocessed images. The feature vector is constructed using the energy and entropy values, computed from the level- 2 SWT coeffi...
Source
#1Qingtang Su (Ludong University)H-Index: 15
#2Gang Wang (Ludong University)H-Index: 7
Last. Beijing Chen (NUIST: Nanjing University of Information Science and Technology)H-Index: 23
view all 5 authors...
Most of the existing color image watermarking schemes use binary or grayscale image as watermark, and many of them belong to non-blind watermarking methods. In this paper, an improved color image watermarking algorithm based on QR decomposition is proposed to embed color watermark image into color host image. For embedding watermark, the 24-bits color host image is divided into non-overlapping 3?脳?3 pixel blocks and each pixel block is decomposed by QR decomposition, and the 24-bits color waterm...
Source
#1Xin Xie (NU: Northeastern University)H-Index: 7
#2Carol Livermore (NU: Northeastern University)H-Index: 19
A passively self-aligned, assembly-based process for rapidly creating compact, micro-barrel hinges with unconstrained rotation from SU-8 epoxy is presented. The alignment process takes places in two stages: a coarse alignment stage guided by external dowel pins followed by a fine alignment stage driven by the hinges' features themselves. The assembly of pins into housings circumvents the design rules for minimum gap between features of given thickness in SU-8 processing, enabling reduced hinge c...
Source
Cited By16
Newest
#1Walid El-Shafai (Prince Sultan University)H-Index: 11
#2Ezz El-Din Hemdan (Menoufia University)H-Index: 7
Recently, medical color images significantly affect the efficient diagnosis process and investigation of critical diseases besides mitigating the misdiagnosis problems. Surplus, the theft problem of medical identity and information has been a severe privacy apprehension in the healthcare realm. This paper introduces an efficient digital multi-level security system for medical color images based on fusion, watermarking, and encryption techniques through utilizing singular value decomposition (SVD...
Source
#1Osama S. Faragallah (Taif University)H-Index: 16
#2Hala S. El-sayed (Menoufia University)H-Index: 11
Last. Walid El-Shafai (Prince Sultan University)H-Index: 11
view all 3 authors...
The rapid increase in Internet and social media services results in many cybercriminals that cause a significant deterioration in Internet security with massive unwanted consequences. Encryption technology can be employed to provide data security in digital multimedia communications. From this scene, this paper studies and proposes an efficient optical Multiview Video Coding/High-Efficiency Video Coding (MVC/HEVC) cybersecurity framework using chaotic Arnold map Transform (AMT) and Discrete Cosi...
Source
#1Walid El-Shafai (Menoufia University)H-Index: 11
#2Ahmed Fawzi (Menoufia University)
Last. Mohammed Abd-Elnaby (Taif University)H-Index: 7
view all 5 authors...
Source
#1Dhiran Kumar Mahto (National Institute of Technology, Patna)
#2Amit Singh (National Institute of Technology, Patna)H-Index: 62
Abstract null null Color image watermarking has achieved great success in various applications such as copy protection, content authentication, tamper detection and recovery, etc. The present paper provides a detailed overview of watermarking along with its characteristics, evaluation metrics, and current applications. We then provide a comprehensive survey of different approaches along with their merits and limitations. Furthermore, we summarize each of the approaches in detail, including objec...
Source
#1Mohamad I. Elhadad (Menoufia University)H-Index: 2
#2Walid El-Shafai (Prince Sultan University)H-Index: 11
Last. Fathi E. Abd El-Samie (Princess Nora bint Abdul Rahman University)H-Index: 11
view all 5 authors...
Source
#1Fathi E. Abd El-Samie (Menoufia University)H-Index: 24
#2Rana M. Nassar (Minia University)H-Index: 2
Last. Walid El-ShafaiH-Index: 11
view all 15 authors...
This paper presents a new trend in biometric security systems, which is cancelable multi-biometrics. In general, traditional biometric systems depend on a single biometric for identification. These traditional systems are subject to different types of attacks. In addition, a biometric signature may be lost in hacking scenarios; for example, in the case of intrusion, biometric signatures can be stolen forever. To reduce the risk of losing biometric signatures, the trend of cancelable biometrics h...
Source
#2Mohammed Safy Elwan (Academy of Engineering)H-Index: 1
The security of patient information is important during the transfer of medical data. A hybrid spatial domain watermarking algorithm that includes encryption, integrity protection, and steganography is proposed to strengthen the information originality based on the authentication. The proposed algorithm checks whether the patient's information has been deliberately changed or not. The created code is distributed at every pixel of the medical image and not only in the regions of non-interest pixe...
Source
#1Wafa' Hamdan Alshoura (Universiti Sains Malaysia)H-Index: 5
#2Zurinahni Zainol (Universiti Sains Malaysia)H-Index: 4
Last. Abdulatif AlabdulatifH-Index: 2
view all 5 authors...
Watermarking is an important technique for protecting sensitive e-multimedia data and intellectual property. Watermarking techniques are used for many applications such as ownership protection, which is a popular area of research as compared to others such as authentication and local temper localization. There are many image watermarking schemes that have been recently published based on the frequency domain as it can fulfill watermarking requirements such as high robustness and imperceptibility...
Source
Recently, the digital multimedia cybersecurity has become a research topic of interest due to the fast development of real-time multimedia applications over public networks such as the Internet. Therefore, this research paper introduces an efficient cybersecurity framework for protecting the high-efficiency video coding (HEVC) frames. The suggested selective cybersecurity HEVC framework employs a robust hybrid technique based on聽watermarking and selective encryption for maintaining confidentiali...
Source
#1Walid El-ShafaiH-Index: 11
#2Iman AlmomaniH-Index: 8
Last. Aala AlkhayerH-Index: 1
view all 3 authors...
The rapid growth of multimedia communication systems has expanded the High-Efficiency Video Coding (HEVC) security applications precipitously. Therefore, there is an urgent, elevated need to protect and secure the HEVC content during streaming and communication over insecure channels to ensure the privacy of HEVC data against intruders and attackers. This paper introduces an optical HEVC cipher algorithm based on bit-plane 3D-JST (Three-Dimensional Jigsaw Transform) and multistage 2D-FrFT (Two-D...
Source
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.