Filters








2,485 Hits in 5.8 sec

Robust Watermarking for Images Based on Color Manipulation [chapter]

Sebastiano Battiato, Dario Catalano, Giovanni Gallo, Rosario Gennaro
2000 Lecture Notes in Computer Science  
In this paper we present a new efficient watermarking scheme for images. The basic idea of our method is to alter the colors of the given image in a suitable but imperceptible way.  ...  The robustness of the scheme is also theoretically analyzed and it is shown to depend on the number of colors in the image being marked.  ...  The authors wish to thank the anonymous referees for their helpful suggestions and comments.  ... 
doi:10.1007/10719724_21 fatcat:m227ajrzmfamjfo72re63aveuy

Robustness and Imperceptibility Enhancement in Watermarked Images by Color Transformation [article]

Maedeh Jamali, Mahnoosh Bagheri, Nader Karimi, Shadrokh Samavi
2019 arXiv   pre-print
One of the effective methods for the preservation of copyright ownership of digital media is watermarking.  ...  Due to the distribution of image information in the RGB domain, we use the YUV color space, which concentrates the visual information in the Y channel.  ...  After that, they manipulate the DCT coefficients based on these adaptive strength factors and watermark bits. Some papers use color image watermarking space conversion to increase robustness.  ... 
arXiv:1911.00772v1 fatcat:4jxywu4wivebzin24ugspoidkq

Collusion Attack Resistant Watermarking Scheme for Images using DCT

Vikas Saxena, J. P. Gupta
2007 2007 IEEE 15th Signal Processing and Communications Applications  
This paper presents a new scheme for hiding a logo-based watermark in colored still image which is inherently collusion attack resistant.  ...  Image watermarking with both insensible detection and high robustness capabilities is still a challenging problem for copyright protection up to now.  ...  Further research may be conducted on the suitability of color channel based on image characteristics itself.  ... 
doi:10.1109/siu.2007.4298829 fatcat:f3mkqhrlhbfibnobourovh7kcu

A Novel Authentication Scheme for Lossy Compressed Images

Mona A. M. Fouad, Ahmed Mokhtar A. Mansour
2015 International Journal of Security and Its Applications  
On the other side, if geometrical or image processing attacks are applied to the watermarked images, they are then verified successfully as 'not authenticated'.  ...  In this paper, a novel scheme is proposed for watermarking lossy compressed images just before transmission and authenticating them once they are received, away from the core of the compression and de-compression  ...  Work in [18] proposed a watermarking algorithm based on correlation to authenticate image content.  ... 
doi:10.14257/ijsia.2015.9.6.29 fatcat:r4zbz4x7svfsfixuucdj4xbuci

BEMD-HT Based RGB Color Image Robust Information Hiding Algorithm Using Block Averaging Technique

Shelina Aktar, Ibrahim Khalilullah, Shugufta Abrahim, Ekramul Hamid
2016 International Journal of Signal Processing, Image Processing and Pattern Recognition  
We use RGB color image as a cover image. The cover image is divided into a number of blocks.  ...  The experimental results of this algorithm demonstrate that the proposed method has better imperceptibility and it is more robust against several image processing and geometric manipulations.  ...  As opposed to steganography, digital watermarking has additional requirements of robustness against possible manipulation on watermarked object.  ... 
doi:10.14257/ijsip.2016.9.12.15 fatcat:23qeztklp5apdgbxctlochqprq

Methods for image authentication: a survey

Adil Haouzia, Rita Noumeir
2007 Multimedia tools and applications  
Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on these images.  ...  These approaches include conventional cryptography, fragile and semi-fragile watermarking and digital signatures that are based on the image content.  ...  On the other hand, using edges for content-based signature is undesirable for color images since one may change colors without affecting edges.  ... 
doi:10.1007/s11042-007-0154-3 fatcat:wwtvlpeyjnck3pj5gcpxakvhfq

An Implementation of Text Hiding in Medical Images based on Graph Coloring for Android Devices

Muhammad Wildan Iskandar, Adiwijaya
2019 Journal of Physics, Conference Series  
In the embedding process, the method used is vector quantization and graph coloring based on a Genetic Algorithm.  ...  However, digital image watermarking techniques are usually widely implemented using software running on a computer.  ...  [7] developed a tool for portable devices based on Android OS, that permits the addition of a visible or invisible watermark to images.  ... 
doi:10.1088/1742-6596/1192/1/012008 fatcat:rb5uy3ifmzhbbho4ky2bnkcnge

Analysis of feature-based geometry-invariant watermarking

Mehmet U. Celik, Eli S. Saber, Gaurav Sharma, A. Murat Tekalp, Ping W. Wong, Edward J. Delp III
2001 Security and Watermarking of Multimedia Contents III  
Ensuring robustness against geometrical manipulations is a challenging task for watermarking algorithms.  ...  Watermarking algorithms that depend on the inherent geometry of the image for synchronization fail ungracefully due to de-synchronization through geometric manipulations.  ...  As an example of a global approach, we consider a feature point extraction based on clustering of colors in the image.  ... 
doi:10.1117/12.435407 dblp:conf/sswmc/CelikS0T01 fatcat:3j3npuxphjb2nfqjdwlhxsimli

FaceSigns: Semi-Fragile Neural Watermarks for Media Authentication and Countering Deepfakes [article]

Paarth Neekhara, Shehzeen Hussain, Xinqiao Zhang, Ke Huang, Julian McAuley, Farinaz Koushanfar
2022 arXiv   pre-print
Our watermarking framework is designed to be fragile to facial manipulations or tampering while being robust to benign image-processing operations such as image compression, scaling, saturation, contrast  ...  For a set of unseen benign and Deepfake manipulations studied in our work, FaceSigns can reliably detect manipulated content with an AUC score of 0.996 which is significantly higher than prior image watermarking  ...  For each image, we initialize a mask M h×w×c of all ones.  ... 
arXiv:2204.01960v1 fatcat:2n7nz2ctcjfvrajscvp3uh3l5q

An Efficient Image Watermarking Approach based on Fourier Transform

Methaq T.
2016 International Journal of Computer Applications  
This paper presents a new image watermarking approach based on Fourier transform and characteristics of vision system.  ...  The original image is partitioned into the non-overlapping blocks. Watermark bits are inserted within the selected coefficients of each block depending on certain condition.  ...  Pun. proposed a novel system for image watermarking based on DFT.  ... 
doi:10.5120/ijca2016908559 fatcat:i7ytoejq4jea7j5aug3prieate

Robust Watermarking Scheme Based on Radius Weight Mean and Feature-Embedding Technique

Ching-Yu Yang
2013 ETRI Journal  
In this paper, the radius weight mean (RWM) and the feature-embedding technique are used to present a novel watermarking scheme for color images.  ...  Simulations validate that the stego-images generated by the proposed scheme are robust against most common image-processing operations, such as compression, color quantization, bit truncation, noise addition  ...  Acknowledgment I would like to thank the editors and anonymous reviewers for providing valuable comments, which helped to improve the content of the paper.  ... 
doi:10.4218/etrij.12.0112.0480 fatcat:6w5ny2grunawdpc4ilk2uuc3sy

Restrict Piracy of Videos using DWT-SVD based Video Watermarking

Shrirang D., K. Sujatha
2015 International Journal of Computer Applications  
DWT-SVD based video watermarking is relatively a new technology that has been proposed to solve the problem of illegal manipulation and distribution of digital video for example movie piracy.  ...  Based on the sub-band selection scores the embedding process is done by using the watermark which are embedding in the cover video watermark.  ...  Most these schemes are based on the techniques of image watermarking, but video watermarking has some issues not present in image watermarking.  ... 
doi:10.5120/ijca2015905229 fatcat:vj437fapwfburcc5uqlw72ypz4

Robust Watermarking Scheme Based on Radius Weight Mean and Feature-Embedding Technique

Ching-Yu Yang
2013 ETRI Journal  
In this paper, the radius weight mean (RWM) and the feature-embedding technique are used to present a novel watermarking scheme for color images.  ...  Simulations validate that the stego-images generated by the proposed scheme are robust against most common image-processing operations, such as compression, color quantization, bit truncation, noise addition  ...  Acknowledgment I would like to thank the editors and anonymous reviewers for providing valuable comments, which helped to improve the content of the paper.  ... 
doi:10.4218/etrij.13.0112.0480 fatcat:4qum2xdizngjjly5y4nwzkp4ta

An Effective Robust and Imperceptible Blind Color Image Watermarking using WHT

K. Prabha, I. Shatheesh Sam
2020 Journal of King Saud University: Computer and Information Sciences  
This paper proposes a new blind color image watermarking based on the Walsh Hadamard Transform (WHT).  ...  This proposed method provides more robustness against several manipulations and lossy attacks.  ...  An enhanced color image watermarking scheme (Su et al., 2019) is designed based on Schur decomposition.  ... 
doi:10.1016/j.jksuci.2020.04.003 fatcat:g6d3f2drqrbc7kmsa5dlxxuati

Evaluation of a Fourier Watermarking Method Robustness to Cards Durability Attacks [chapter]

Rabia Riad, Mohamed El Hajji, Hassan Douzi, Rachid Harba, Frédéric Ros
2014 Lecture Notes in Computer Science  
The ID images were watermarked by a new Fourier watermarking method based on print/scan counterattacks (blurring correction and colors restorations) that allows improvement of the robustness of the watermarking  ...  In the context of an industrial application for securing identity cards, image watermarking is used to verify the integrity and authenticity of images printed on plastic cards support.  ...  The watermark is embedded in ID images using a new watermarking method based on Fourier transform and print-and-scan counterattacks.  ... 
doi:10.1007/978-3-319-07998-1_32 fatcat:gutd6ghohfbnto7xeuhx377nfq
« Previous Showing results 1 — 15 out of 2,485 results