Image watermarking technique in MDCT domain exploiting the properties of the JND model

نویسندگان

  • Maha Bellaaj
  • Kais Ouni
چکیده

View the development of the internet in the 90s and the orientation of the world to an era when digital is playing an increasingly important have found ourselves faced with serious problems of copyright. Where digital watermarking as an effective solution does faces to these problems and whose basic idea is to insert a mark in digital media. In this paper, we will present a watermarking technique for image. Our proposed technique operates in the frequency domain. We will apply the MDCT (Modified Discrete Cosine Transform) on the original image to pass from temporal domain to frequency domain. We exploited the proprieties of the JND (Just Noticeable Difference) model to search the places for insertion of the watermark to optimize the imperceptibility criterion of the mark at the insertion phase of the proposed technique. To ensure maximum capacity of insertion, we will duplicate the bits of the brand N times and then each bit is inserted in the LSB (Least Significant Bit) of the components sought by JND model. In order to increase the detection rates, we used Hamming code as error correction code. We evaluated the invisibility of the technique by calculating the PSNR, the Structural Similarity Metric (SSIM). We studied the robustness of this technique against the different attacks given by checkmark. Finally, to highlight our results, we compared the proposed technique with some other existing techniques. Keywords—watermarking, MDCT, JND, LSB, Hamming, impercebtibility, PSNR, SSIM, checkmark, robustness

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel STDM Watermarking Using Visual Saliency-Based JND Model

The just noticeable distortion (JND) model plays an important role in measuring the visual visibility for spread transform dither modulation (STDM) watermarking. However, the existing JND model characterizes the suprathreshold distortions with an equal saliency level. Visual saliency (VS) has been widely studied by psychologists and computer scientists during the last decade, where the distorti...

متن کامل

Blind Wavelet-based Image Watermarking Based on HVS and Neural Networks

This work proposes a Blind Wavelet-based Image Watermarking (BWIW) technique, based on the human visible system (HVS) model and neural networks, for image copyright protection. A characteristic of the HVS, the Just Noticeable Difference (JND) profile, is employed in the watermark embedding so that the BWIW technique can make the watermark further imperceptible. The technique is developed in the...

متن کامل

A Modified Digital Image Watermarking Scheme Based on Nonnegative Matrix Factorization

This paper presents a modified digital image watermarking method based on nonnegative matrix factorization. Firstly, host image is factorized to the product of three nonnegative matrices. Then, the centric matrix is transferred to discrete cosine transform domain. Watermark is embedded in low frequency band of this matrix and next, the reverse of the transform is computed. Finally, watermarked ...

متن کامل

A Modified Digital Image Watermarking Scheme Based on Nonnegative Matrix Factorization

This paper presents a modified digital image watermarking method based on nonnegative matrix factorization. Firstly, host image is factorized to the product of three nonnegative matrices. Then, the centric matrix is transferred to discrete cosine transform domain. Watermark is embedded in low frequency band of this matrix and next, the reverse of the transform is computed. Finally, watermarked ...

متن کامل

An improved hybrid image watermarking scheme in shearlet and wavelet domain

Watermarking is one of the best solutions for copyright protection and authentication of multimedia contents. In this paper a hybrid scheme is proposed using wavelet and shearlet transforms with singular value decomposition. For better security, Arnold map is used for encryption. Examining the results and comparing with other methods show that this hybrid proposed scheme with simultaneous utili...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015